Updates from: 08/06/2022 01:15:56
Category Microsoft Docs article Related commit history on GitHub Change details
admin About Guest Users https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/about-guest-users.md
description: "Learn how to populate the Guest users list in the Microsoft 365 ad
# Guest users in Microsoft 365 admin center
+By default, guest access for Microsoft 365 groups is turned on for your organization. Admins can control whether to allow guest access to groups for their whole organization or for individual groups.
+ Any guests you add to your Microsoft Teams, SharePoint, or Azure Active Directory are also added to the **Guest users** list in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">Microsoft 365 admin center</a>. Guests can attend meetings, view documents and chat in Teams they're invited to. Once a user shows up in the **Guest users** list, you can remove their access there.
You must be a global administrator to perform this task.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4tyys]
-## Steps: Add guests in Azure Active Directory
+## Understanding guest accounts in Microsoft 365
-To add guests in the Azure Active Directory, see [add guest users](/azure/active-directory/b2b/b2b-quickstart-add-guest-users-portal).
+Being able to easily share files and documents with the right people while preventing oversharing requires planning. The following resources provide more background to help you create a secure guest sharing environment in Microsoft 365.
+- Plan external collaboration
+- Create a secure guest sharing environment
+- Set up secure file and document sharing and collaboration with Teams in Microsoft 365
+- Guest access in Microsoft Teams
-After you add a user you can also assign them to a group, or give them access to an app in your organization. Once you have added a user in the Azure AD portal, that user will also be listed on the **Guest users** page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">Microsoft 365 admin center</a>.
-After a user is added to the **Guest users** list, they can be [added to Groups](../create-groups/manage-guest-access-in-groups.md#add-guests-to-a-microsoft-365-group-from-the-admin-center) in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">Microsoft 365 admin center</a>.
+In addition to Microsoft Teams and SharePoint, Microsoft 365 also supports guest access in other applications. The following Microsoft 365 products support guest access.
-See [add guests in bulk](/azure/active-directory/b2b/tutorial-bulk-invite) to invite multiple guests to collaborate with your organization.
+- Power Apps (Canvas apps) - Share a canvas app with guest users.
+- Lists - External or guest sharing in OneDrive, SharePoint, and Lists.
+- OneDrive - External or guest sharing in OneDrive, SharePoint, and Lists.
+- Planner ΓÇô Applies to Web and mobile platforms. Guest access in Microsoft Planner.
+- Microsoft 365 groups - Manage guest access in Microsoft 365 groups.
+- Yammer - Work with external groups in Yammer networks not aligned to native mode.
-## Next steps: Remove a guest
+For Microsoft Office applications like Microsoft Word and Excel, guest access is controlled by the location of the output file, for example, Microsoft SharePoint, Teams, and OneDrive.
-Once you're done collaborating with a guest user, you can remove them and they'll no longer have access to your organization.
+## Next steps: Add guests in Azure Active Directory
-1. In the Microsoft 365 admin center, expand **Users** and then choose <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">**Guest users**</a>.
-1. On the **Guest users** page, choose the user you want to remove and then choose **Delete a user**.
+To add guests in the Azure Active Directory, see [add guest users](/azure/active-directory/b2b/b2b-quickstart-add-guest-users-portal).
-To remove users in the Azure AD portal, see [remove a guest user and resources](/azure/active-directory/b2b/b2b-quickstart-add-guest-users-portal#clean-up-resources).
+After you add a user you can also assign them to a group, or give them access to an app in your organization. Once you've added a user in the Azure AD portal, that user will also be listed on the **Guest users** page in the <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">Microsoft 365 admin center</a>.
-## Related content
+See [add guests in bulk](/azure/active-directory/b2b/tutorial-bulk-invite) to invite multiple guests to collaborate with your organization.
-[guest users in microsoft 365 admin center](about-guest-users.md)
+## Related content
-[prevent guests from being added to a specific microsoft 365 group or microsoft teams team](../../solutions/per-group-guest-access.md)
+[Manage guest access in Microsoft 365 groups](../create-groups/manage-guest-access-in-groups.md)\
+[Prevent guests from being added to a specific Microsoft 365 group or Microsoft Teams](../../solutions/per-group-guest-access.md)\
+[Organization switcher in the Microsoft 365 admin center](https://techcommunity.microsoft.com/t5/microsoft-365-blog/new-organization-switcher-in-the-microsoft-365-admin-center/ba-p/1165543) (article)
admin Manage Guest Access In Groups https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/create-groups/manage-guest-access-in-groups.md
If the guest already exists in your directory, you can add them to your groups f
1. In the admin center, go to the **Groups** > <a href="https://go.microsoft.com/fwlink/p/?linkid=2052855" target="_blank">**Groups**</a>.
-2. Click the group you want to add the guest to, and select **View all and manage members** on the **Members** tab.
+2. Select the group you want to add the guest to, and select **View all and manage members** on the **Members** tab.
-4. Select **Add members**, and choose the name of the guest you want to add.
-
-5. Select **Save**.
+3. Select **Add members**, and choose the name of the guest you want to add.
+
+4. Select **Save**.
If you want to add a guest to the directory directly, you can [Add Azure Active Directory B2B collaboration users in the Azure portal](/azure/active-directory/b2b/add-users-administrator). If you want to edit any of a guest's information, you can [Add or update a user's profile information using Azure Active Directory](/azure/active-directory/fundamentals/active-directory-users-profile-azure-portal).
+## Remove a guest
+
+Once you're done collaborating with a guest user, you can remove them, and they'll no longer have access to your organization.
+
+1. In the Microsoft 365 admin center, expand **Users** and then choose <a href="https://go.microsoft.com/fwlink/p/?linkid=2074830" target="_blank">**Guest users**</a>.
+1. On the **Guest users** page, choose the user you want to remove and then choose **Delete a user**.
+
+To remove users in the Azure AD portal, see [remove a guest user and resources](/azure/active-directory/b2b/b2b-quickstart-add-guest-users-portal#clean-up-resources).
++ ## Related content [Block guests from a specific group](../../solutions/per-group-guest-access.md) (article)\
business-premium Index https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/index.md
description: "Learn how to implement cybersecurity for small or medium sized bus
Let us begin by saying that you made a wise choice in adopting Microsoft 365 Business Premium and its world class productivity tools. Designed with cybersecurity in mind, Microsoft 365 Business Premium safeguards your data, devices and information. You are your organization's first and best defense against hackers and cyberattackers, including random individuals, organized crime, or highly-sophisticated nation states.
-The task before you is this: let Microsoft 365 Business Premium help secure your organizationΓÇÖs future! Approach this task by taking on the following missions which will help you fortify your environment, train your team, and safeguard managed devices. The missions are organized as follows:
+The task before you is this: let Microsoft 365 Business Premium help secure your organizationΓÇÖs future! Approach this task by taking on the following missions:
-- **[Fortify your environment](m365bp-setup-overview.md)** (tasks your admin does); -- **[Train your team](m365bp-devices-overview.md)** (tasks that all staff members do); and -- **[Safeguard managed devices](m365bp-protect-devices.md)** (tasks your admin or security team does).
-Completing all the missions is the most effective way to thwart hackers, protect against ransomware, and help ensure your organizationΓÇÖs future is safeguarded with the best cybersecurity defenses. Let's get started.
-## Fortify your environment
+| Mission | Description |
+|||
+| **Fortify your environment** | These are tasks your admin completes. |
+| [**1. Sign in and set up your environment**](m365bp-setup-overview.md). | Complete the basic setup process for Microsoft 365 for your business or campaign. |
+| [**2. Bump up security protection**](m365bp-security-overview.md). | Set up critical front-line security measures to prevent cyberattacks. |
+| **Train your team** | These are tasks everyone does. |
+| [**3. Set up unmanaged (BYOD) devices**](m365bp-protect-pcs-macs.md). | Set up all the unmanaged ("bring your own device," also referred to as BYOD) devices so they are safely part of the ecosystem. |
+| [**4. Use email securely**](m365bp-protect-email-overview.md). | Know what to watch for, and take the necessary steps to protect yourself from attacks through email systems. |
+| [**5. Collaborate and share securely**](m365bp-collaborate-share-securely.md). | Learn how to share files with others and collaborate more securely with Microsoft Teams, SharePoint, and OneDrive. |
+| **Safeguard managed devices** | These are tasks your admin or security team does. |
+| [**6. Set up and secure managed devices**](m365bp-protect-devices.md). | Enroll and secure company devices so they monitored and protected from threats. |
-In these first missions, you sign in and set up your initial walls of defense, starting with account access protections.
