Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
README | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/README.md | ## Learn how to contribute -Anyone who is interested can contribute to the topics. When you contribute, your work will go directly into the content set after being merged. It will then show up on docs.microsoft.com and you will be listed as a contributor at: <https://github.com/MicrosoftDocs/microsoft-365-docs/graphs/contributors>. +Anyone who is interested can contribute to the topics. When you contribute, your work will go directly into the content set after being merged. It will then show up on Microsoft Docs and you will be listed as a contributor at: <https://github.com/MicrosoftDocs/microsoft-365-docs/graphs/contributors>. ### Quickly update an article using GitHub.com Contributors who only make infrequent or small updates can edit the file directly on GitHub.com without having to install any additional software. This article shows you how. [This two-minute video](https://www.microsoft.com/videoplayer/embed/RE1XQTG) also covers how to contribute. 1. Make sure you're signed in to GitHub.com with your GitHub account.-2. Go to the page you want to edit on docs.microsoft.com. +2. Go to the page you want to edit on Microsoft Docs. 3. On the right-hand side of the page, click **Edit** (pencil icon). - ![Edit button on docs.microsoft.com.](microsoft-365/media/quick-update-edit.png) + ![Edit button on Microsoft Docs.](microsoft-365/media/quick-update-edit.png) 4. The corresponding topic file on GitHub opens, where you need to click the **Edit this file** pencil icon. Contributors who only make infrequent or small updates can edit the file directl > [!NOTE] > Your permissions in the repo determine what you see in the last several steps. People with no special privileges will see the **Propose file change** section and subsequent confirmation pages as described. People with permissions to create and approve their own pull requests will see a similar **Commit changes** section with extra options for creating a new branch and fewer confirmation pages.<br/><br/>The point is: click any green buttons that are presented to you until there are no more. -The writer identified in the metadata of the topic will be notified and will eventually review and approve your changes so the topic will be updated on docs.microsoft.com. If there are questions or issues with the updates, the writer will contact you. +The writer identified in the metadata of the topic will be notified and will eventually review and approve your changes so the topic will be updated on Microsoft Docs. If there are questions or issues with the updates, the writer will contact you. ## Microsoft Open Source Code of Conduct |
|
threat-intelligence | Data Sets | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/defender/threat-intelligence/data-sets.md | When a user expands on a SHA1 hash, the user will be able to see details about t ## Subdomains -A subdomain is an internet domain, which is part of a primary domain. Subdomains are also referred to as "hosts". As an example, "docs.microsoft.com" is a subdomain of "microsoft.com". For every subdomain, there could be a new set of IP addresses to which the domain resolves to and this can be a great data source for finding related infrastructure. +A subdomain is an internet domain, which is part of a primary domain. Subdomains are also referred to as "hosts". As an example,`docs.microsoft.com` is a subdomain of `microsoft.com`. For every subdomain, there could be a new set of IP addresses to which the domain resolves to and this can be a great data source for finding related infrastructure. Our subdomain data includes the following: For more information, see: - [Searching and pivoting](searching-and-pivoting.md) - [Sorting, filtering, and downloading data](sorting-filtering-and-downloading-data.md) - [Infrastructure chaining](infrastructure-chaining.md)-- [Tutorial: Gathering threat intelligence and infrastructure chaining](gathering-threat-intelligence-and-infrastructure-chaining.md)+- [Tutorial: Gathering threat intelligence and infrastructure chaining](gathering-threat-intelligence-and-infrastructure-chaining.md) |
admin | Add Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/add-users.md | +- highpri - M365-subscription-management - Adm_O365_Setup - Adm_TOC |
admin | Let Users Reset Passwords | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/let-users-reset-passwords.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Reset Passwords | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/reset-passwords.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Set Password To Never Expire | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/set-password-to-never-expire.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Admin Center Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-center-overview.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Admin Mobile App | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/admin-mobile-app.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Sign Up For Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/sign-up-for-office-365.md | +- highpri - M365-subscription-management - Adm_O365 - TRN_SMB |
admin | What Is Microsoft 365 For Business | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-is-microsoft-365-for-business.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | What Subscription Do I Have | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/admin-overview/what-subscription-do-i-have.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/overview.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Set Up | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/basic-mobility-security/set-up.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Update Dns Records To Retain Current Hosting Provider | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/dns/update-dns-records-to-retain-current-hosting-provider.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_NonTOC |
admin | Add User Or Contact To Distribution List | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/add-user-or-contact-to-distribution-list.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Email Collaboration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/email-collaboration.md | audience: Admin ms.localizationpriority: medium-++- highpri - M365-subscription-management - Adm_O365 |
admin | Get Help Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-support.md | +- highpri - Adm_O365 - Adm_TOC |
admin | Buy A Domain Name | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/buy-a-domain-name.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Change Nameservers At Any Domain Registrar | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/change-nameservers-at-any-domain-registrar.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Create Dns Records At Any Dns Hosting Provider | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Dns Basics | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/dns-basics.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Find And Fix Issues | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/find-and-fix-issues.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Find Your Domain Registrar | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/find-your-domain-registrar.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Information For Dns Records | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/information-for-dns-records.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | What Is A Domain | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/get-help-with-domains/what-is-a-domain.md | +- highpri - M365-subscription-management - Adm_O365 search.appverid: |
admin | M365_Glossary | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/m365_glossary.md | + + Title: "Microsoft 365 admin center katakana glossary" +f1.keywords: NOCSH ++++audience: Admin +++localization_priority: Normal ++- Adm_O365 ++description: "Learn how to view the Japanese katakana glossary for the Microsoft 365 admin center." Last updated : 09/12/2022+++# Microsoft 365 admin center katakana glossary ++This is a Japanese language-specific article, and isn't available in your language. To view the Japanese article, see [Microsoft 365 admin center katakana glossary](https://go.microsoft.com/fwlink/p/?linkid=2208404). ++<!-- +These images are included for the ja-jp article only ++--> |
admin | Assign Licenses To Users | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/assign-licenses-to-users.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Find Your Partner Or Reseller | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/find-your-partner-or-reseller.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Set Password Expiration Policy | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/set-password-expiration-policy.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Move Email And Data To Office 365 Business Premium | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/move-email-and-data-to-office-365-business-premium.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_NonTOC |
admin | Password Policy Recommendations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/password-policy-recommendations.md | +- highpri - Adm_O365 - Adm_NonTOC description: "Make your organization more secure against password attacks, and b As the admin of an organization, you're responsible for setting the password policy for users in your organization. Setting the password policy can be complicated and confusing, and this article provides recommendations to make your organization more secure against password attacks. -Microsoft cloud-only accounts have a pre-defined password policy that cannot be changed. The only items you can change are the number of days until a password expires and whether or not passwords expire at all. +Microsoft cloud-only accounts have a pre-defined password policy that cannot be changed. The only items you can change are the number of days until a password expires and whether or not passwords expire at all. To determine how often Microsoft 365 passwords expire in your organization, see [Set password expiration policy for Microsoft 365](../manage/set-password-expiration-policy.md). Good password practices fall into a few broad categories: ## Password guidelines for administrators The primary goal of a more secure password system is password diversity. You want your password policy to contain lots of different and hard to guess passwords. Here are a few recommendations for keeping your organization as secure as possible.- - Maintain an eight-character minimum length requirement These are some of the most commonly used password management practices, but rese Password expiration requirements do more harm than good, because these requirements make users select predictable passwords, composed of sequential words and numbers that are closely related to each other. In these cases, the next password can be predicted based on the previous password. Password expiration requirements offer no containment benefits because cybercriminals almost always use credentials as soon as they compromise them. Check out [Time to rethink mandatory password changes](https://go.microsoft.com/fwlink/p/?linkid=861018) for more info. -### Requiring long passwords +### Minimum password length requirements ++<!--Password length requirements (greater than about 10 characters) can result in user behavior that is predictable and undesirable. For example, users who are required to have a 16-character password may choose repeating patterns like **fourfourfourfour** or **passwordpassword** that meet the character length requirement but aren't hard to guess. Additionally, length requirements increase the chances that users will adopt other insecure practices, such as writing down their passwords, reusing them, or storing them unencrypted in their documents.--> -Password length requirements (greater than about 10 characters) can result in user behavior that is predictable and undesirable. For example, users who are required to have a 16-character password may choose repeating patterns like **fourfourfourfour** or **passwordpassword** that meet the character length requirement but aren't hard to guess. Additionally, length requirements increase the chances that users will adopt other insecure practices, such as writing down their passwords, reusing them, or storing them unencrypted in their documents. To encourage users to think about a unique password, we recommend keeping a reasonable 8-character minimum length requirement. +To encourage users to think about a unique password, we recommend keeping a reasonable 14-character minimum length requirement. ### Requiring the use of multiple character sets |
admin | Set Up Dns Records Vsb | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/set-up-dns-records-vsb.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Sign Up With A Personal Email Address | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/misc/sign-up-with-a-personal-email-address.md | +- highpri - Adm_O365 - Adm_NonTOC |