+Completing all six missions is the most effective way to thwart hackers, protect against ransomware, and help ensure your organizationΓÇÖs future is safeguarded with the best cybersecurity defenses. Let's get started!
-1. [**Set up your environment**](m365bp-setup-overview.md). Complete the basis setup process for Microsoft 365 for your company.
-
-2. [**Bump up cybersecurity protections**](m365bp-security-overview.md). Set up critical front-line security measures to prevent cyberattacks.
-
-[:::image type="content" source="medi)
-
-## Train your team
-
-We've included a set of missions here with some objectives that need to be completed by your team (all employees). You have to make sure the team's devices are protected, and that your team is trained to use email and file sharing safely, and able to recognize and report threats.
-
-1. [**Set up BYOD devices**](m365bp-protect-pcs-macs.md). In this mission, you set up all the unmanaged (BYOD) devices so they are safely part of the ecosystem.
-
-2. [**Protect email**](m365bp-protect-email-overview.md). Take the necessary steps to protect the email systems from attack.
-
-3. [**Collaborate and share securely**](m365bp-collaborate-share-securely.md). The objectives of this mission require you to set up secure file sharing for all members of the organization.
-
-[:::image type="content" source="medi)
-
-## Safeguard managed devices
-
-Managed devices are safer because they are monitored for threat detections. In this last critical mission, you onboard and enroll devices in Defender for Business, so they are secured and protected with the best tools available.
--- [**Set up and secure managed devices**](m365bp-protect-devices.md). Take the steps to secure those devices so they are monitored and protected by the organization.-
-[:::image type="content" source="medi)
+> [!TIP]
+> If you're new to cybersecurity, or if a term is unclear, see the [glossary of terms](m365bp-glossary.yml).
## Cybersecurity playbook
-The guidance in these missions is based upon the zero trust methodology and helps your business achieve the goals described in the Harvard Kennedy School [Cybersecurity Campaign Playbook](https://go.microsoft.com/fwlink/p/?linkid=2015598). A summary is available for you to download.
-
-Click (or tap) the infographic to see a larger version, or [Download a copy of the Cybersecurity playbook poster](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)!
+The guidance in these missions is based upon the zero trust methodology and helps your business achieve the goals described in the Harvard Kennedy School [Cybersecurity Campaign Playbook](https://go.microsoft.com/fwlink/p/?linkid=2015598). A summary is available for you to download ([Get the PDF here](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)).
-
-[Get the PDF](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf).
-
-## Learn more about how Microsoft 365 Business Premium helps your business
-
-Microsoft 365 Business Premium is a comprehensive security and collaboration solution for small and medium businesses. [Learn more about the benefits of Microsoft 365 Business Premium](m365bp-secure-users.md).
+[:::image type="content" source="media/m365bp-cyber-security-playbook.png" alt-text="Cybersecurity playbook. Download this guide.":::](https://download.microsoft.com/download/9/c/1/9c167271-8209-492e-acc2-38a39d1834c2/m365bp-cybersecurity-playbook.pdf)
## Next steps
-Now, let's [fortify your environment against cyberattackers](m365bp-setup-overview.md)!
+Proceed to [Fortify your environment](m365bp-setup-overview.md).
+
-> [!NOTE]
-> If a term or directive is unclear, see the [glossary of terms](m365bp-glossary.yml).
business-premium M365 Campaigns Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365-campaigns-setup.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
description: "Setup overview for Microsoft 365 Business for campaigns or other b
# Setup for Microsoft 365 Business for Campaigns
-Now that you have [subscribed to Microsoft 365 for Campaigns](get-microsoft-365-campaigns.md), your next step is to get everything set up.
+After you have [subscribed to Microsoft 365 for Campaigns](get-microsoft-365-campaigns.md), your next step is to get everything set up.
## Before you begin
Make sure that you meet the following requirements before you begin your setup p
| Subscription | Microsoft 365 Business Premium or Microsoft 365 for Campaigns <br/><br/> To start a trial or purchase your subscription, see the following articles: <br/>- [Get Microsoft 365 Business Premium](get-microsoft-365-business-premium.md)<br/>- [Get Microsoft 365 for Campaigns](get-microsoft-365-campaigns.md) | | Permissions | To complete the initial setup process, you must be a Global Admin. [Learn more about admin roles](../admin/add-users/about-admin-roles.md). | | Browser requirements | Microsoft Edge, Safari, Chrome or Firefox. [Learn more about browser requirements](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources#coreui-heading-uyetipy). |
-| Operating system | **Windows**: Windows 11, Windows 10, Windows 8.1, Windows Server 2019 or later, or Windows Server 2016<br/><br/>**Mac**: One of the three most recent versions of macOS |
+| Operating systems (client) | **Windows**: Windows 11, Windows 10, Windows 8.1<br/>**macOS**: One of the three most recent versions of macOS
+| Operating systems (servers) | Windows Server or Linux Server <br/>- Requires Microsoft Defender for Business servers (currently in preview)<br/>- See [How to get Microsoft Defender for Business servers (preview)](../security/defender-business/get-defender-business-servers.md). |
> [!TIP] > For more detailed information about Microsoft 365, Office, and system requirements, see [Microsoft 365 and Office Resources](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources).
To help your staff learn about steps to protect your campaign from cyber threats
## Next objective
-Once you've achieved these objectives, proceed to [bump up security](m365bp-security-overview.md).
+Proceed to [bump up security](m365bp-security-overview.md).
business-premium M365bp Collaborate Share Securely https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-collaborate-share-securely.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
description: "An overview on how to collaborate and share files and communicate
# Collaborate and share securely
-Now that you're protected by the Microsoft 365 Business Premium Office apps, your next mission is to set up protections for file sharing and communication. The best way to do this is with Microsoft Teams so that all your files and communications are in a protected environment and not being stored in unsafe ways outside of it. Your organization depends on protecting your data and information, which means that you want to protect your files by all means possible.
-Your objectives are as follows:
+Now that you're protected by the Microsoft 365 Business Premium Office apps, your next mission is to set up secure file sharing and communication. The best way to do collaborate and share securely is to use Microsoft Teams. With Microsoft Teams, all your files and communications are in a protected environment and aren't being stored in unsafe ways outside of it. Your organization depends on protecting your data and information, which means that you want to protect your files by all means possible.
+
+Your objectives are to:
- [Create Teams for collaboration](create-teams-for-collaboration.md). - [Set up meetings](set-up-meetings.md). - [Share files and videos](share-files-and-videos.md). - [Create a communication site](create-communications-site.md).
-After you complete these objectives, start your final mission: [Safeguard managed devices](m365bp-protect-devices.md).
-
+Once you've achieved these objectives, proceed to [Set up and secure managed devices](m365bp-protect-devices.md).
business-premium M365bp Conditional Access https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-conditional-access.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
To learn more about Conditional Access, see [What is Conditional Access?](/azure
## Next objective
-Set up ways to [protect against malware and other threats](m365bp-increase-protection.md).
+[Protect your administrator accounts in Microsoft 365 Business Premium](m365bp-protect-admin-accounts.md)
business-premium M365bp Devices Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-devices-overview.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
description: "An overview of how to set up all the bring-your-own devices (BYOD)
# Set up unmanaged (BYOD) devices
-Every device is a possible attack avenue into your network and must be monitored and managed properly, even those devices that are personally owned but used for work. In this critical mission, you set up protection for all the bring-your-own devices (BYODs), which are those that are most risky to your organization due to being unmanaged. It's important to help everyone get their devices protected as soon as possible.
-Your objectives are as follows:
+Every device is a possible attack avenue into your network and must be monitored and managed properly, even those devices that are personally owned but used for work. In this critical mission, train everyone to protect their bring-your-own devices (BYODs). Unmanaged devices can pose a risk to your organization. It's important to help everyone get their devices protected as soon as possible.
+
+Your objectives are to:
- [Get everyone to set up MFA](m365bp-multifactor-authentication.md). - [Get Office apps installed on devices](m365bp-install-office-apps.md). - [Protected unmanaged Windows and Mac devices](m365bp-protect-pcs-macs.md).
-Once you've accomplished these objectives, proceed with your [next mission](m365bp-protect-email-overview.md).
-
+Once you've achieved these objectives, proceed to [Use email securely](m365bp-protect-email-overview.md).
business-premium M365bp Increase Protection https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-increase-protection.md
In this objective, you increase your threat protection with Microsoft 365 Busine
- [Custom security policies](#create-custom-security-policies) that you can define to suit your business needs. - [How to adjust your sharing settings for SharePoint and OneDrive files and folders](#set-sharing-settings-for-sharepoint-and-onedrive-files-and-folders). - [Alert policies](#review-your-alert-policies) that monitor specific files and how they are used.-- [Next steps](#next-steps) (such as securing unmanaged devices)
+- [Next objective](#next-objective) (securing unmanaged devices)
## Review and apply preset security policies
You can prevent people in your organization from sharing their calendars. You ca
If your users are allowed to share their calendars, see [these instructions](https://support.office.com/article/7ecef8ae-139c-40d9-bae2-a23977ee58d5) for how to share from Outlook on the web.
-## Next steps
+## Next objective
-Okay, now let's [**set up those unmanaged BYOD devices**](m365bp-devices-overview.md).
+Okay, now let's [**set up those unmanaged (BYOD) devices**](m365bp-devices-overview.md).
business-premium M365bp Multifactor Authentication https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-multifactor-authentication.md
See more at [Set up multi-factor authentication in Microsoft 365 Business Premiu
## Use the Outlook app on your devices
-After an admin has required the front-line users to use MFA then the authenticator app serves as a second form of authentication. We recommend you have them install and use the Outlook app to access their Microsoft 365 email.
+When MFA is enforced, the authenticator app serves as a second form of authentication. We also recommend that everyone install and use the Outlook app to access their Microsoft 365 email on their devices. See [Download Microsoft Outlook for iOS and Android](https://www.microsoft.com/microsoft-365/outlook-mobile-for-android-and-ios).
## Next objective
-For your next objective, follow the guidance to [install Office applications](m365bp-install-office-apps.md).
+Proceed to [install Office applications](m365bp-install-office-apps.md).
business-premium M365bp Protect Admin Accounts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-admin-accounts.md
To protect all your admin accounts, make sure to follow these recommendations:
## Next objective
-Take the steps to [turn on security defaults](m365bp-conditional-access.md).
-
+[Increase threat protection for Microsoft 365 Business Premium](m365bp-increase-protection.md)
business-premium M365bp Protect Devices https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-devices.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
description: "An overview for how to set up and secure managed devices from secu
# Set up and secure managed devices
-Welcome to your final critical mission. Here, you'll onboard and implement protection for all the managed devices in your organization. You'll want to onboard your devices to Defender for Business to help ensure your antivirus and anti-malware protection is always up to date, and set policies that help lock down your systems. You can also make sure Windows devices are protected and ready for Office deployment. When you're done, you can rest assured, knowing you've done what you can to protect your organization when these objectives have been achieved!
-Your mission objectives:
+Welcome to your final critical mission. Here, you'll onboard and implement protection for all the managed devices in your organization. [Onboard your devices to Defender for Business](../security/defender-business/mdb-onboard-devices.md) to help ensure those devices are protected from ransomware, malware, phishing, and other threats. You can also make sure Windows devices are protected and ready for Office deployment. When you're done, you can rest assured, knowing you've done what you can to protect your organization when these objectives have been achieved!
+
+Your objectives are to:
- [Set up managed devices](m365bp-managed-devices-setup.md) - [Onboard enrolled devices and apply policies](m365bp-onboard-devices-mdb.md)
Your mission objectives:
Once these objectives have been achieved, your overall mission to protect your organization against cyberattacks and other cybersecurity threats is a success! Now, make sure to set up your response teams to deal with any situation that may arise while defending the integrity of the system. See your next steps! - ## Next steps
-1. [Set up a security operations process](m365bp-security-incident-quick-start.md).
-
-2. [Learn about security incident management](m365bp-security-incident-management.md).
-
-3. [Learn how to maintain your environment](m365bp-maintain-environment.md).
+- [Set up a security operations process](m365bp-security-incident-quick-start.md).
+- [Learn about security incident management](m365bp-security-incident-management.md).
+- [Learn how to maintain your environment](m365bp-maintain-environment.md).
business-premium M365bp Protect Email Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-protect-email-overview.md
Title: "Protect email Overview"
+ Title: "Use email securely"
f1.keywords: - NOCSH
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
search.appverid: - BCS160 - MET150
-description: "An overview on how to train your team to protect your email from malware, phishing, and other malicious cyberattacks, using the cybersecurity tools included with Microsoft 365 Business Premium."
+description: "Know what to watch for in email. Train your team to guard against malware, phishing, and other malicious cyberattacks, using the cybersecurity tools included with Microsoft 365 Business Premium."
# Protect all email + As you probably already know, email can contain malicious attacks cloaked as harmless communications. Additionally, email systems are especially vulnerable, because email is handled by everyone in the organization, and safety relies on humans making consistently good decisions with those communications. In this mission, learn how members of the organizations can all help to keep the system safe from attackers.
-The mission objectives are to:
+Your objectives are to:
- [Protect against phishing and other attacks](m365bp-avoid-phishing-and-attacks.md). - [Set up encrypted email](send-encrypted-email.md).
-Accomplish these objectives before you move on to the [next mission](m365bp-collaborate-share-securely.md).
-
+Once you've achieved these objectives, proceed to [Collaborate and share securely](m365bp-collaborate-share-securely.md).
business-premium M365bp Security Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-security-overview.md
description: "Security overview for Microsoft 365 Business Premium which provide
# Bump up security
-In this mission, you set up your security defenses. Admin account access is a high-value target for the enemy hackers, and protecting those accounts is critical because the access and control they provide can impact the entire system. You also need to protect your email content and devices.
-To be successful in this mission, you'll set up the different admin roles and specific levels of security for them. You'll also enforce multifactor authentication (MFA) requirements, and set up your security defaults. Stay vigilant - the safety and reliability of the system relies upon you.
+In this mission, you boost your security defenses. You begin by enforcing multifactor authentication (MFA) requirements by using either security defaults or Conditional Access. You'll set up the different admin roles and specific levels of security for them. Admin account access is a high-value target for the enemy hackers, and protecting those accounts is critical because the access and control they provide can impact the entire system. And, you'll protect your email content and devices.
-This mission has the following objectives:
+Stay vigilant - the safety and reliability of the system relies upon you.
+Your objectives are to:
+
+- [Turn on security defaults](m365bp-conditional-access.md) (MFA).
- [Protect your admin accounts](m365bp-protect-admin-accounts.md).-- [Turn on security defaults](m365bp-conditional-access.md). - [Protect against malware and other threats](m365bp-increase-protection.md).
-Achieve these objectives and then start your [next mission](m365bp-devices-overview.md).
-
+Once you've achieved these objectives, proceed to [Set up unmanaged (BYOD) devices](m365bp-devices-overview.md).
business-premium M365bp Setup Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-setup-overview.md
audience: Admin
ms.localizationpriority: high Previously updated : 07/19/2022 Last updated : 08/05/2022 - M365-Campaigns - m365solution-smb
search.appverid: - BCS160 - MET150
-description: "Setup overview for small to medium-sized businesses and campaigns. How to set up cybersecurity and prevent cyberattacks."
+description: "Start the setup process of Microsoft 365 Business Premium or Microsoft 365 for Campaigns."
-# Fortify your organization with Microsoft 365 Business Premium
+# Fortify your environment with Microsoft 365 Business Premium
-Now that you have Microsoft 365 Business Premium, your first critical mission is to complete your initial setup process right away. Let's get you going.
+Now that you have Microsoft 365 Business Premium, your first critical mission is to complete your initial setup process right away. Let's get you going!
+ Your objective is to: - [Set up your Microsoft 365 Business Premium environment](m365bp-setup.md); or - [Set up Microsoft 365 Business for Campaigns](m365-campaigns-setup.md) if this is your subscription.
-Once you've achieved this objective, go [increase security protections](m365bp-security-overview.md).