admin | Add Google Domain | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/add-google-domain.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Cancel Google | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/cancel-google.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Connect Domain Tom365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/connect-domain-tom365.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Migrate Email | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/migrate-email.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Migrate Files Migration Manager | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/migrate-files-migration-manager.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Move From Google Workspace Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/moveto-microsoft-365/move-from-google-workspace-overview.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Gdpr Compliance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/gdpr-compliance.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Increase Threat Protection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/increase-threat-protection.md | +- highpri - M365-subscription-management - M365-identity-device-management - Adm_TOC |
admin | Secure Your Business Data | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/secure-your-business-data.md | +- highpri - Adm_O365 - Adm_TOC |
admin | Set Up Multi Factor Authentication | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Add Domain | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/add-domain.md | +- highpri - M365-subscription-management - Adm_O365_Setup - Adm_O365 |
admin | Add Or Replace Your Onmicrosoftcom Domain | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/add-or-replace-your-onmicrosoftcom-domain.md | +- highpri - M365-subscription-management - Adm_O365_Setup - Adm_O365 |
admin | Create Distribution Lists | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/create-distribution-lists.md | +- highpri - M365-subscription-management - Adm_O365 search.appverid: |
admin | Create Signatures And Disclaimers | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/create-signatures-and-disclaimers.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Customize Sign In Page | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-sign-in-page.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Customize Your Organization Theme | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/customize-your-organization-theme.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Employee Quick Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/employee-quick-setup.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Files To Onedrive | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/files-to-onedrive.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Files To Sharepoint | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/files-to-sharepoint.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Install Applications | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/install-applications.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Migrate Email And Contacts Admin | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/migrate-email-and-contacts-admin.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Plan Your Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/plan-your-setup.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Set Up File Storage And Sharing | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/set-up-file-storage-and-sharing.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Set Up Mobile Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/set-up-mobile-devices.md | audience: Admin ms.localizationpriority: medium-++- highpri - M365-subscription-management - M365-identity-device-management - Adm_TOC |
admin | Setup Apps For Business | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-apps-for-business.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Setup Business Basic | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-business-basic.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Setup Business Standard | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-business-standard.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
admin | Setup Outlook | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-outlook.md | +- highpri - M365-subscription-management - Adm_O365 |
admin | Setup | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_O365_Setup |
admin | Signup Apps Business | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/signup--apps-business.md | +- highpri - Adm_TOC - VSBFY23 |
admin | Migrate Data Business Standard | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/migrate-data-business-standard.md | +- highpri - Adm_TOC - VSBFY23 |
admin | Signup Business Standard | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/signup-business-standard.md | +- highpri - Adm_TOC - AdminSurgePortfolio |
admin | Signup Teams Business Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/signup-teams-business-subscription.md | +- highpri - Adm_TOC - VSBFY23 |
admin | User Invite Business Standard | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/simplified-signup/user-invite-business-standard.md | audience: Admin ms.localizationpriority: medium-++- highpri - Adm_TOC - VSBFY23 |
bookings | Bookings Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md | |
commerce | Pay For Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/pay-for-your-subscription.md | +- highpri - M365-subscription-management - Adm_O365 search.appverid: MET150 |
commerce | Understand Your Invoice | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/understand-your-invoice.md | f1.keywords: ms.localizationpriority: medium +- highpri - M365-subscription-management - Adm_O365 |
commerce | Understand Your Invoice2 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/understand-your-invoice2.md | +- highpri - M365-subscription-management - Adm_O365 |
commerce | View Your Bill Or Invoice | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/billing-and-payments/view-your-bill-or-invoice.md | +- highpri - M365-subscription-management - Adm_O365 |
commerce | Enter Your Product Key | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/enter-your-product-key.md | audience: Admin ms.localizationpriority: high-++- highpri - M365-subscription-management - Adm_O365 search.appverid: MET150 |
commerce | Cancel Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/cancel-your-subscription.md | +- highpri - M365-subscription-management - Adm_O365 |
commerce | Renew Your Subscription | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/subscriptions/renew-your-subscription.md | +- highpri - M365-subscription-management - Adm_O365 |
commerce | Try Or Buy Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/commerce/try-or-buy-microsoft-365.md | +- highpri - M365-subscription-management - Adm_O365 - Adm_TOC |
compliance | Classifier Learn About | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/classifier-learn-about.md | Microsoft 365 comes with multiple pre-trained classifiers: - **Resume**: detects docx, .pdf, .rtf, .txt items that are textual accounts of an applicant's personal, educational, professional qualifications, work experience, and other personally identifying information -- **Source code**: detects items that contain a set of instructions and statements written computer programming languages on GitHub: ActionScript, C, C#, C++, Clojure, CoffeeScript, Go, Haskell, Java, JavaScript, Lua, MATLAB, Objective-C, Perl, PHP, Python, R, Ruby, Scala, Shell, Swift, TeX, Vim Script. Detects content in .msg, .as, .h, .c, .cs, .cc, .cpp, .hpp, .cxx, .hh, .c++, .clj, .edn, .cljc, .cljs, .coffee, .litcoffee, .go, .hs, .lhs, .java, .jar, .js, .mjs, .lua, .m, .mm, .pl, .pm, .t, .xs, .pod, .php, .phar, .php4, .pyc, .R, .r, .rda, .RData, .rds, .rb, .scala, .sc, .sh, .swift files.+- **Source code**: detects items that contain a set of instructions and statements written in computer programming languages on GitHub: ActionScript, C, C#, C++, Clojure, CoffeeScript, Go, Haskell, Java, JavaScript, Lua, MATLAB, Objective-C, Perl, PHP, Python, R, Ruby, Scala, Shell, Swift, TeX, Vim Script. Detects content in .msg, .as, .h, .c, .cs, .cc, .cpp, .hpp, .cxx, .hh, .c++, .clj, .edn, .cljc, .cljs, .coffee, .litcoffee, .go, .hs, .lhs, .java, .jar, .js, .mjs, .lua, .m, .mm, .pl, .pm, .t, .xs, .pod, .php, .phar, .php4, .pyc, .R, .r, .rda, .RData, .rds, .rb, .scala, .sc, .sh, .swift files. > [!NOTE] > Source Code is trained to detect when the bulk of the text is source code. It does not detect source code text that is interspersed with plain text. |
compliance | How Smtp Dane Works | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/how-smtp-dane-works.md | There are only two scenarios where an SMTP DANE failure will result in the email |Technology|Additional Information| ||| |**Mail Transfer Agent - Strict Transport Security (MTA-STS)** helps thwart downgrade and Man-in-the-Middle attacks by providing a mechanism for setting domain policies that specify whether the destination email server supports TLS and what to do when TLS can't be negotiated, for example stop the transmission.|More information about Exchange Online's upcoming support for inbound and outbound MTA-STS will be published later this year. <br/><br/> [Exchange Online Transport News from Microsoft Ignite 2020 - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-online-transport-news-from-microsoft-ignite-2020/ba-p/1687699) <br/><br/> [rfc8461 (ietf.org)](https://datatracker.ietf.org/doc/html/rfc8461)|-|**Sender Policy Framework (SPF)** uses IP information to ensure that destination email systems trust messages sent from your custom domain.|[How Sender Policy Framework (SPF) prevents spoofing - Office 365 - Microsoft Docs](/microsoft-365/security/office-365-security/how-office-365-uses-spf-to-prevent-spoofing)| -|**DomainKeys Identified Mail (DKIM)** uses X.509 certificate information to ensure that destination email systems trust messages sent outbound from your custom domain.|[How to use DKIM for email in your custom domain - Office 365 - Microsoft Docs](/microsoft-365/security/office-365-security/use-dkim-to-validate-outbound-email)| -|**Domain-based Message Authentication, Reporting, and Conformance (DMARC)** works with Sender Policy Framework and DomainKeys Identified Mail to authenticate mail senders and ensure that destination email systems trust messages sent from your domain.|[Use DMARC to validate email, setup steps - Office 365 - Microsoft Docs](/microsoft-365/security/office-365-security/use-dmarc-to-validate-email)| +|**Sender Policy Framework (SPF)** uses IP information to ensure that destination email systems trust messages sent from your custom domain.|[How Sender Policy Framework (SPF) prevents spoofing](/microsoft-365/security/office-365-security/how-office-365-uses-spf-to-prevent-spoofing)| +|**DomainKeys Identified Mail (DKIM)** uses X.509 certificate information to ensure that destination email systems trust messages sent outbound from your custom domain.|[How to use DKIM for email in your custom domain](/microsoft-365/security/office-365-security/use-dkim-to-validate-outbound-email)| +|**Domain-based Message Authentication, Reporting, and Conformance (DMARC)** works with Sender Policy Framework and DomainKeys Identified Mail to authenticate mail senders and ensure that destination email systems trust messages sent from your domain.|[Use DMARC to validate email, setup steps](/microsoft-365/security/office-365-security/use-dmarc-to-validate-email)| ## Troubleshooting Sending Emails with SMTP DANE |
compliance | Information Protection Solution | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/information-protection-solution.md | Learning modules for consultants and admins: To help train your users to apply and use the sensitivity labels that you configure for them, see [End-user documentation for sensitivity labels](get-started-with-sensitivity-labels.md#end-user-documentation-for-sensitivity-labels). -When you deploy data loss prevention policies for Teams, you might find useful the following end-user guidance as an introduction to this technology with some potential messages that they might see: [Teams messages about data loss prevention (DLP) and communication compliance policies ](https://support.microsoft.com/office/teams-messages-about-data-loss-prevention-dlp-and-communication-compliance-policies-c5631c3f-f61b-4306-a6ac-6603d9fc5ff0). +When you deploy data loss prevention policies for Teams, you might find useful the following end-user guidance as an introduction to this technology with some potential messages that they might see: [Teams messages about data loss prevention (DLP) and communication compliance policies](https://support.microsoft.com/office/teams-messages-about-data-loss-prevention-dlp-and-communication-compliance-policies-c5631c3f-f61b-4306-a6ac-6603d9fc5ff0). |
compliance | Sensitivity Labels Office Apps | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/sensitivity-labels-office-apps.md | The numbers listed are the minimum Office application versions required for each |[Apply a sensitivity label to content automatically](apply-sensitivity-label-automatically.md) <br /> - Using trainable classifiers | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.49+ | Under review | Under review | Yes | |[Different settings for default label and mandatory labeling](#outlook-specific-options-for-default-label-and-mandatory-labeling) | Current Channel: 2105+ <br /><br> Monthly Enterprise Channel: 2105+ <br /><br> Semi-Annual Enterprise Channel: 2108+ | 16.43+ <sup>\*</sup> | 4.2111+ | 4.2111+ | Yes | |[PDF support](#pdf-support) | Preview: Rolling out to [Beta Channel](https://office.com/insider)| Under review | Under review | Under review | Under review |-|[Apply S/MIME protection](#configure-a-label-to-apply-smime-protection-in-outlook) | Under review | Rolling out: 16.61+ <sup>\*</sup> | Rolling out: 4.2226+ | Rolling out: 4.2203+ | Under review | +|[Apply S/MIME protection](#configure-a-label-to-apply-smime-protection-in-outlook) | Preview: Rolling out to [Beta Channel](https://office.com/insider) | Rolling out: 16.61+ <sup>\*</sup> | Rolling out: 4.2226+ | Rolling out: 4.2203+ | Under review | **Footnotes:** |