-
+Once you've achieved this objective, proceed to [bump up security protection](m365bp-security-overview.md).
business-premium M365bp Setup https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/business-premium/m365bp-setup.md
audience: Admin
ms.localizationpriority: high Previously updated : 08/01/2022 Last updated : 08/05/2022 f1.keywords: NOCSH
Make sure that you meet the following requirements before you begin your setup p
| Subscription | Microsoft 365 Business Premium or Microsoft 365 for Campaigns <br/><br/> To start a trial or purchase your subscription, see the following articles: <br/>- [Get Microsoft 365 Business Premium](get-microsoft-365-business-premium.md)<br/>- [Get Microsoft 365 for Campaigns](get-microsoft-365-campaigns.md) | | Permissions | To complete the initial setup process, you must be a Global Admin. [Learn more about admin roles](../admin/add-users/about-admin-roles.md). | | Browser requirements | Microsoft Edge, Safari, Chrome or Firefox. [Learn more about browser requirements](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources#coreui-heading-uyetipy). |
-| Operating system | **Windows**: Windows 11, Windows 10, Windows 8.1<br/>**macOS**: One of the three most recent versions of macOS <br/>Currently, Microsoft 365 Business Premium and the standalone version of Microsoft Defender for Business do not support servers. |
+| Operating systems (client) | **Windows**: Windows 11, Windows 10, Windows 8.1<br/>**macOS**: One of the three most recent versions of macOS
+| Operating systems (servers) | Windows Server or Linux Server <br/>- Requires Microsoft Defender for Business servers (currently in preview)<br/>- See [How to get Microsoft Defender for Business servers (preview)](../security/defender-business/get-defender-business-servers.md). |
> [!NOTE] > For more detailed information about Microsoft 365, Office, and system requirements, see [Microsoft 365 and Office Resources](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources). ## Guided setup process
-Microsoft 365 Business Premium includes a guided process. The following video shows the guided setup process for Microsoft 365 Business Standard, which also applies to Microsoft 365 Business Premium. As soon as you've completed the guided setup process, make sure to proceed to [bump up security](m365bp-security-overview.md).<br/><br/>
+Microsoft 365 Business Premium includes a guided process. The following video shows the guided setup process for Microsoft 365 Business Standard, which also applies to Microsoft 365 Business Premium. <br/><br/>
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE471FJ]
+As soon as you've completed the guided setup process, make sure to proceed to [bump up security](m365bp-security-overview.md).
+ > [!TIP] > - After you have added users, give them a link to the [Employee quick setup guide](../admin/setup/employee-quick-setup.md). The guide walks them through signing in, getting Office apps, and saving, copying, and sharing files.
-> - Make sure to proceed to [Bump up security](m365bp-security-overview.md).
+ ## Work with a Microsoft partner
If you'd prefer to have a Microsoft partner help you get and set up Microsoft 36
- [Set up self-service passwords](../admin/add-users/let-users-reset-passwords.md) - [Set up self-service group management](/azure/active-directory/enterprise-users/groups-self-service-management)
-### Next objective
+## Next objective
-Once you've achieved these objectives, proceed to [Bump up security](m365bp-security-overview.md).
+Proceed to [Bump up security](m365bp-security-overview.md).
compliance Alert Policies https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/alert-policies.md
The table also indicates the Office 365 Enterprise and Office 365 US Government
|**Admin Submission result completed**|Generates an alert when an [Admin Submission](../security/office-365-security/admin-submission.md) completes the rescan of the submitted entity. An alert will be triggered every time a rescan result is rendered from an Admin Submission. These alerts are meant to remind you to [review the results of previous submissions](https://compliance.microsoft.com/reportsubmission), submit user reported messages to get the latest policy check and rescan verdicts, and help you determine if the filtering policies in your organization are having the intended impact. This policy has a **Informational** severity setting.|Threat management|No|E1/F1, E3/F3, or E5| |**Admin triggered manual investigation of email**|Generates an alert when an admin triggers the manual investigation of an email from Threat Explorer. For more information, see [Example: A security administrator triggers an investigation from Threat Explorer](../security/office-365-security/automated-investigation-response-office.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer). This alert notifies your organization that the investigation was started. The alert provides information about who triggered it and includes a link to the investigation. This policy has an **Informational** severity setting.|Threat management|Yes|E5/G5 or Microsoft Defender for Office 365 P2 add-on subscription| |**Admin triggered user compromise investigation**|Generates an alert when an admin triggers the manual user compromise investigation of either an email sender or recipient from Threat Explorer. For more information, see [Example: A security administrator triggers an investigation from Threat Explorer](../security/office-365-security/automated-investigation-response-office.md#example-a-security-administrator-triggers-an-investigation-from-threat-explorer), which shows the related manual triggering of an investigation on an email. This alert notifies your organization that the user compromise investigation was started. The alert provides information about who triggered it and includes a link to the investigation. This policy has a **Medium** severity setting.|Threat management|Yes|E5/G5 or Microsoft Defender for Office 365 P2 add-on subscription|
+|**Administrative action submitted by an Administrator**|Admins can take manual email actions on email entities using various surfaces. For example, Threat Explorer, advanced hunting or through custom detection. When the remediation starts, it generates an alert. This alert shows up in the alerts queue with the name **Administrative action submitted by an Administrator** to indicate that an admin took the action of remediating an entity. The alert contains details like the action type, supporting investigation link, time, etc. It's helpful to know whenever a sensitive action like remediation is performed on entities. This policy has an **Informational** severity setting.|Threat management|Yes|E5/ Microsoft Defender for Office 365 P2 add-on subscription|
|**Creation of forwarding/redirect rule**|Generates an alert when someone in your organization creates an inbox rule for their mailbox that forwards or redirects messages to another email account. This policy only tracks inbox rules that are created using Outlook on the web (formerly known as Outlook Web App) or Exchange Online PowerShell. This policy has a **Informational** severity setting. For more information about using inbox rules to forward and redirect email in Outlook on the web, see [Use rules in Outlook on the web to automatically forward messages to another account](https://support.office.com/article/1433e3a0-7fb0-4999-b536-50e05cb67fed).|Threat management|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**eDiscovery search started or exported**|Generates an alert when someone uses the Content search tool in the Microsoft Purview portal. An alert is triggered when the following content search activities are performed: <br><br> <li> A content search is started <li> The results of a content search are exported <li> A content search report is exported <br><br> Alerts are also triggered when the previous content search activities are performed in association with an eDiscovery case. This policy has a **Informational** severity setting. For more information about content search activities, see [Search for eDiscovery activities in the audit log](search-for-ediscovery-activities-in-the-audit-log.md#ediscovery-activities).|Threat management|No|E1/F1/G1, E3/F3/G3, or E5/G5| |**Elevation of Exchange admin privilege**|Generates an alert when someone is assigned administrative permissions in your Exchange Online organization. For example, when a user is added to the Organization Management role group in Exchange Online. This policy has a **Low** severity setting.|Permissions|No|E1/F1/G1, E3/F3/G3, or E5/G5|
compliance Ome Version Comparison https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/ome-version-comparison.md
Users can manually send mail that is encrypted with Microsoft Purview Message En
## Migrate from legacy OME to Microsoft Purview Message Encryption
-Even though both versions can coexist, we highly recommend that you edit your old mail flow rules that use the rule action **Apply the previous version of OME** to use Microsoft Purview Message Encryption. Update these rules to use the mail flow rule action **Apply Office 365 Message Encryption and rights protection**. For instructions, see [Define mail flow rules to encrypt email messages](define-mail-flow-rules-to-encrypt-email.md).
+Even though both versions can coexist, we highly recommend that you edit your old mail flow rules that use the rule action **Apply the previous version of OME** to use Microsoft Purview Message Encryption. Update these rules to use the mail flow rule action **Apply Office 365 Message Encryption and rights protection**, select "Encrypt" in the RMS template list. For instructions, see [Define mail flow rules to encrypt email messages](define-mail-flow-rules-to-encrypt-email.md).
## Get started with OME
compliance Sensitivity Labels Office Apps https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md
The numbers listed are the minimum Office application versions required for each
|[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using sensitive info types | Current Channel: 2009+ <br /><br> Monthly Enterprise Channel: 2009+ <br /><br> Semi-Annual Enterprise Channel: 2102+ | 16.44+ <sup>\*</sup> | Under review | Under review | Yes | |[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.49+ | Under review | Under review | Yes | |[Different settings for default label and mandatory labeling](#outlook-specific-options-for-default-label-and-mandatory-labeling) | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.43+ <sup>\*</sup> | 4.2111+ | 4.2111+ | Yes |
-|[PDF support](#pdf-support) | Under review| Under review | Under review | Under review | Under review |
+|[PDF support](#pdf-support) | Preview: Rolling out to [Beta Channel](https://office.com/insider)| Under review | Under review | Under review | Under review |
|[Apply S/MIME protection](#configure-a-label-to-apply-smime-protection-in-outlook) | Under review | Rolling out: 16.61+ <sup>\*</sup> | Rolling out: 4.2226+ | Rolling out: 4.2203+ | Under review | **Footnotes:**
This action is logged with the **Renamed file** audit event from the [File and p
When the PDF is created, it inherits the label with any content markings and encryption. Encrypted PDFs can be opened with Microsoft Edge on Windows or Mac. For more information, and alternative readers, see [Which PDF readers are supported for protected PDFs?](/azure/information-protection/rms-client/protected-pdf-readers#viewing-protected-pdfs-in-microsoft-edge-on-windows-or-mac)
+Outlook doesn't currently support PDF attachments inheriting encryption from a labeled message. However, Outlook now does support warning or blocking users from printing to PDF, as described next.
+ PDF scenarios not supported: - Print to PDF
- If users select this option, they are warned that the document will lose the protection of the label, and encryption (if applied), and must confirm to continue. If your sensitivity label policy requires justification to remove a label or lower its classification, they see this prompt.
+ If users select this option, they are warned that the document or email will lose the protection of the label, and encryption (if applied), and must confirm to continue. If your sensitivity label policy requires justification to remove a label or lower its classification, they see this prompt.
Because this option removes the sensitivity label, this option won't be available to users if you're using mandatory labeling. This configuration refers to the sensitivity label policy setting that requires users to apply a label to their emails and documents.
compliance Set Up Compliance Boundaries https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-compliance-boundaries.md
Here's a description of each parameter in the command:
- `FilterName`: Specifies the name of the filter. Use a name that describes or identifies the agency that the filter is used in. -- `Users`: Specifies the users or groups who get this filter applied to the search actions they perform. For compliance boundaries, this parameter specifies the role groups (that you created in Step 3) in the agency that you're creating the filter for. Note this is a multi-value parameter so you can include one or more role groups, separated by commas.
+- `Users`: Specifies the users or groups who get this filter applied to the search actions they perform. For compliance boundaries, this parameter specifies the role groups (that you created in Step 2) in the agency that you're creating the filter for. Note this is a multi-value parameter so you can include one or more role groups, separated by commas.
- `Filters`: Specifies the search criteria for the filter. For compliance boundaries, you define the following filters. Each one applies to different content locations.
lti Teams Classes With Blackboard https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/teams-classes-with-blackboard.md
f1.keywords:
- CSH ms.localizationpriority: medium-
-description: "Use Microsoft Teams classes with Blackboard Learn Ultra"
+description: Use Microsoft Teams classes with Blackboard Learn Ultra.
# Use Microsoft Teams classes with Blackboard Learn Ultra
lti Teams Meetings With Blackboard Learn https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/lti/teams-meetings-with-blackboard-learn.md
+
+ Title: Use Microsoft Teams meetings with Blackboard Learn
++++
+audience: admin
+++
+- M365-modern-desktop
+- m365initiative-edu
+ms.localizationpriority: medium
+description: Learn how to set up Microsoft Teams meetings with Blackboard Learn.
++
+# Use Microsoft Teams meetings with Blackboard Learn
+
+This guide provides the IT admin steps for registering the Teams Meetings LTI app on Blackboard Learn.
+
+## Add the Blackboard Learn Teams Meetings LTI 1.3 Tool
+
+1. From the Blackboard Administrator Panel, select **LTI Tool Providers**.
+
+2. Select **Register LTI 1.3 Tool**.
+
+3. In the *Client ID* field, type or copy and paste this ID: `027328b7-c2e3-4c9e-aaa1-07802dae6c89`.
+
+4. Review the pre-populated settings and **Tool Status**, then select **Enabled**.
+
+5. In *Institution Policies*, select **Role in Course**, **Name**, and **Email Address**.
+
+6. Select **Yes** for both **Allow grade service access** and **Allow Membership Service Access**.
+
+Educators and students can now access the tool in their Blackboard courses in both *Blackboard Learn Ultra* and *Blackboard Learn Original Experience*.
security Deploy Manage Report Microsoft Defender Antivirus https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/deploy-manage-report-microsoft-defender-antivirus.md
ms.mktglfcycl: manage
ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium Last updated : 08/05/2022
ms.technology: mde-+
+- M365-security-compliance
# Deploy, manage, and report on Microsoft Defender Antivirus -- **Applies to:** - [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
- Microsoft Defender Antivirus **Platforms**+ - Windows You can deploy, manage, and report on Microsoft Defender Antivirus in a number of ways.
You'll also see additional links for:
Tool|Deployment options (<a href="#fn2" id="ref2">2</a>)|Management options (network-wide configuration and policy or baseline deployment) ([3](#fn3))|Reporting options ||| Microsoft Intune|[Add endpoint protection settings in Intune](/intune/endpoint-protection-configure)|[Configure device restriction settings in Intune](/intune/device-restrictions-configure)| [Use the Intune console to manage devices](/intune/device-management)
-Microsoft Endpoint Manager ([1](#fn1))|Use the [Endpoint Protection point site system role][] and [enable Endpoint Protection with custom client settings][]|With [default and customized antimalware policies][] and [client management][]|With the default [Configuration Manager Monitoring workspace][] and [email alerts][]
-Group Policy and Active Directory (domain-joined)|Use a Group Policy Object to deploy configuration changes and ensure Microsoft Defender Antivirus is enabled.|Use Group Policy Objects (GPOs) to [Configure update options for Microsoft Defender Antivirus][] and [Configure Windows Defender features][]|Endpoint reporting is not available with Group Policy. You can generate a list of [Group Policies to determine if any settings or policies are not applied][]
-PowerShell|Deploy with Group Policy, Microsoft Endpoint Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference] and [Update-MpSignature] cmdlets available in the Defender module.|Use the appropriate [Get- cmdlets available in the Defender module][]
-Windows Management Instrumentation|Deploy with Group Policy, Microsoft Endpoint Configuration Manager, or manually on individual endpoints.|Use the [Set method of the MSFT_MpPreference class][] and the [Update method of the MSFT_MpSignature class][]|Use the [MSFT_MpComputerStatus][] class and the get method of associated classes in the [Windows Defender WMIv2 Provider][]
-Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#antimalware-deployment-scenarios). You can also [Install Endpoint protection in Microsoft Defender for Cloud*](/azure/defender-for-cloud/endpoint-protection-recommendations-technical)|Configure [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) or [use code samples](https://gallery.technet.microsoft.com/Antimalware-For-Azure-5ce70efe)|Use [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the [Possibly infected devices][] report and configure an SIEM tool to report on [Microsoft Defender Antivirus events][] and add that tool as an app in AAD.
+Microsoft Endpoint Manager ([1](#fn1))|Use the [Endpoint Protection point site system role](/mem/configmgr/protect/deploy-use/endpoint-protection-site-role) and [enable Endpoint Protection with custom client settings](/mem/configmgr/protect/deploy-use/endpoint-protection-configure-client).|With [default and customized antimalware policies](/microsoft-365/security/office-365-security/configure-anti-malware-policies) and client management.|With the default [Configuration Manager Monitoring workspace](/mem/configmgr/apps/deploy-use/monitor-applications-from-the-console) and email alerts.
+Group Policy and Active Directory (domain-joined)|Use a Group Policy Object to deploy configuration changes and ensure Microsoft Defender Antivirus is enabled.|Use Group Policy Objects (GPOs) to [configure update options for Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/manage-protection-update-schedule-microsoft-defender-antivirus) and [configure Windows Defender features](/microsoft-365/security/defender-endpoint/configure-microsoft-defender-antivirus-features).|Endpoint reporting is not available with Group Policy. You can generate a list of Group Policies to determine if any settings or policies are not applied.
+PowerShell|Deploy with Group Policy, Microsoft Endpoint Configuration Manager, or manually on individual endpoints.|Use the [Set-MpPreference] and [Update-MpSignature] cmdlets available in the Defender module.|Use the appropriate [Get- cmdlets available in the Defender module](/powershell/module/defender).
+Windows Management Instrumentation|Deploy with Group Policy, Microsoft Endpoint Configuration Manager, or manually on individual endpoints.|Use the [Set method of the MSFT_MpPreference class](/previous-versions/windows/desktop/defender/set-msft-mppreference) and the [Update method of the MSFT_MpSignature class](/previous-versions/windows/desktop/defender/update-msft-mpsignature).|Use the [MSFT_MpComputerStatus](/previous-versions/windows/desktop/defender/msft-mpcomputerstatus) class and the get method of associated classes in the [Windows Defender WMIv2 Provider](/windows/win32/wmisdk/wmi-providers).
+Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#antimalware-deployment-scenarios). You can also [Install Endpoint protection in Microsoft Defender for Cloud](/azure/defender-for-cloud/endpoint-protection-recommendations-technical).|Configure [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) or [use code samples](https://gallery.technet.microsoft.com/Antimalware-For-Azure-5ce70efe).|Use [Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets](/azure/security/azure-security-antimalware#enable-and-configure-antimalware-using-powershell-cmdlets) to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the Possibly infected devices report, and configure an SIEM tool to report on [Microsoft Defender Antivirus events][/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus] and add that tool as an app in AAD.
1. <span id="fn1" />The availability of some functions and features, especially related to cloud-delivered protection, differ between Microsoft Endpoint Manager (Current Branch) and System Center 2012 Configuration Manager. In this library, we've focused on Windows 10, Windows 11, Windows Server 2016, and Microsoft Endpoint Manager (Current Branch). See [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md) for a table that describes the major differences. [(Return to table)](#ref2)
security Configure Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/configure-microsoft-threat-experts.md
You can create rules to send email notifications for notification recipients. Fo
You'll start receiving Endpoint Attack Notifications from Microsoft Threat Experts in your email after you have configured your system to receive email notification.
-1. Select the link in the email to go to the corresponding alert context in the dashboard tagged with **Threat experts**.
+1. Select the link in the email to go to the corresponding alert context in the dashboard tagged with **Defender Experts**.
2. From the **Alerts** page, select the same alert topic as the one you received in the email, to view further details.
+### Filter to view just the Endpoint Attack Notifications
+
+You can filter your incidents and alerts if you want to only see the Defender Experts Notifications amongst the many alerts. To do so:
+
+1. On the navigation menu, go to **Incidents & alerts** > **Incidents** > select the ![Filter icon](../../media/mte/defenderexperts/filter.png) icon.
+2. Scroll down to the **Tags** field > select the **Defender Experts** check box.
+3. Select **Apply**.
+ ## Subscribe to Microsoft Threat Experts - Experts on Demand If you're already a Microsoft Defender for Endpoint customer, you can contact your Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand.
You can contact Microsoft Threat Experts from inside the Microsoft 365 Defender
> [!NOTE] > > - Alert inquiries related to your organization's customized threat intelligence data are not currently supported. Consult with your security operations or incident response team for details.
-> - You need to have the **Manage security settings in security center** permission in the Microsoft 365 Defender portal to submit an inquiry through the **Consult a threat expert** form.
+> - You need to have the **Manage security settings in security center** permission in the Microsoft 365 Defender portal to submit an inquiry through the **Ask Defender Experts** form.
1. Navigate to the portal page related to the information that you'd like to investigate: for example, **Device**, **Alert**, or **Incident**. Make sure that the portal page related to your inquiry is in view before you send an investigation request.
-2. From the top menu, select **? Consult a threat expert**.
-
- :::image type="content" source="../../media/mte/incidents-action-mte-highlighted.png" alt-text="The Microsoft Threat Experts Experts on Demand from the menu in the Microsoft 365 Defender portal" lightbox="../../media/mte/incidents-action-mte-highlighted.png":::
-
- A flyout screen will open.
-
- The header will indicate if you are on a trial subscription, or a full Microsoft Threat Experts - Experts on-Demand subscription.
-
- :::image type="content" source="../../media/mte/mte-trial.png" alt-text="The Microsoft Threat Experts Experts on Demand trial subscription screen in the Microsoft 365 Defender portal" lightbox="../../media/mte/mte-trial.png":::
-
- The **Investigation topic** field will already be populated with the link to the relevant page for your request.
+2. From the top menu, select **? Ask Defender Experts**. A flyout screen will open. The header will indicate if you are on a trial subscription, or a full Microsoft Threat Experts - Experts on Demand subscription. The **Investigation topic** field will already be populated with the link to the relevant page for your request.
3. In the next field, provide enough information to give the Microsoft Threat Experts enough context to start the investigation.
Watch this video for a quick overview of the Microsoft Services Hub.
### Microsoft Threat Experts' alert communications - Can your incident response team help us address the targeted attack notification that we got?-- We received this targeted attack notification from Microsoft Threat Experts. We don't have our own incident response team. What can we do now, and how can we contain the incident?
+- We received Endpoint Attack Notifications from Microsoft Threat Experts. We don't have our own incident response team. What can we do now, and how can we contain the incident?
- We received a targeted attack notification from Microsoft Threat Experts. What data can you provide to us that we can pass on to our incident response team? > [!NOTE]
The response from Microsoft Threat Experts will vary according to your inquiry.
If an expert requests more information or file samples, it's crucial to respond quickly to keep the investigation moving.
-## See also
+## To proactively hunt threats across endpoints, Office 365, cloud applications, and identity, refer to:
-- [Microsoft Threat Experts overview](microsoft-threat-experts.md)
+- [Microsoft Defender Experts for Hunting overview](defender-experts-for-hunting.md)
security Microsoft Threat Experts https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-threat-experts.md
Title: Microsoft Threat Experts in Microsoft 365 Defender overview description: Microsoft Threat Experts provides an extra layer of expertise to Microsoft 365 Defender.
-keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts
+keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts, endpoint attack notification, Endpoint Attack Notification
search.product: Windows 10 search.appverid: met150 ms.prod: m365-security
[!INCLUDE [Prerelease](../includes/prerelease.md)] Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notification) is a managed threat hunting service. Once you apply and are accepted, you'll receive endpoint attack notifications from Microsoft threat experts, so you won't miss critical threats to your environment. These notifications will help you protect your organization's endpoints, email, and identities.+ Microsoft Threat Experts ΓÇô Experts on Demand lets you get expert advice about threats your organization is facing. You can reach out for help on threats your organization is facing. It's available as a subscription service. ## Apply for Endpoint Attack Notifications
Contact your Microsoft representative to subscribe to Experts on Demand. See [C
## Receive endpoint attack notification
-The Endpoint Attack Notification capability provides proactive hunting for the most important threats to your network. Our threat experts hunt for human adversary intrusions, hands-on-keyboard attacks, and advanced attacks, such as cyberespionage. These notifications will show up as a new alert. The managed hunting service includes:
+The Endpoint Attack Notification capability provides proactive hunting for the most important threats to your network. Our Defender Experts hunt for human adversary intrusions, hands-on-keyboard attacks, and advanced attacks, such as cyberespionage. These notifications will show up as a new alert. The managed hunting service includes:
- Threat monitoring and analysis, reducing dwell time and the risk to your business - Hunter-trained artificial intelligence to discover and target both known attacks and emerging threats
The Endpoint Attack Notification capability provides proactive hunting for the m
## Collaborate with experts on demand
-You can also contact Microsoft threat experts from directly inside the Microsoft 365 security portal, for a swift and accurate threat response. Experts can provide insight to better understand the complex threats your organization may face. Consult an expert to:
+Select **Ask Defender Experts** directly inside the Microsoft 365 security portal. Experts can provide insight to better understand the complex threats your organization might face. Ask Defender Experts to:
- Gather additional information on alerts and incidents, including root causes and scope - Gain clarity into suspicious devices, alerts, or incidents and get next steps if faced with an advanced attacker - Determine risks and available protections related to threat actors, campaigns, or emerging attacker techniques
-The option to **Consult a threat expert** is available in several places throughout the portal:
+The option to **Ask Defender Experts** is available in several places throughout the portal:
- <i>**Device page actions menu**</i><BR> - <i>**Device inventory page flyout menu**</i><BR>
whiteboard Manage Data Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-organizations.md
Whiteboard content is stored in both Azure and OneDrive for Business. New whiteb
## Azure storage overview
-Whiteboard currently stores content securely in Azure. Data might be stored in different locations, depending on the country and when Whiteboard switched to storing new content in those locations. To check where new data is created, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
+Whiteboard currently stores content securely in Azure. Data might be stored in different locations, depending on the country and when Whiteboard switched to storing new content in those locations. To check where new data is created, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
Content in Azure doesn't support Data Loss Prevention (DLP), eDiscovery, retention policies, and similar features. Content can be managed using [Whiteboard PowerShell cmdlets](/powershell/module/whiteboard/) and over time, this content will need to be either migrated to OneDrive for Business or deleted.