compliance | Set Up An Archive And Deletion Policy For Mailboxes | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/set-up-an-archive-and-deletion-policy-for-mailboxes.md | To create new retention tags, you'll use the [Microsoft Purview compliance porta 1. Go to the [Microsoft Purview compliance portal](https://compliance.microsoft.com/) and sign in using your credentials. -2. In the compliance portal, go to **Solutions** \> **Data lifecycle management** \> **Exchange (legacy)** > **Retention tags** +2. In the compliance portal, go to **Solutions** \> **Data lifecycle management** \> **Exchange (legacy)** > **MRM Retention tags** A list of the retention tags for your organization is displayed. To create new retention tags, you'll use the [Microsoft Purview compliance porta First, you'll create a custom archive default policy tag (DPT) that will move items to the archive mailbox after 3 years. -1. On the **Retention tags** page, select **+ New tag**, and then on the **Define how the tag will be applied** page, select **Automatically to entire mailbox (default)**. +1. On the **MRM Retention tags** page, select **+ New tag**, and then on the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. + + For our example scenario, we'll name this tag "Alpine House 3 Year Move to Archive". ++2. On the **Define how the tag will be applied** page, select **Automatically to entire mailbox (default)**. 2. On the **Define retention settings** page, complete the following fields: First, you'll create a custom archive default policy tag (DPT) that will move it 2. For the **Retention Action** Select **Move item to archive** to move items to the archive mailbox when the retention period expires. -3. On the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. - - For our example scenario, we'll name this tag "Alpine House 3 Year Move to Archive". - 4. Select **Next**, and then review and submit to create the custom archive DPT. The new archive DPT is displayed in the list of retention tags. The new archive DPT is displayed in the list of retention tags. Next, you'll create another custom DPT but this one will be a deletion policy that permanently deletes items after 7 years. -1. Back on the **Retention tags** page, select **+ New tag**, and then on the **Define how the tag will be applied** page, select **Automatically to entire mailbox (default)** again. +1. Back on the **MRM Retention tags** page, select **+ New tag**, and on the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. + + For our example scenario, we'll name this tag "Alpine House 7 Year Permanently Delete". -2. On the **Define retention settings** page, complete the following fields: +2. then on the **Define how the tag will be applied** page, select **Automatically to entire mailbox (default)** again. ++3. On the **Define retention settings** page, complete the following fields: 1. **When items reaches the following age (in days)** Enter the duration of the retention period. For this scenario, items will be purged after 2555 days (7 years). 2. For the **Retention Action** Select **Permanently delete** to purge items from the mailbox when the retention period expires. -3. On the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. - - For our example scenario, we'll name this tag "Alpine House 7 Year Permanently Delete". - 4. Select **Next**, and then review and submit to create the custom deletion DPT. The new deletion DPT is displayed in the list of retention tags. The new deletion DPT is displayed in the list of retention tags. The last retention tag to create is a custom retention policy tag (RPT) for the Deleted Items folder. This tag will delete items in the Deleted Items folder after 5 years, and provides a recovery period when users can use the Recover Deleted Items tool to recover an item. -1. Back on the **Retention tags** page, select **+ New tag**, and then on the **Define how the tag will be applied** page, select **Automatically to entire mailbox (default)** again. +1. Back on the **MRM Retention tags** page, select **+ New tag**, and on the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. + + For our example scenario, we'll name this tag "Alpine House Deleted Items 5 Years Delete and Allow Recovery". ++2. On the **Define how the tag will be applied** page, select **Automatically to default folder** and then for the **Apply tag to this folder** option, select **Deleted items**. -2. On the **Define retention settings** page, complete the following fields: +3. On the **Define retention settings** page, complete the following fields: - 1. **When items reaches the following age (in days)** Enter the duration of the retention period. For this scenario, items will be deleted after 1825 days (5 years). + 1. **When items reaches the following age (in days)** Enter the duration of the retention period. For this scenario, items will be deleted after 1825 days (5 years). 2. For the **Retention Action** Select **Delete and allow recovery** to delete items when the retention period expires, but allow users to recover a deleted item within the deleted item retention period (which by default is 14 days). -3. On the **Name your tag** page, type a name for the new retention tag, and an optional description that explains the purpose of the custom retention tag. - - For our example scenario, we'll name this tag "Alpine House Deleted Items 5 Years Delete and Allow Recovery". - 4. Select **Next**, and then review and submit to create the custom deletion DPT. The new RPT is displayed in the list of retention tags. The new RPT is displayed in the list of retention tags. After you create the custom retention tags, the next step is to create a new retention policy and add the retention tags. You'll add the three custom retention tags that you created in Step 2, and the built-in tags that were mentioned in the first section. In Step 4, you'll assign this new retention policy to user mailboxes. -1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com/), go to **Data lifecycle management** \> **Exchange (legacy)** > **Retention policies**. +1. In the [Microsoft Purview compliance portal](https://compliance.microsoft.com/), go to **Data lifecycle management** \> **Exchange (legacy)** > **MRM Retention policies**. -2. On the **Retention policies** page, select **New policy**. +2. On the **MRM Retention policies** page, select **New policy**. 3. In the **Name** box, type a name for the new retention policy; for example, **Alpine House Archive and Deletion Policy**. 4. Select **+ Add tag**.-+ A list of the retention tags in your organization is displayed, which includes the custom tags that you created in Step 2. 5. Add the 9 retention tags that are described in more detail in the [More information](#more-information) section: You do this by using Exchange Online PowerShell to update your organization's de |Junk Email <br/> |Permanently deletes items that have been in the Junk Email folder for 30 days. Users can recover these items for up 14 days after they're deleted.<sup>\*</sup> <br/> |Built-in <br/> |Retention Policy Tag (Junk Email); this tag is automatically applied to items in Junk Email folder. <br/> | |1 Month Delete <br/> |Permanently deletes items that are 30 days old. Users can recover these items for up 14 days after they're deleted.<sup>\*</sup> <br/> |Built-in <br/> |Personal; this tag can be applied by users. <br/> | |1 Year Delete <br/> |Permanently deletes items that are 365 days old. Users can recover these items for up 14 days after they're deleted.<sup>\*</sup> <br/> |Built-in <br/> |Personal; this tag can be applied by users. <br/> |- |Never Delete <br/> |This tag prevents items from being deleted by a retention policy. <br/> |Built-in <br/> |Personal; this tag can be applied by users. <br/> | - |Personal 1 year move to archive <br/> |Moves items to the archive mailbox after 1 year. <br/> |Built-in <br/> |Personal; this tag can be applied by users. <br/> | + |Never Delete <br/> |This tag prevents items from being deleted by a retention policy. <br/> |Built-in <br/> |Personal; this tag can be applied by users. | + |Personal 1 year move to archive <br/> |Moves items to the archive mailbox after 1 year. <br/> |Built-in <br/> |Personal; this tag can be applied by users. | + - > <sup>\*</sup> Users can use the Recover Deleted Items tool in Outlook and Outlook on the web (formerly known as Outlook Web App) to recover a deleted item within the deleted item retention period, which by default is 14 days in Exchange Online. An administrator can use Exchange Online PowerShell to increase the deleted item retention period to a maximum of 30 days. For more information, see: [Recover deleted items in Outlook for Windows](https://support.office.com/article/49e81f3c-c8f4-4426-a0b9-c0fd751d48ce) and [Change the deleted item retention period for a mailbox in Exchange Online](/exchange/recipients-in-exchange-online/manage-user-mailboxes/change-deleted-item-retention). +><sup>*</sup>Users can use the Recover Deleted Items tool in Outlook and Outlook on the web (formerly known as Outlook Web App) to recover a deleted item within the deleted item retention period, which by default is 14 days in Exchange Online. An administrator can use Exchange Online PowerShell to increase the deleted item retention period to a maximum of 30 days. For more information, see: [Recover deleted items in Outlook for Windows](https://support.office.com/article/49e81f3c-c8f4-4426-a0b9-c0fd751d48ce) and [Change the deleted item retention period for a mailbox in Exchange Online](/exchange/recipients-in-exchange-online/manage-user-mailboxes/change-deleted-item-retention). - Using the **Recoverable Items 14 days Move to Archive** retention tag helps free up storage space in the Recoverable Items folder in the user's primary mailbox. This is useful when a user's mailbox is placed on hold or has a retention policy applied that retains items. Both configurations prevent emails from being permanently deleted from the user's mailbox. Without moving items to the archive mailbox, it's possible the storage quota for the Recoverable Items folder in the primary mailbox will be reached. For more information about this scenario, see [Increase the Recoverable Items quota for mailboxes on hold](./increase-the-recoverable-quota-for-mailboxes-on-hold.md). |
enterprise | Planportallaunchroll Out | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/Planportallaunchroll-out.md | A key part of a successful launch is the "wave" or "phased roll-out" approach de ## Can I load test SharePoint Online? -SharePoint Online is a shared multi-tenanted environment that is balanced across farms and scale is adjusted in an on-going basis. Load testing an environment, like SharePoint Online, whose scale changes continuously will not only give you unexpected results but it is not permitted. +SharePoint Online is a shared multi-tenanted environment that is balanced across farms and scale is adjusted in an on-going basis. Load testing an environment, like SharePoint Online, whose scale changes continuously won't only give you unexpected results but it isn't permitted. Learn more: [Capacity planning and load testing SharePoint Online](capacity-planning-and-load-testing-sharepoint-online.md) ## Optimize pages by following recommended guidelines -Pages from an on-Premise deployment should not simply be moved as they are onto SharePoint Online without reviewing them against recommended guidelines for SharePoint Online. The best approach is to always optimize any home page for any site or portal in SharePoint, as this is where most users in your organization will access as the starting point for your site(s). +Pages from an on-premises deployment shouldn't simply be moved as they are onto SharePoint Online without reviewing them against recommended guidelines for SharePoint Online. The best approach is to always optimize any home page for any site or portal in SharePoint, as this is where most users in your organization will access as the starting point for your site(s). A few basic factors should be considered: -- On-Premise deployments can use traditional server-side caches like object cache, output cache, and blob cache. With the topology differences in the cloud, these options are not necessarily available as the sheer scale differences make them less viable approaches.+- On-premises deployments can use traditional server-side caches like object cache, output cache, and blob cache. With the topology differences in the cloud, these options aren't necessarily available as the sheer scale differences make them less viable approaches. - Any pages / features / customizations used for cloud consumption should be optimized for higher latency and the distributed locations of users, so that users in different areas or regions have a more consistent experience. Cloud offers optimizations like Content Delivery Networks (CDN) to optimize for a distributed user base and for modern SharePoint, the last known good (LKG) is utilized by our out of the box (OOTB) web parts. **What to do**: -- For all site pages in SharePoint Online use the [Page Diagnostics tool](./page-diagnostics-for-spo.md), which is a Chromium extension that assists with analyzing and providing guidance. This can be used by site owners, editors, administrators, and developers as it is designed to be a starting point for analysis and optimization.+- For all site pages in SharePoint Online, use the [Page Diagnostics tool](./page-diagnostics-for-spo.md), which is a Chromium extension that assists with analyzing and providing guidance. This tool can be used by site owners, editors, administrators, and developers as it is designed to be a starting point for analysis and optimization. - Developers should also use development tools like F12 browser developer tool and CTRL-F12 in the browser on modern pages. [Fiddler](https://www.telerik.com/download/fiddler) can also be used to review the size weight (how large the page is in megabytes) of the page and the number of calls and elements impacting the overall page load. This section was a brief summary for optimizing pages. To learn more, see: [Creating, launching, and maintaining a healthy portal](/sharepoint/portal-health). ## Follow a Wave / Phased roll-out approach -The traditional big bang approach for site launches will not allow verification that customizations, external sources, services, or processes have been tested at the right scale. This approach doesn't mean that it will take months to launch, but it is recommended over at least several days dependent on your organization size. Following a wave roll-out plan therefore gives you the option to pause and resolve issues before proceeding with the next phase and therefore lowers the potential number of users impacted by any issues. SharePoint as a service scales your capacity based on usage and predicted usage and whilst we don't need you to notify us of your launch, you should follow the guidelines to ensure success. +The traditional big bang approach for site launches won't allow verification that customizations, external sources, services, or processes have been tested at the right scale. This approach doesn't mean that it will take months to launch, but it's recommended over at least several days dependent on your organization size. Following a wave roll-out plan therefore gives you the option to pause and resolve issues before proceeding with the next phase and therefore lowers the potential number of users impacted by any issues. SharePoint as a service scales your capacity based on usage and predicted usage and whilst we don't need you to notify us of your launch, you should follow the guidelines to ensure success. As shown in the following image, often the number of users that are invited is significantly higher than those that actually use the site. This image shows a strategy about how to roll out a release. This method helps identify ways to improve the SharePoint site before most the users see it. |
enterprise | Portallaunchscheduler | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/PortalLaunchScheduler.md | |
enterprise | Content Delivery Networks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/content-delivery-networks.md | The CDNs in use by Office 365 are always subject to change and in many cases the |CDN |Company |Usage |Link | |||||-|Office 365 CDN |Microsoft Azure |Generic assets in public origins, SharePoint user content in private origins |[Microsoft Azure CDN](https://azure.microsoft.com/documentation/services/cdn/) | -|Azure CDN |Microsoft |Custom code, SharePoint Framework solutions |[Microsoft Azure CDN](https://azure.microsoft.com/documentation/services/cdn/) | +|Office 365 CDN |Microsoft Azure |Generic assets in public origins, SharePoint user content in private origins |[Microsoft Azure CDN](/azure/frontdoor/) | +|Azure CDN |Microsoft |Custom code, SharePoint Framework solutions |[Microsoft Azure CDN](/azure/frontdoor/) | |Microsoft Ajax CDN (read only) |Microsoft |Common libraries for Ajax, jQuery, ASP.NET, Bootstrap, Knockout.js etc. |[Microsoft Ajax CDN](/aspnet/ajax/cdn/overview) | ## What performance gains does a CDN provide? |
enterprise | Cross Tenant Mailbox Migration | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/cross-tenant-mailbox-migration.md | -Commonly, during mergers or divestitures, you need the ability to move your user's Exchange Online mailbox into a new tenant. Cross-tenant mailbox migration allows tenant administrators to use well-known interfaces like Exchange Online PowerShell and MRS to transition users to their new organization. +Commonly, during mergers or divestitures, you need the ability to move your users' Exchange Online mailboxes into a new tenant. Cross-tenant mailbox migration allows tenant administrators to use well-known interfaces like Exchange Online PowerShell and MRS to transition users to their new organization. Administrators can use the **New-MigrationBatch** cmdlet, available through the _Move Mailboxes_ management role, to execute cross-tenant moves. Get-MoveRequest -Flags "CrossTenant" Start-ADSyncSyncCycle ``` -### How do we access Outlook on Day 1 after the use mailbox is moved? +### How do we access Outlook on Day 1 after the user mailbox is moved? -Since only one tenant can own a domain, the former primary SMTPAddress will not be associated to the user in the target tenant when the mailbox move completes; only those domains associated with the new tenant. Outlook uses the users new UPN to authenticate to the service and the Outlook profile expects to find the legacy primary SMTPAddress to match the mailbox in the target system. Since the legacy address is not in the target System the outlook profile will not connect to find the newly moved mailbox. +Since only one tenant can own a domain, the former primary SMTPAddress will not be associated to the user in the target tenant when the mailbox move completes; only those domains associated with the new tenant. Outlook uses the user's new UPN to authenticate to the service and the Outlook profile expects to find the legacy primary SMTPAddress to match the mailbox in the target system. Since the legacy address is not in the target System the outlook profile will not connect to find the newly moved mailbox. For this initial deployment, users will need to rebuild their profile with their new UPN, primary SMTP address and resync OST content. |
enterprise | Implementing Expressroute | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/implementing-expressroute.md | We expect the following pre-requisites to be completed before this implementatio 2. You've selected an ExpressRoute network service provider. Find details about the [ExpressRoute partners and peering locations](/azure/expressroute/expressroute-locations). -3. You've already read and understand the [ExpressRoute documentation](https://azure.microsoft.com/documentation/services/expressroute/) and your internal network is able to meet ExpressRoute pre-requisites end to end. +3. You've already read and understand the [ExpressRoute documentation](/azure/expressroute/) and your internal network is able to meet ExpressRoute pre-requisites end to end. 4. Your team has read all of the public guidance and documentation at [https://aka.ms/expressrouteoffice365](./azure-expressroute.md), [https://aka.ms/ert](https://aka.ms/ert), and watched the [Azure ExpressRoute for Office 365 Training](https://channel9.msdn.com/series/aer) series on Channel 9 to gain an understanding of critical technical details including: |
enterprise | Microsoft 365 Vpn Stream And Live Events | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/microsoft-365-vpn-stream-and-live-events.md | Live Events uses multiple CDN providers to stream to customers, to provide the b For Azure CDN from Microsoft, you can download the list from [Download Azure IP Ranges and Service Tags ΓÇô Public Cloud from Official Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56519) - you will need to look specifically for the service tag *AzureFrontdoor.Frontend* in the JSON; *addressPrefixes* will show the IPv4/IPv6 subnets. Over time the IPs can change, but the service tag list is always updated before they are put in use. -For Azure CDN from Verizon (Edgecast) you can find an exhaustive list using [https://docs.microsoft.com/rest/api/cdn/edge-nodes/list](/rest/api/cdn/edge-nodes/list) (click **Try It** ) - you will need to look specifically for the **Premium\_Verizon** section. Note that this API shows all Edgecast IPs (origin and Anycast). Currently there isn't a mechanism for the API to distinguish between origin and Anycast. +For Azure CDN from Verizon (Edgecast) you can find an exhaustive list using [Edge Nodes - List](/rest/api/cdn/edge-nodes/list) (click **Try It** ) - you will need to look specifically for the **Premium\_Verizon** section. Note that this API shows all Edgecast IPs (origin and Anycast). Currently there isn't a mechanism for the API to distinguish between origin and Anycast. To implement this in a PAC file you can use the following example which sends the Microsoft 365 Optimize traffic direct (which is recommended best practice) via FQDN, and the critical Stream/Live Events traffic direct via a combination of the FQDN and the returned IP address. The placeholder name _Contoso_ would need to be edited to your specific tenant's name where _contoso_ is from contoso.onmicrosoft.com |
enterprise | Navigation Options For Sharepoint Online | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/navigation-options-for-sharepoint-online.md | Many sites do not require security trimming, as the navigation structure is ofte ### How to implement managed navigation and the results -There are several articles on docs.microsoft.com about the details of managed navigation. For example, see [Overview of managed navigation in SharePoint Server](/sharepoint/administration/overview-of-managed-navigation). +There are several articles on Microsoft Docs about the details of managed navigation. For example, see [Overview of managed navigation in SharePoint Server](/sharepoint/administration/overview-of-managed-navigation). In order to implement managed navigation, you set up terms with URLs corresponding to the navigation structure of the site. Managed navigation can even be manually curated to replace structural navigation in many cases. For example: ByHierarchy: function(firstLevel, connectBy, orderBy, ascending, parent) { [Overview of managed navigation in SharePoint Server](/sharepoint/administration/overview-of-managed-navigation) -[Structural navigation caching and performance](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43) +[Structural navigation caching and performance](https://support.office.com/article/structural-navigation-and-performance-f163053f-8eca-4b9c-b973-36b395093b43) |
enterprise | O365 Data Locations | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/o365-data-locations.md | |
enterprise | Office 365 Cdn Quickstart | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-cdn-quickstart.md | |
enterprise | Office 365 Network Mac Location Services | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-location-services.md | |
enterprise | Office 365 Network Mac Perf Benchmarks | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-benchmarks.md | |
enterprise | Office 365 Network Mac Perf Cpe | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-cpe.md | |
enterprise | Office 365 Network Mac Perf Insights | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-insights.md | |
enterprise | Office 365 Network Mac Perf Measure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-measure.md | |
enterprise | Office 365 Network Mac Perf Onboarding Tool | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-onboarding-tool.md | |
enterprise | Office 365 Network Mac Perf Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-overview.md | |
enterprise | Office 365 Network Mac Perf Score | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/office-365-network-mac-perf-score.md | |
enterprise | Page Diagnostics For Spo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/page-diagnostics-for-spo.md | |
enterprise | Pass Through Auth M365 Ent Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/pass-through-auth-m365-ent-test-environment.md | |
enterprise | Password Hash Sync M365 Ent Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/password-hash-sync-m365-ent-test-environment.md | |
enterprise | Password Reset M365 Ent Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/password-reset-m365-ent-test-environment.md | |
enterprise | Password Writeback M365 Ent Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/password-writeback-m365-ent-test-environment.md | |
enterprise | Performance Troubleshooting Plan | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/performance-troubleshooting-plan.md | |
enterprise | Performance Tuning Using Baselines And History | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/performance-tuning-using-baselines-and-history.md | |
enterprise | Phs Prereqs M365 Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/phs-prereqs-m365-test-environment.md | |
enterprise | Placeholder | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/placeholder.md | |
enterprise | Plan For Multi Geo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-for-multi-geo.md | |
enterprise | Plan For Network Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-for-network-devices.md | |
enterprise | Plan For Third Party Ssl Certificates | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-for-third-party-ssl-certificates.md | |