We're changing how whiteboards are stored when a user's account is deleted in Az
As of **June 1, 2022**, the behavior of whiteboards on Azure has changed. Any whiteboards shared with other users will be deleted.
-If you want to retain a deleted userΓÇÖs whiteboards, *before* you delete the account, you can transfer ownership. You can transfer a single whiteboard or all of them to another user.
+If you want to retain a deleted userΓÇÖs whiteboards, *before* you delete the account, you can transfer ownership. You can transfer a single whiteboard or all of them to another user.
- Follow these instructions to [transfer all whiteboards](/powershell/module/whiteboard/invoke-transferallwhiteboards). - For more information about how to delete user accounts, see [Delete a user from your organization](/microsoft-365/admin/add-users/delete-a-user).
-Ensure that any deletion process or script handles this change. If you're fine with the whiteboards being deleted, then no action is required.
+Ensure that any deletion process or script handles this change. If you're fine with the whiteboards being deleted, then no action is required.
## OneDrive for Business storage overview
Any users who do not have OneDrive for Business provisioned will no longer be ab
An average whiteboard might be anywhere from 50 KB to 1 MB in size and located wherever your OneDrive for Business content resides. To check where data for your tenant is stored, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations). Then look at the location for OneDrive for Business.
-### Controls for OneDrive for Business storage
+### Controls for OneDrive for Business storage
You can manage Whiteboard data using existing OneDrive for Business controls. For more information, see [OneDrive guide for enterprises](/onedrive/plan-onedrive-enterprise).
Data controls planned for future releases:
[Manage sharing for Whiteboard](manage-sharing-organizations.md)
-[Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)
--
+[Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)
whiteboard Manage Sharing Gcc High https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-sharing-gcc-high.md
Title: Manage sharing for Microsoft Whiteboard in GCC High environments
-+ audience: admin -+ ms.prod: microsoft-365-enterprise search.appverid: MET150-+ ms.localizationpriority: medium description: Learn how to manage sharing for Microsoft Whiteboard in GCC High environments.- # Manage sharing for Microsoft Whiteboard in GCC High environments
->[!NOTE]
-> This guidance applies to US Government Community Cloud (GCC) High environments.
-
-The sharing experience differs based on the device and client being used.
+> [!NOTE]
+> This guidance applies to US Government Community Cloud (GCC) High environments. The sharing experience differs based on the device and client being used.
## Share in Teams meetings
-When you share a whiteboard in a Teams meeting, Whiteboard creates a sharing link thatΓÇÖs accessible by anyone within the organization and automatically shares the whiteboard with any in-tenant users in the meeting. Whiteboards are shared using company-shareable links, regardless of the default setting. Support for the default sharing link type is planned.
+When you share a whiteboard in a Teams meeting, Whiteboard creates a sharing link. This link is accessible by anyone within the organization. The whiteboard is also shared with any in-tenant users in the meeting. Whiteboards are shared using company-shareable links, regardless of the default setting. Support for the default sharing link type is planned.
-There's additional capability for temporary collaboration by most external and shared device accounts during a meeting. This allows users to temporarily view and collaborate on whiteboards when theyΓÇÖre shared in a Teams meeting, similar to PowerPoint Live sharing.
+There's more capability for temporary collaboration by most external and shared device accounts during a meeting. Users can temporarily view and collaborate on whiteboards when they're shared in a Teams meeting, similar to PowerPoint Live sharing.
->[!NOTE]
-> External sharing during a Teams meeting is not yet available, but will be added in a future release.
+In this case, Whiteboard provides temporary viewing and collaboration on the whiteboard during the Teams meeting only. A share link isn't created and Whiteboard doesn't grant access to the file.
+
+If you have external sharing enabled for OneDrive for Business, no further action is required.
+
+If you restrict external sharing for OneDrive for Business, you can keep it restricted, and just enable a new setting in order for external and shared device accounts to work. To do so, follow these steps:
+
+1. Ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-gcc-high.md).
+
+2. Using PowerShell, connect to your tenant and ensure the SharePoint Online module is updated by running the following command:
+
+ ```powershell
+ Update-Module -Name Microsoft.Online.SharePoint.PowerShell
+ ```
+
+3. Then run the following **Set-SPOTenant** command:
+
+ ```powershell
+ Set-SPOTenant -AllowAnonymousMeetingParticipantsToAccessWhiteboards On
+ ```
+
+This setting applies only to whiteboards and replaces the previously shared settings: **OneDriveLoopSharingCapability** and **CoreLoopSharingCapability**. Those settings are no longer applicable and can be disregarded.
+
+> [!NOTE]
+> This applies only to guests and federated users. It does not apply to anonymous meeting users at this time.
+
+These changes should take approximately 60 minutes to apply across your tenancy.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Start the whiteboard from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Not yet available |In-tenant users: Can create, view, and collaborate<br><br>External users: Not yet available<br><br>Shared device accounts: Not yet available |
-|Start the whiteboard from a Surface Hub or Microsoft Teams Rooms |Not yet available | | |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Start the whiteboard from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Enabled|In-tenant users: Can create, view, and collaborate<br><br>External users: Can view and collaborate during the meeting only (the button to share a whiteboard won't appear for external users)<br><br>Shared device accounts: Can view and collaborate during the meeting only|
+|Start the whiteboard from a Surface Hub or Microsoft Teams Rooms|Not yet available|||
## Add as a tab in Teams channels and chats
-When you add a whiteboard as a tab in a Teams channel or chat, Whiteboard will create a sharing link thatΓÇÖs accessible by anyone in the organization.
+When you add a whiteboard as a tab in a Teams channel or chat, Whiteboard will create a sharing link that's accessible by anyone in the organization.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Add the whiteboard to a channel or chat from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Not applicable |In-tenant users: Can initiate, view, and collaborate<br><br>External users: Not supported |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Add the whiteboard to a channel or chat from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Not applicable|In-tenant users: Can initiate, view, and collaborate<br><br>External users: Not supported|
## Create and share in Whiteboard native clients
-When you share a whiteboard from the web, desktop, or mobile clients, you can choose specific people. You can also create a sharing link thatΓÇÖs accessible by anyone in the organization.
+When you share a whiteboard from the web, desktop, or mobile clients, you can choose specific people. You can also create a sharing link that's accessible by anyone in the organization.
>[!NOTE] > External sharing during a Teams meeting is not yet available, but will be added in a future release.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Create the whiteboard from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Not applicable |In-tenant users: Can share within their organization<br><br>External users: Sharing with external users isn't supported at this time |
-|Create the whiteboard from a Surface Hub |Storage: Local<br><br>Owner: None |Not applicable |In-tenant users (coming soon): User will be able to sign in to save and share the board<br><br>External users: Sharing with external users isn't supported at this time |
-|Create the whiteboard from Microsoft Teams Rooms |Not yet available | | |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Create the whiteboard from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Not applicable|In-tenant users: Can share within their organization<br><br>External users: Sharing with external users isn't supported at this time|
+|Create the whiteboard from a Surface Hub|Storage: Local<br><br>Owner: None|Not applicable|In-tenant users (coming soon): User will be able to sign in to save and share the board<br><br>External users: Sharing with external users isn't supported at this time|
+|Create the whiteboard from Microsoft Teams Rooms|Not yet available|||
## See also
whiteboard Manage Sharing Organizations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-sharing-organizations.md
Title: Manage sharing for Microsoft Whiteboard
-+ audience: admin -+ ms.prod: microsoft-365-enterprise search.appverid: MET150-+ ms.localizationpriority: medium description: Learn how to manage sharing for Microsoft Whiteboard.- # Manage sharing for Microsoft Whiteboard
-The sharing experience differs based on whether youΓÇÖre in a Teams meeting, if you're using a shared device, or what tenant-level sharing settings are enabled. The following scenarios apply only to new whiteboards created after Whiteboard switches to using OneDrive for Business storage. There's no change to previously created boards still stored in Azure.
+The sharing experience differs based on whether you're in a Teams meeting, if you're using a shared device, or what tenant-level sharing settings are enabled. The following scenarios apply only to new whiteboards created after Whiteboard switches to using OneDrive for Business storage. There's no change to previously created boards still stored in Azure.
## Share in Teams meetings
-When you share a whiteboard in a Teams meeting, Whiteboard creates a sharing link thatΓÇÖs accessible by anyone within the organization. Also, whiteboards are shared automatically with any in-tenant users in the meeting. Whiteboards are shared using company-shareable links, regardless of the default setting. Support for the default sharing link type is planned.