enterprise | Plan Upgrade Previous Versions Office | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/plan-upgrade-previous-versions-office.md | |
enterprise | Powershell Roadmap Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/powershell-roadmap-microsoft-365.md | |
enterprise | Pps 2007 End Of Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/pps-2007-end-of-support.md | |
enterprise | Prepare A Non Routable Domain For Directory Synchronization | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/prepare-a-non-routable-domain-for-directory-synchronization.md | |
enterprise | Prepare For Directory Synchronization | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/prepare-for-directory-synchronization.md | In your AD DS, complete the following clean-up tasks for each user account that 2. Remove any duplicate values in the **proxyAddresses** attribute. -3. If possible, ensure a valid and unique value for the **userPrincipalName** attribute in the user's **user** object. For the best synchronization experience, ensure that the AD DS UPN matches the Azure AD UPN. If a user does not have a value for the **userPrincipalName** attribute, then the **user** object must contain a valid and unique value for the **sAMAccountName** attribute. Remove any duplicate values in the **userPrincipalName** attribute. +3. If possible, ensure a valid and unique value for the **userPrincipalName** attribute in the user's **user** object. For the best synchronization experience, ensure that the AD DS UPN matches the Azure AD UPN. If a user doesn't have a value for the **userPrincipalName** attribute, then the **user** object must contain a valid and unique value for the **sAMAccountName** attribute. Remove any duplicate values in the **userPrincipalName** attribute. 4. For optimal use of the global address list (GAL), ensure the information in the following attributes of the AD DS user account is correct: In your AD DS, complete the following clean-up tasks for each user account that ## 2. Directory object and attribute preparation -Successful directory synchronization between your AD DS and Microsoft 365 requires that your AD DS attributes are properly prepared. For example, you need to ensure that specific characters aren't used in certain attributes that are synchronized with the Microsoft 365 environment. Unexpected characters do not cause directory synchronization to fail but might return a warning. Invalid characters will cause directory synchronization to fail. +Successful directory synchronization between your AD DS and Microsoft 365 requires that your AD DS attributes are properly prepared. For example, you need to ensure that specific characters aren't used in certain attributes that are synchronized with the Microsoft 365 environment. Unexpected characters don't cause directory synchronization to fail but might return a warning. Invalid characters will cause directory synchronization to fail. Directory synchronization will also fail if some of your AD DS users have one or more duplicate attributes. Each user must have unique attributes. The attributes that you need to prepare are listed here: - **givenName** - - If the attribute exists in the user object, it will be synchronized with Microsoft 365, but Microsoft 365 does not require or use it. + - If the attribute exists in the user object, it will be synchronized with Microsoft 365, but Microsoft 365 doesn't require or use it. - Maximum number of characters: 64 - **mail** The attributes that you need to prepare are listed here: - **mailNickname** (Exchange alias) - - The attribute value cannot begin with a period (.). + - The attribute value can't begin with a period (.). - The attribute value must be unique within the directory. > [!NOTE] The attributes that you need to prepare are listed here: - Invalid characters: \< \> ( ) ; , [ ] " - Letters with diacritical marks, such as umlauts, accents, and tildes, are invalid characters. - Note that the invalid characters apply to the characters following the type delimiter and ":", such that SMTP:User@contso.com is allowed, but SMTP:user:M@contoso.com is not. + The invalid characters apply to the characters following the type delimiter and ":", such that SMTP:User@contso.com is allowed, but SMTP:user:M@contoso.com isn't. > [!IMPORTANT] > All Simple Mail Transport Protocol (SMTP) addresses should comply with email messaging standards. Remove duplicate or unwanted addresses if they exist. The attributes that you need to prepare are listed here: - **sn** (surname) - - If the attribute exists in the user object, it will be synchronized with Microsoft 365, but Microsoft 365 does not require or use it. + - If the attribute exists in the user object, it will be synchronized with Microsoft 365, but Microsoft 365 doesn't require or use it. - **targetAddress** The attributes that you need to prepare are listed here: - Characters allowed: A ΓÇô Z, a - z, 0 ΓÇô 9, ' . - _ ! # ^ ~ - Letters with diacritical marks, such as umlauts, accents, and tildes, are invalid characters. - The @ character is required in each **userPrincipalName** value.- - The @ character cannot be the first character in each **userPrincipalName** value. - - The username cannot end with a period (.), an ampersand (&), a space, or an at sign (@). - - The username cannot contain any spaces. - - Routable domains must be used; for example, local or internal domains cannot be used. + - The @ character can't be the first character in each **userPrincipalName** value. + - The username can't end with a period (.), an ampersand (&), a space, or an at sign (@). + - The username can't contain any spaces. + - Routable domains must be used; for example, local or internal domains can't be used. - Unicode is converted to underscore characters.- - **userPrincipalName** cannot contain any duplicate values in the directory. + - **userPrincipalName** can't contain any duplicate values in the directory. ## 3. Prepare the userPrincipalName attribute Active Directory is designed to allow the end users in your organization to sign in to your directory by using either **sAMAccountName** or **userPrincipalName**. Similarly, end users can sign in to Microsoft 365 by using the user principal name (UPN) of their work or school account. Directory synchronization attempts to create new users in Azure Active Directory by using the same UPN that's in your AD DS. The UPN is formatted like an email address. -In Microsoft 365, the UPN is the default attribute that's used to generate the email address. It's easy to get **userPrincipalName** (in AD DS and in Azure AD) and the primary email address in **proxyAddresses** set to different values. When they are set to different values, there can be confusion for administrators and end users. +In Microsoft 365, the UPN is the default attribute that's used to generate the email address. It's easy to get **userPrincipalName** (in AD DS and in Azure AD) and the primary email address in **proxyAddresses** set to different values. When they're set to different values, there can be confusion for administrators and end users. It's best to align these attributes to reduce confusion. To meet the requirements of single sign-on with Active Directory Federation Services (AD FS) 2.0, you need to ensure that the UPNs in Azure Active Directory and your AD DS match and are using a valid domain namespace. For more information on how to add an alternative UPN suffix to Active Directory ## 5. Match the AD DS UPN with the Microsoft 365 UPN -If you've already set up directory synchronization, the user's UPN for Microsoft 365 may not match the user's AD DS UPN that's defined in your AD DS. This can occur when a user was assigned a license before the domain was verified. To fix this, use [PowerShell to fix duplicate UPN](https://go.microsoft.com/fwlink/p/?LinkId=396730) to update the user's UPN to ensure that the Microsoft 365 UPN matches the corporate user name and domain. If you are updating the UPN in the AD DS and would like it to synchronize with the Azure Active Directory identity, you need to remove the user's license in Microsoft 365 prior to making the changes in AD DS. +If you've already set up directory synchronization, the user's UPN for Microsoft 365 may not match the user's AD DS UPN that's defined in your AD DS. This can occur when a user was assigned a license before the domain was verified. To fix this, use [PowerShell to fix duplicate UPN](https://go.microsoft.com/fwlink/p/?LinkId=396730) to update the user's UPN to ensure that the Microsoft 365 UPN matches the corporate user name and domain. If you're updating the UPN in the AD DS and would like it to synchronize with the Azure Active Directory identity, you need to remove the user's license in Microsoft 365 prior to making the changes in AD DS. Also see [How to prepare a non-routable domain (such as .local domain) for directory synchronization](prepare-a-non-routable-domain-for-directory-synchronization.md). ## Next steps -After you have done 1 through 5 above, see [Set up directory synchronization](set-up-directory-synchronization.md). +After you've done 1 through 5 above, see [Set up directory synchronization](set-up-directory-synchronization.md). |
enterprise | Privileged Access Microsoft 365 Enterprise Dev Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/privileged-access-microsoft-365-enterprise-dev-test-environment.md | |
enterprise | Project Server 2007 End Of Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/project-server-2007-end-of-support.md | |
enterprise | Project Server 2010 End Of Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/project-server-2010-end-of-support.md | |
enterprise | Protect Global Administrator Accounts Microsoft 365 Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/protect-global-administrator-accounts-microsoft-365-test-environment.md | |
enterprise | Protect Your Global Administrator Accounts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/protect-your-global-administrator-accounts.md | |
enterprise | Pta Prereqs M365 Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/pta-prereqs-m365-test-environment.md | |
enterprise | Remove Licenses From User Accounts With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/remove-licenses-from-user-accounts-with-microsoft-365-powershell.md | |
enterprise | Remove Or Disable Hybrid Modern Authentication From Skype For Business And Excha | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/remove-or-disable-hybrid-modern-authentication-from-skype-for-business-and-excha.md | |
enterprise | Request Your Data Move | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/request-your-data-move.md | |
enterprise | Restrict Content To Geo Location | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/restrict-content-to-geo-location.md | description: In this article, learn how to restrict SharePoint sites to a specif # Restrict SharePoint site content to a geo location -Under some circumstances you may choose to enforce a site and its file content to remain in the geo location where the site was created, either by preventing the site from being moved or by preventing the caching of the site's file content in another geo location. +Under certain circumstances you might choose to enforce a site and its file content to remain in the geo location where the site was created, either by preventing the site from being moved or by preventing the caching of the site's file content in another geo location. -You can do this by using the [Set-SPOSite](/powershell/module/sharepoint-online/set-sposite) cmdlet with the **RestrictedToGeo** parameter. This parameter has a default value of NULL, but you can change it to one of the following: +You can do this task by using the [Set-SPOSite](/powershell/module/sharepoint-online/set-sposite) cmdlet with the **RestrictedToGeo** parameter. This parameter has a default value of NULL, but you can change it to one of the following restrictions: |Restriction|Description| |:-|:-| Use the following syntax: For example: -`Set-SPOSite -Identity https://contoso.sharepoint.com/sites/RegionRestrictedTeamSite -RestrictedToGeo BlockFull` +`Set-SPOSite -Identity https://contoso.sharepoint.com/sites/RegionRestrictedTeamSite -RestrictedToGeo BlockFull` |
enterprise | Retrieve Customer Tenant Reporting Data With Windows Powershell For Delegated Ac | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/retrieve-customer-tenant-reporting-data-with-windows-powershell-for-delegated-ac.md | description: "Summary: Use remote Windows PowerShell for Microsoft Exchange Onli Use remote Windows PowerShell for Microsoft Exchange Online to retrieve reports from individual customer tenants. -Syndication and Cloud Solution Provider (CSP) partners can access the data that makes up customer tenant reports directly via remote Windows PowerShell for Exchange Online PowerShell. This lets partners collect and save the reporting data and then perform other operations on it. After you open a remote connection, retrieving reporting data about a customer tenancy is identical to running any cmdlet against a customer tenancy. +Syndication and Cloud Solution Provider (CSP) partners can access the data that makes up customer tenant reports directly via remote Windows PowerShell for Exchange Online PowerShell. This method lets partners collect and save the reporting data and then perform other operations on it. After you open a remote connection, retrieving reporting data about a customer tenancy is identical to running any cmdlet against a customer tenancy. -In this article, you use remote Windows PowerShell for Exchange Online to connect to a single customer tenancy and retrieve a report. By default, Windows PowerShell does not support aggregating reporting data from multiple customer tenancies. The reports you retrieve with this procedure are only for the _DelegatedOrg_ that you connect to. +This article describes how you can use remote Windows PowerShell for Exchange Online to connect to a single customer tenancy and retrieve a report. By default, Windows PowerShell does not support aggregating reporting data from multiple customer tenancies. The reports you retrieve with this procedure are only for the _DelegatedOrg_ that you connect to. ## Before you begin -- You need to connect to your Exchange Online tenant by using remote Windows PowerShell. For instructions, see [Connect to Exchange Online tenants with remote Windows PowerShell for Delegated Access Permissions (DAP) partners](/powershell/exchange/connect-to-exchange-online-powershell)+- Connect to your Exchange Online tenant by using remote Windows PowerShell. For instructions, see [Connect to Exchange Online tenants with remote Windows PowerShell for Delegated Access Permissions (DAP) partners](/powershell/exchange/connect-to-exchange-online-powershell) ## Run the Get-StaleMailboxReport sample -After you have opened a remote session to Exchange Online, run this command to retrieve the **Get-StaleMailboxReport** for the date range 03/25/2015 through 03/31/2015. +After you have opened a remote session to Exchange Online, run the following command to retrieve the **Get-StaleMailboxReport** for the date range 03/25/2015 through 03/31/2015. ```powershell Get-StaleMailboxReport -StartDate 03/25/2015 -EndDate 03/31/2015 ``` -There are many other reporting cmdlets available for Exchange Online, Lync Online, and SharePoint Online as well as others for message tracing that you can use. To find out more about the available reporting cmdlets and the Office 365 Reporting web service, see the topics in the following section. +There are many other reporting cmdlets available for Exchange Online, Lync Online, SharePoint Online, and other services for message tracing that you can use. To learn more about the available reporting cmdlets, see the articles listed in the following section. ## See also |
enterprise | Routing With Expressroute | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/routing-with-expressroute.md | The following are scenarios where communications from Office 365 to your on-prem - [SharePoint hybrid BCS](/SharePoint/hybrid/deploy-a-business-connectivity-services-hybrid-solution). -- [Skype for Business hybrid](/skypeforbusiness/hybrid/plan-hybrid-connectivity?bc=%2fSkypeForBusiness%2fbreadcrumb%2ftoc.json&toc=%2fSkypeForBusiness%2ftoc.json) and/or [Skype for Business federation](/office365/servicedescriptions/skype-for-business-online-service-description/skype-for-business-online-features).+- [Skype for Business hybrid](/skypeforbusiness/hybrid/plan-hybrid-connectivity?bc=/SkypeForBusiness/breadcrumb/toc.json&toc=/SkypeForBusiness/toc.json) and/or [Skype for Business federation](/office365/servicedescriptions/skype-for-business-online-service-description/skype-for-business-online-features). - [Skype for Business Cloud Connector](/skypeforbusiness/skype-for-business-hybrid-solutions/plan-your-phone-system-cloud-pbx-solution/plan-skype-for-business-cloud-connector-edition). |
enterprise | Session Timeouts | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/session-timeouts.md | |
enterprise | Set Up Directory Synchronization | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/set-up-directory-synchronization.md | |
enterprise | Set Up Network For Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/set-up-network-for-microsoft-365.md | |
enterprise | Setup Guides For Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/setup-guides-for-microsoft-365.md | |
enterprise | Setup Overview For Enterprises | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/setup-overview-for-enterprises.md | |
enterprise | Sharepoint 2007 End Of Support | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/sharepoint-2007-end-of-support.md | |
enterprise | Sharepoint 2007 Migration Options | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/sharepoint-2007-migration-options.md | |
enterprise | Sharepoint Multi Geo Storage Quota | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/sharepoint-multi-geo-storage-quota.md | |
enterprise | Sharepoint Server 2013 Disaster Recovery In Microsoft Azure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/sharepoint-server-2013-disaster-recovery-in-microsoft-azure.md | |
enterprise | Simulated Cross Premises Microsoft 365 Enterprise | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/simulated-cross-premises-microsoft-365-enterprise.md | |
enterprise | Simulated Ent Base Configuration Microsoft 365 Enterprise | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/simulated-ent-base-configuration-microsoft-365-enterprise.md | |
enterprise | Single Sign On M365 Ent Test Environment | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/single-sign-on-m365-ent-test-environment.md | |
enterprise | Skype For Business Online | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/skype-for-business-online.md | |
enterprise | Subscriptions Licenses Accounts And Tenants For Microsoft Cloud Offerings | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/subscriptions-licenses-accounts-and-tenants-for-microsoft-cloud-offerings.md | |
enterprise | Tenant Roadmap Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tenant-roadmap-microsoft-365.md | |
enterprise | Tune Exchange Online Performance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tune-exchange-online-performance.md | |
enterprise | Tune Microsoft 365 Performance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tune-microsoft-365-performance.md | |
enterprise | Tune Sharepoint Online Performance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tune-sharepoint-online-performance.md | |
enterprise | Tune Skype For Business Online Performance | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/tune-skype-for-business-online-performance.md | |
enterprise | Turn Off Directory Synchronization | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/turn-off-directory-synchronization.md | |
enterprise | Upgrade From Office 2007 Servers And Products | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/upgrade-from-office-2007-servers-and-products.md | |
enterprise | Upgrade From Office 2010 Servers And Products | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/upgrade-from-office-2010-servers-and-products.md | |
enterprise | Upgrade From Sharepoint 2010 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/upgrade-from-sharepoint-2010.md | |
enterprise | Upgrade From Sharepoint 2013 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/upgrade-from-sharepoint-2013.md | |
enterprise | Upgrade Office 2013 Clients Servers | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/upgrade-office-2013-clients-servers.md | |
enterprise | Urls And Ip Address Ranges 21Vianet | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges-21vianet.md | |
enterprise | Urls And Ip Address Ranges | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/urls-and-ip-address-ranges.md | |
enterprise | Use Lean Popouts To Reduce Memory Used When Reading Mail Messages | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-lean-popouts-to-reduce-memory-used-when-reading-mail-messages.md | |
enterprise | Use Microsoft 365 Cdn With Spo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-microsoft-365-cdn-with-spo.md | |
enterprise | Use Powershell For Email Migration To Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-powershell-for-email-migration-to-microsoft-365.md | |
enterprise | Use Powershell To Perform A Cutover Migration To Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-powershell-to-perform-a-cutover-migration-to-microsoft-365.md | Get-MigrationBatch -Identity CutoverBatch | Format-List Status Email systems use a DNS record called an MX record to figure out where to deliver emails. During the email migration process, your MX record was pointing to your source email system. Now that the email migration to Microsoft 365 is complete, it's time to point your MX record at Microsoft 365. This helps make sure that email is delivered to your Microsoft 365 mailboxes. By moving the MX record, you can also you turn off your old email system when you're ready. -For many DNS providers, there are specific instructions to change your MX record. If your DNS provider isn't included, or if you want to get a sense of the general directions, [general MX record instructions](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider?view=o365-worldwide#add-an-mx-record-for-email-outlook-exchange-online) are provided as well. +For many DNS providers, there are specific instructions to change your MX record. If your DNS provider isn't included, or if you want to get a sense of the general directions, [general MX record instructions](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider#add-an-mx-record-for-email-outlook-exchange-online) are provided as well. It can take up to 72 hours for the email systems of your customers and partners to recognize the changed MX record. Wait at least 72 hours before you proceed to the next task: [Step 6: Delete the cutover migration batch](#step-6-delete-the-cutover-migration-batch). |
enterprise | Use Powershell To Perform A Staged Migration To Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-powershell-to-perform-a-staged-migration-to-microsoft-365.md | |
enterprise | Use Powershell To Perform An Imap Migration To Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-powershell-to-perform-an-imap-migration-to-microsoft-365.md | Get-MigrationBatch -Identity IMAPBatch1 | Format-List Status Email systems use a DNS record called an MX record to figure out where to deliver emails. During the email migration process, your MX record was pointing to your source email system. Now that the email migration to Microsoft 365 is complete, it's time to point your MX record at Microsoft 365. This helps make sure that email is delivered to your Microsoft 365 mailboxes. By moving the MX record, you can also turn off your old email system when you're ready. -For many DNS providers, there are specific instructions to change your MX record. If your DNS provider isn't included, or if you want to get a sense of the general directions, [general MX record instructions](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider?view=o365-worldwide#add-an-mx-record-for-email-outlook-exchange-online) are provided as well. +For many DNS providers, there are specific instructions to change your MX record. If your DNS provider isn't included, or if you want to get a sense of the general directions, [general MX record instructions](/microsoft-365/admin/get-help-with-domains/create-dns-records-at-any-dns-hosting-provider#add-an-mx-record-for-email-outlook-exchange-online) are provided as well. It can take up to 72 hours for the email systems of your customers and partners to recognize the changed MX record. Wait at least 72 hours before you proceed to the next task: Step 6: Delete IMAP migration batch. |
enterprise | Use The Centralized Deployment Powershell Cmdlets To Manage Add Ins | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-the-centralized-deployment-powershell-cmdlets-to-manage-add-ins.md | |
enterprise | Use Windows Powershell To Create Reports In Microsoft 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/use-windows-powershell-to-create-reports-in-microsoft-365.md | |
enterprise | Using Content Search Web Part Instead Of Content Query Web Part To Improve Perfo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/using-content-search-web-part-instead-of-content-query-web-part-to-improve-perfo.md | |
enterprise | Using The Object Cache With Sharepoint Online | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/using-the-object-cache-with-sharepoint-online.md | |
enterprise | View Account License And Service Details With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-account-license-and-service-details-with-microsoft-365-powershell.md | |
enterprise | View Directory Synchronization Status | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-directory-synchronization-status.md | |
enterprise | View Licensed And Unlicensed Users With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-licensed-and-unlicensed-users-with-microsoft-365-powershell.md | |
enterprise | View Licenses And Services With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-licenses-and-services-with-microsoft-365-powershell.md | |
enterprise | View Service Health | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-service-health.md | |
enterprise | View User Accounts With Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/view-user-accounts-with-microsoft-365-powershell.md | |
enterprise | Why You Need To Use Microsoft 365 Powershell | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/enterprise/why-you-need-to-use-microsoft-365-powershell.md | |