+When you share a whiteboard in a Teams meeting, Whiteboard creates a sharing link. This link is accessible by anyone within the organization. The whiteboard is also shared with any in-tenant users in the meeting. Whiteboards are shared using company-shareable links, regardless of the default setting. Support for the default sharing link type is planned.
-ThereΓÇÖs an additional capability for temporary collaboration by external and shared device accounts during a Teams meeting. Users can temporarily view and collaborate on whiteboards that are shared in a meeting, in a similar way to PowerPoint Live sharing.
+There's more capability for temporary collaboration by external and shared device accounts during a Teams meeting. Users can temporarily view and collaborate on whiteboards that are shared in a meeting, in a similar way to PowerPoint Live sharing.
->[!NOTE]
-> This isn't a share link and doesn't grant access to the file. It provides temporary viewing and collaboration on the whiteboard for the duration of the Teams meeting only.
+In this case, Whiteboard provides temporary viewing and collaboration on the whiteboard during the Teams meeting only. A share link isn't created and Whiteboard doesn't grant access to the file.
If you have external sharing enabled for OneDrive for Business, no further action is required.
-If you restrict external sharing for OneDrive for Business, you can keep it restricted and just enable a new setting in order for external and shared device accounts to work. To do so, follow these steps:
+If you restrict external sharing for OneDrive for Business, you can keep it restricted, and just enable a new setting in order for external and shared device accounts to work. To do so, follow these steps:
+
+1. Ensure that Whiteboard is enabled for your organization. For more information, see [Manage access to Whiteboard](manage-whiteboard-access-organizations.md).
+
+2. Using PowerShell, connect to your tenant and ensure the SharePoint Online module is updated by running the following command:
+
+ ```powershell
+ Update-Module -Name Microsoft.Online.SharePoint.PowerShell
+ ```
-1. Using PowerShell, connect to your tenant and ensure the SharePoint Online module is updated by running the following command:
+3. Then run the following **Set-SPOTenant** command:
- <pre><code class="lang-powershell">Update-Module -Name Microsoft.Online.SharePoint.PowerShell</code></pre>
-
-2. Then run the following <code>Set-SPOTenant</code> cmdlet:
+ ```powershell
+ Set-SPOTenant -AllowAnonymousMeetingParticipantsToAccessWhiteboards On
+ ```
- <pre><code class="lang-powershell">Set-SPOTenant -AllowAnonymousMeetingParticipantsToAccessWhiteboards On</code></pre>
+4. Ensure that the Teams meeting setting **Anonymous users can interact with apps in meetings** is enabled. If you've disabled it, any anonymous users (as opposed to guests or federated users) won't have access to the whiteboard during the meeting.
-This setting applies only to whiteboards and replaces the previously shared settings, **OneDriveLoopSharingCapability** and **CoreLoopSharingCapability**. Those settings are no longer applicable and can be disregarded.
+This setting applies only to whiteboards and replaces the previously shared settings: **OneDriveLoopSharingCapability** and **CoreLoopSharingCapability**. Those settings are no longer applicable and can be disregarded.
->[!NOTE]
-> This applies only to guests and federated users. It does not apply to anonymous meeting users at this time.
+> [!NOTE]
+> By default, the Teams meeting setting **Anonymous users can interact with apps in meetings** is enabled. If you have disabled it, any anonymous users (as opposed to guests or federated users) won't have access to the whiteboard during the meeting.
-These changes should take approximately 60 minutes to apply across your tenancy.
+These changes should take approximately 60 minutes to apply across your tenancy.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Start the whiteboard from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Enabled |In-tenant users: Can create, view, and collaborate<br><br>External users: Can view and collaborate during the meeting only (the button to share a whiteboard won't appear for external users)<br><br>Shared device accounts: Can view and collaborate during the meeting only |
-|Start the whiteboard from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Disabled |In-tenant users: Can initiate, view, and collaborate<br><br>External users: Can't view or collaborate<br><br>Shared device accounts: Can't view or collaborate |
-|Start the whiteboard from a Surface Hub or Microsoft Teams Rooms |Storage: Azure (this will be moved to OneDrive for Business in the future)<br><br>Owner: Meeting participant |Not applicable |In-tenant users: Can initiate, view, and collaborate<br><br>External users: Can view and collaborate during the meeting only<br><br>Shared device accounts: Can view and collaborate during the meeting only |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Start the whiteboard from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Enabled|In-tenant users: Can create, view, and collaborate<br><br>External users: Can view and collaborate during the meeting only (the button to share a whiteboard won't appear for external users)<br><br>Shared device accounts: Can view and collaborate during the meeting only|
+|Start the whiteboard from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Disabled|In-tenant users: Can initiate, view, and collaborate<br><br>External users: Can't view or collaborate<br><br>Shared device accounts: Can't view or collaborate|
+|Start the whiteboard from a Surface Hub or Microsoft Teams Rooms|Storage: Azure (Whiteboard files will be moved to OneDrive for Business in the future)<br><br>Owner: Meeting participant|Not applicable|In-tenant users: Can initiate, view, and collaborate<br><br>External users: Can view and collaborate during the meeting only<br><br> Shared device accounts: Can view and collaborate during the meeting only|
## Add as a tab in Teams channels and chats
-When you add a whiteboard as a tab in a Teams channel or chat, Whiteboard will create a sharing link thatΓÇÖs accessible by anyone in the organization.
+When you add a whiteboard as a tab in a Teams channel or chat, Whiteboard will create a sharing link that's accessible by anyone in the organization.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Add the whiteboard to a channel or chat from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Not applicable (only applies to meetings) |In-tenant users: Can initiate, view, and collaborate<br><br>External users: Not supported<br><br>Teams guests: Can view and collaborate<br><br>Shared device accounts: Not applicable |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Add the whiteboard to a channel or chat from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Not applicable (only applies to meetings)|In-tenant users: Can initiate, view, and collaborate<br><br>External users: Not supported<br><br>Teams guests: Can view and collaborate<br><br>Shared device accounts: Not applicable|
## Create and share in Whiteboard native clients
-When you share whiteboards from the web, desktop, or mobile clients, you can choose specific people. You can also create a sharing link thatΓÇÖs accessible by anyone in the organization.
+When you share whiteboards from the web, desktop, or mobile clients, you can choose specific people. You can also create a sharing link that's accessible by anyone in the organization.
->[!NOTE]
-> External sharing during a Teams meeting isn't yet available, but will be added in a future release.
+> [!NOTE]
+> External sharing during a Teams meeting isn't yet available but will be added in a future release.
-|Scenario |Storage and ownership |Sharing settings |Sharing experience |
-|||||
-|Create the whiteboard from a desktop or mobile device |Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard |Not applicable (only applies to meetings) |In-tenant users: Can share within their organization<br><br>External users: Sharing with external users isn't supported at this time |
-|Create the whiteboard from a Surface Hub |Storage: Local<br><br>Owner: None (Unless user sign ins to save and share the board, which saves to OneDrive for Business. Easy share will be added back in the future. |Not applicable (only applies to meetings) |In-tenant users: User must sign in to save and share the board (Easy share will be added in the future)<br><br>External users: Sharing with external users isn't supported at this time outside of a Teams meeting |
-|Create the whiteboard from Microsoft Teams Rooms |Not yet supported |Not applicable (only applies to meetings) |Not yet supported |
+|Scenario|Storage and ownership|Sharing settings|Sharing experience|
+|||||
+|Create the whiteboard from a desktop or mobile device|Storage: OneDrive for Business<br><br>Owner: User who creates the whiteboard|Not applicable (only applies to meetings)|In-tenant users: Can share within their organization<br><br>External users: Sharing with external users isn't supported at this time|
+|Create the whiteboard from a Surface Hub|Storage: Local<br><br>Owner: None (Unless user sign ins to save and share the board, which saves to OneDrive for Business. Easy share will be added back in the future.|Not applicable (only applies to meetings)|In-tenant users: User must sign in to save and share the board (Easy share will be added in the future)<br><br>External users: Sharing with external users isn't supported at this time outside of a Teams meeting|
+|Create the whiteboard from Microsoft Teams Rooms|Not yet supported|Not applicable (only applies to meetings)|Not yet supported|
## See also
When you share whiteboards from the web, desktop, or mobile clients, you can cho
[Manage data for Whiteboard](manage-data-organizations.md)
-[Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)
+[Deploy Whiteboard on Windows](deploy-on-windows-organizations.md)