microsoft-365-docs-navigation-guide | Microsoft 365 Docs Navigation Guide | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/microsoft-365-docs-navigation-guide.md | You can always navigate back to this page by selecting **Microsoft 365** from th ![Microsoft 365 in header.](media/m365-header-cursor.png) ## TOC search -On docs.microsoft.com, you can search the content in the table of contents by using the filter search box at the top: +On Microsoft Docs, you can search the content in the table of contents by using the filter search box at the top: ![Use filter box.](media/m365-filter-by-title.png) If you find something wrong within an article, you can submit feedback to the SQ ## Contribute to Microsoft 365 documentation -Did you know that you could edit the content on docs.microsoft.com yourself? If you do so, not only will our documentation improve, but you'll also be credited as a contributor to the page. To get started, see: +Did you know that you could edit the content on Microsoft Docs yourself? If you do so, not only will our documentation improve, but you'll also be credited as a contributor to the page. To get started, see: - [Microsoft Docs contributor guide](/contribute/) ## Next steps -- Get started with the [Microsoft 365 technical documentation](index.yml).+- Get started with the [Microsoft 365 technical documentation](index.yml). |
security | Mdb Onboard Devices | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-onboard-devices.md | Choose one of the following options to onboard Windows client devices to Defende ### Local script for Windows 10 and 11 -You can use a local script to onboard Windows client devices. When you run the onboarding script on a device, it creates a trust with Azure Active Directory, if that trust doesn't already exist; enrolls the device in Microsoft Intune, if it isn't already enrolled; and then onboards the device to Defender for Business. The local script method works even if you don't currently have Intune, and this is the recommended method for Defender for Business customers. +You can use a local script to onboard Windows client devices. When you run the onboarding script on a device: ++- It creates a trust with Azure Active Directory, if that trust doesn't already exist. +- It enrolls the device in Microsoft Intune, if it isn't already enrolled and then onboards the device to Defender for Business. +- The local script method works even if you don't currently have Intune, and this is the recommended method for Defender for Business customers. > [!TIP] > We recommend that you onboard up to 10 devices at a time when you use the local script method. Choose one of the following options to onboard Mac: ### Local script for Mac -When you run the local script on a Mac, it creates a trust with Azure Active Directory, if that trust doesn't already exist; enrolls the Mac in Microsoft Intune, if it isn't already enrolled; and then onboards the Mac to Defender for Business. We recommend that you onboard up to 10 devices at a time using this method. +When you run the local script on a Mac: ++- It creates a trust with Azure Active Directory, if that trust doesn't already exist. +- It enrolls the Mac in Microsoft Intune, if it isn't already enrolled and then onboards the Mac to Defender for Business. +- We recommend that you onboard up to 10 devices at a time using this method. 1. Go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in. To view the list of devices that are onboarded to Defender for Business, go to t ## Mobile devices -You can use Microsoft Intune to onboard mobile devices, such as Android and iOS/iPadOS devices. See the following resources to get help enrolling these devices into Intune: +Use Microsoft Intune to onboard mobile devices, such as Android and iOS/iPadOS devices. See the following resources to get help enrolling these devices into Intune: - [Enroll Android devices](/mem/intune/enrollment/android-enroll) - [Enroll iOS or iPadOS devices](/mem/intune/enrollment/ios-enroll) After a device is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md). +> [!NOTE] +> Defender for Business standalone does not include the Intune license that is required to onboard iOS and Android devices. You can add Intune to your Defender for Business subscription to onboard mobile devices. + ## View a list of onboarded devices To view the list of devices that are onboarded to Defender for Business, go to the Microsoft 365 Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). On the navigation pane, under **Endpoints**, choose **Device inventory**. |
security | TOC | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/TOC.md | ##### [Investigate files](investigate-files.md) ##### [Investigate devices](investigate-machines.md) ##### [Investigate an IP address](investigate-ip.md) -##### [Investigate a domain](investigate-domain.md) +##### [Investigate domains and URLs associated with a Microsoft Defender for Endpoint alert](investigate-domain.md) ###### [Investigate connection events that occur behind forward proxies](investigate-behind-proxy.md) ##### [Investigate a user account](investigate-user.md) |
security | Enable Troubleshooting Mode | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/enable-troubleshooting-mode.md | Microsoft Defender for Endpoint troubleshooting mode allows you to troubleshoot Windows Server 2022|>=20348.617|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558) Windows Server 2019 (RS5)|>=17763.2746|[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551) +- Troubleshooting mode is also available for machines running the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. During troubleshooting mode, use `Set-MPPreference -DisableTamperProtection $true` to temporarily disable tamper protection on your device and make your necessary configuration changes. Before you use troubleshooting mode, make sure all of the following components are up to date: ++ - Sense version 10.8049.22439.1084 or later ([KB5005292: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292)) ++ - Defender Antivirus - Platform: 4.18.2207.7 or later ([KB4052623: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623)) ++ - Defender Antivirus - Engine: 1.1.19500.2 or later ([KB2267602: Microsoft Update Catalog](https://www.microsoft.com/en-us/wdsi/defenderupdates)) + - For troubleshooting mode to be applied, Microsoft Defender for Endpoint must be tenant-enrolled and active on the device. - The device must be actively running Microsoft Defender Antivirus, version 4.18.2203 or later. Microsoft Defender for Endpoint troubleshooting mode allows you to troubleshoot Here are some pre-built advanced hunting queries to give you visibility into the troubleshooting events that are occurring in your environment. You can also use these queries to [create detection rules](/defender/custom-detection-rules.md#create-a-custom-detection-rule) that'd alert you when the devices are in troubleshooting mode. ### Get troubleshooting events for a particular device-Search by deviceId or deviceName by commenting out the respective lines. ++Search by deviceId or deviceName by commenting out the respective lines. + ```kusto //let deviceName = "<deviceName>"; // update with device name let deviceId = "<deviceID>"; // update with device id |
security | Investigate Domain | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/investigate-domain.md | Title: Investigate Microsoft Defender for Endpoint domains + Title: Investigate domains and URLs associated with a Microsoft Defender for Endpoint alert description: Use the investigation options to see if devices and servers have been communicating with malicious domains. keywords: investigate domain, domain, malicious domain, Microsoft Defender for Endpoint, alert, URL -# Investigate a domain associated with a Microsoft Defender for Endpoint alert +# Investigate domains and URLs associated with a Microsoft Defender for Endpoint alert [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -Investigate a domain to see if devices and servers in your enterprise network have been communicating with a known malicious domain. +Investigate a domain to see if the devices and servers in your enterprise network have been communicating with a known malicious domain. -You can investigate a domain by using the search feature or by clicking on a domain link from the **Device timeline**. +You can investigate a URL or domain by using the search feature, from the incident experience (in evidence tab, or from the alert story) or by clicking on the URL or domain link from the **Device timeline**. -You can see information from the following sections in the URL view: +You can see information from the following sections in the URL and domain view: -- URL details, Contacts, Nameservers-- Alerts related to this URL -- URL in organization-- Most recent observed devices with URL+- Domain details, registrant contact information -## URL worldwide +- Microsoft verdict -The **URL Worldwide** section lists the URL, a link to further details at Whois, the number of related open incidents, and the number of active alerts. +- Incidents related to this URL or domain -## Incident +- Prevalence of the URL or domain in the organization -The **Incident** card displays a bar chart of all active alerts in incidents over the past 180 days. +- Most recent observed devices with URL or domain -## Prevalence + ![The overview section of the new URL & domain page at a glance.](media/domain-url-overview.png) -The **Prevalence** card provides details on the prevalence of the URL within the organization, over a specified period of time. +### Domain entity -Although the default time period is the past 30 days, you can customize the range by selecting the downward-pointing arrow in the corner of the card. The shortest range available is for prevalence over the past day, while the longest range is over the past 6 months. +You can pivot to the domain page from the domain details in the URL page or side panel, just click on **View domain page** link. The domain entity shows an aggregation of all the data from the URLs with the FQDN (Fully qualified domain name). For example, if one device is observed communicating with `sub.domain.tld/path1`, and another device is observed communicating with `sub.domain.tld/path2`, each URL of the above will show one device observation, and the domain will show the two device observations. In this case, a device that communicated with `othersub.domain.tld/path` won't correlate to this domain page, but to `othersub.domain.tld`. -## Alerts +## URL and Domain overview -The **Alerts** tab provides a list of alerts that are associated with the URL. The table shown here is a filtered version of the alerts visible on the Alert queue screen, showing only alerts associated with the domain, their severity, status, the associated incident, classification, investigation state, and more. +The URL worldwide section lists the URL, a link to further details at Whois, the number of related open incidents, and the number of active alerts. -The Alerts tab can be adjusted to show more or less information, by selecting **Customize columns** from the action menu above the column headers. The number of items displayed can also be adjusted, by selecting **items per page** on the same menu. +### URL summary details -## Observed in organization +Displays the original URL (existing URL information), with the query parameters and the application-level protocol. Below that you can find the full domain details, such as registration date, modification date and registrant contact info. -The **Observed in organization** tab provides a chronological view on the events and associated alerts that were observed on the URL. This tab includes a timeline and a customizable table listing event details, such as the time, device, and a brief description of what happened. +Microsoft verdict of the URL or domain and a devices prevalence section. In this area, you can see the number of devices that communicated with the URL or domain in the last 30 days, and pivot to the first or last event in the device timeline right away. To investigate initial access or if there's still a malicious activity in your environment. -You can view events from different periods of time by entering the dates into the text fields above the table headers. You can also customize the time range by selecting different areas of the timeline. +### Incidents and alerts -**Investigate a domain:** +The Incident and alerts section displays a bar chart of all active alerts in incidents over the past 180 days. ++### Microsoft Verdict ++The Microsoft verdict section displays the verdict of the URL or domain from Microsoft TI library. It shows if the URL or domain is already known as phishing or malicious entity. ++### Prevalence ++The Prevalence section provides the details on the prevalence of the URL within the organization, over the last 30 days, such and trend chart – which shows the number of distinct devices that communicated with the URL or domain over a specific period of time. Below if you can find details of the first and last device observations communicated with the URL in the last 30 days, where you can pivot to the device timeline right away, to investigate initial access from the phish link, or if there’s still a malicious communication in your environment. ++## Incident and alerts ++![The incident and alerts tab provides a list of incidents that are associated with the URL or domain.](media/domain-incidents.png) ++The incident and alerts tab provides a list of incidents that are associated with the URL or domain. The table shown here is a filtered version of the incidents visible on the Incident queue screen, showing only incidents associated with the URL or domain, their severity, impacted assets and more. ++The incidents and alerts tab can be adjusted to show more or less information, by selecting **Customize columns** from the action menu above the column headers. The number of items displayed can also be adjusted, by selecting items per page on the same menu. ++## Devices ++![The device tab displays the number of distinct devices that communicated with the URL or domain over a specific period of time.](media/domain-device-overview.png) ++The Devices tab provides a chronological view of all the devices that were observed for a specific URL or a domain. This tab includes a trend chart and a customizable table listing device details, such as risk level, domain and more. Beyond that, you can see the first and last event times where the device interacted with the URL or domain, and the action type of this event. Using the menu next to the device name, you can quickly pivot to the device timeline to further investigate what happened before or after the event that involved this URL or domain. ++Although the default time period is the past 30 days, you can customize this from the drop-down available at the corner of the card. The shortest range available is for prevalence over the past day, while the longest range is over the past six months. ++Using the export button above the table, you can export all the data into a .csv file (including the first and last event time and action type), for further investigation and reporting. ++### Investigate a URL or domain 1. Select **URL** from the **Search bar** drop-down menu.+ 2. Enter the URL in the **Search** field.-3. Click the search icon or press **Enter**. Details about the URL are displayed. Note: search results will only be returned for URLs observed in communications from devices in the organization. + +3. Click the search icon or press **Enter**. Details about the URL are displayed. ++ > [!NOTE] + > Search results will only be returned for URLs observed in communications from devices in the organization. + 4. Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all devices in the organization observed communicating with the URL, the file associated with the communication and the last date observed.-5. Clicking any of the device names will take you to that device's view, where you can continue investigate reported alerts, behaviors, and events. + +5. Clicking any of the device names will take you to that device's view, where you can continue to investigate reported alerts, behaviors, and events. -## Related topics +## Related articles - [View and organize the Microsoft Defender for Endpoint Alerts queue](alerts-queue.md) - [Manage Microsoft Defender for Endpoint alerts](manage-alerts.md) - [Investigate Microsoft Defender for Endpoint alerts](investigate-alerts.md) |
security | Linux Whatsnew | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/linux-whatsnew.md | This article is updated frequently to let you know what's new in the latest rele - [What's new in Defender for Endpoint on macOS](mac-whatsnew.md) - [What's new in Defender for Endpoint on iOS](ios-whatsnew.md) +<details> + <summary>Sep-2022 (Build: 101.80.97 | Release version: 30.122072.18097.0)</summary> ++ Released: **September 14, 2022**<br/> + Published: **September 14, 2022**<br/> + Build: **101.80.97**<br/> + Release version: **30.122072.18097.0**<br/> + Engine version: **1.1.19300.3**<br/> + Signature version: **1.369.395.0**<br/> ++**What's new** ++- Fixes a kernel hang observed on select customer workloads running mdatp version 101.75.43. After RCA this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) are not impacted by this issue. +</br> ++<br/><br/> +</details> + <details> <summary>Aug-2022 (Build: 101.75.43 | Release version: 30.122071.17543.0)</summary> |
security | Manage Updates Baselines Microsoft Defender Antivirus | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus.md | ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security ms.localizationpriority: high Previously updated : 09/08/2022 Last updated : 09/13/2022 audience: ITPro All our updates contain - Serviceability improvements - Integration improvements (Cloud, [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender)) <br/><br/>-<details> -<summary> August-2022 (Platform: 4.18.2207.7| Engine: 1.1.19600.3)</summary> -ΓÇ» - Security intelligence update version: **1.373.1647.0** <br/> - Released: **September 6th, 2022**<br/> +<details> +<summary>August-2022 (Platform: 4.18.2207.7 | Engine: 1.1.19600.3)</summary> ++ Security intelligence update version: **1.373.1647.0**<br/> + Release date: **September 6, 2022**<br/>  Platform: **4.18.2207.7**<br/>  Engine: **1.1.19600.3**<br/>  Support phase: **Security and Critical Updates**<br/>-ΓÇ» + Engine version: 1.1.19600.3<br/>-Security intelligence update version: 1.373.1647.0<br/> -ΓÇ» -### What's new --- Fixed Unified agent installer issues on WS2012R2 Server and Windows Server 2016 <br/>-- Fixed remediation issue for custom detection <br/>-- Fixed Race condition related to behavior monitoring <br/>-- Resolved multiple deadlock scenarios in Defender dlls <br/>-- Improved frequency of Windows toasts notification for ASR rules - -### Known Issues --No known issues --<br/> -</details> -<details> +Security intelligence update version: 1.373.1647.0 <br/> ++### What's new ++- Fixed Unified agent installer issues on WS2012R2 Server and Windows Server 2016 +- Fixed remediation issue for custom detection +- Fixed Race condition related to behavior monitoring +- Resolved multiple deadlock scenarios in Defender dlls +- Improved frequency of Windows toasts notification for ASR rules ++### Known Issues ++- None ++<br/><br/> +</details><details> <summary>July-2022 (Platform: 4.18.2207.5 | Engine: 1.1.19500.2)</summary>  Security intelligence update version: **1.373.219.0**<br/> |
security | Partner Applications | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/partner-applications.md | Logo|Partner name|Description :|:|: ![Image of Aruba ClearPass Policy Manager logo.](images/aruba-logo.png)|[Aruba ClearPass Policy Manager](https://go.microsoft.com/fwlink/?linkid=2127544)|Ensure Defender for Endpoint is installed and updated on each endpoint before allowing access to the network ![Image of Blue Hexagon for Network logo.](images/bluehexagon-logo.png)|[Blue Hexagon for Network](/learn/modules/explore-malware-threat-protection/)|Blue Hexagon has built the industry's first real-time deep learning platform for network threat protection-![Image of Corelight logo.](images/logo-corelight.png)| [Corelight]( https://corelight.com/integrations/iot-security)| Using data, sent from Corelight network appliances, Microsoft 365 Defender gains increased visibility into the network activities of unmanaged devices, including communication with other unmanaged devices or external networks. +![Image of Corelight logo.](images/logo-corelight.png)| [Corelight](https://corelight.com/integrations/iot-security)| Using data, sent from Corelight network appliances, Microsoft 365 Defender gains increased visibility into the network activities of unmanaged devices, including communication with other unmanaged devices or external networks. ![Image of CyberMDX logo.](images/cybermdx-logo.png)|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2135620)|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Defender for Endpoint environment ![Image of HYAS Protect logo.](images/hyas-logo.png)|[HYAS Protect](https://go.microsoft.com/fwlink/?linkid=2156763)|HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect Microsoft Defender for Endpoint endpoints from cyberattacks ![Image of Vectra Network Detection and Response (NDR) logo.](images/vectra-logo.png)|[Vectra Network Detection and Response (NDR)](https://go.microsoft.com/fwlink/?linkid=866934)|Vectra applies AI & security research to detect and respond to cyber-attacks in real time |
security | Whats New In Microsoft Defender Endpoint | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md | For more information on Microsoft Defender for Endpoint on other operating syste ## August 2021 -- (Preview) [Microsoft Defender for Endpoint Plan 1 ](defender-endpoint-plan-1.md) <br/>Defender for Endpoint Plan 1 (preview) is an endpoint protection solution that includes next-generation protection, attack surface reduction, centralized management and reporting, and APIs. Defender for Endpoint Plan 1 (preview) is a new offering for customers who want to try our endpoint protection capabilities, have Microsoft 365 E3, and do not yet have Microsoft 365 E5. +- (Preview) [Microsoft Defender for Endpoint Plan 1](defender-endpoint-plan-1.md) <br/>Defender for Endpoint Plan 1 (preview) is an endpoint protection solution that includes next-generation protection, attack surface reduction, centralized management and reporting, and APIs. Defender for Endpoint Plan 1 (preview) is a new offering for customers who want to try our endpoint protection capabilities, have Microsoft 365 E3, and do not yet have Microsoft 365 E5. To learn more, see [Microsoft Defender for Endpoint Plan 1 (preview)](defender-endpoint-plan-1.md). Existing [Defender for Endpoint](microsoft-defender-endpoint.md) capabilities will be known as Defender for Endpoint Plan 2. - (Preview) [Web Content Filtering](web-content-filtering.md)<br> Web content filtering is part of web protection capabilities in Microsoft Defender for Endpoint. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns. |
security | Advanced Hunting Emailevents Table | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/advanced-hunting-emailevents-table.md | For information on other tables in the advanced hunting schema, [see the advance | `UserLevelPolicy` | `string` | End-user mailbox policy that triggered the action taken on the email | | `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. | | `AuthenticationDetails` | `string` | List of pass or fail verdicts by email authentication protocols like DMARC, DKIM, SPF or a combination of multiple authentication types (CompAuth) |+| `BulkComplaintLevel` | `int` | Threshold assigned to email from bulk mailers, a high bulk complaint level (BCL) means the email is more likely to generate complaints, and thus more likely to be spam | ## Related topics |
security | Microsoft 365 Defender Train Security Staff | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender/microsoft-365-defender-train-security-staff.md | With the urgency of protecting your organization and its data from attackers, yo The content is structured into three different knowledge levels, with multiple modules: Fundamentals, Intermediate, and Expert. Each level includes a knowledge check to test your understanding of the material. -## Microsoft Learn learning paths +## Learning paths -Use these Microsoft Learn learning paths and their modules to build an understanding of Microsoft 365 Defender and Microsoft Defender for Endpoint, one module and unit at a time. +Use these learning paths and their modules to build an understanding of Microsoft 365 Defender and Microsoft Defender for Endpoint, one module and unit at a time. - [Detect and respond to cyber attacks with Microsoft 365 Defender](/learn/paths/defender-detect-respond/) One of the best ways to learn is by configuring and testing Microsoft 365 Defend ## Simulating an attack To test your security staff on their ability to detect and respond to a cyberattack, use a simulated attack. See [Simulate attacks with the Microsoft 365 Defender portal](eval-defender-investigate-respond-simulate-attack.md#simulate-attacks-with-the-microsoft-365-defender-portal) for more information. - |
security | Old Index | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/old-index.md | This quick-reference will help you understand what capabilities come with each M - If your current subscription doesn't include Microsoft Defender for Office 365 and you want it, [contact sales to start a trial](https://info.microsoft.com/ww-landing-M365SMB-web-contact.html), and find out how Microsoft Defender for Office 365 can work for in your organization. > [!TIP]-> ***Insider tip***. You can use the docs.microsoft.com table of contents to learn about EOP and Microsoft Defender for Office 365. Navigate back to this page, [Office 365 Security overview](index.yml), and you'll notice that table of contents organization in the side-bar. It begins with Deployment (including migration) and then continues into prevention, detection, investigation, and response. <p> This structure is divided so that **Security Administration** topics are followed by **Security Operations** topics. If you're a new member of either job role, use the link in this tip, and your knowledge of the table of contents, to help learn the space. Remember to use *feedback links* and *rate articles* as you go. Feedback helps us improve what we offer you. +> ***Insider tip***. You can use the Microsoft Docs table of contents to learn about EOP and Microsoft Defender for Office 365. Navigate back to this page, [Office 365 Security overview](index.yml), and you'll notice that table of contents organization in the side-bar. It begins with Deployment (including migration) and then continues into prevention, detection, investigation, and response. <p> This structure is divided so that **Security Administration** topics are followed by **Security Operations** topics. If you're a new member of either job role, use the link in this tip, and your knowledge of the table of contents, to help learn the space. Remember to use *feedback links* and *rate articles* as you go. Feedback helps us improve what we offer you. ## Where to go next |
security | Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/overview.md | This quick-reference will help you understand what capabilities come with each M - Microsoft Defender for Office 365 P2 customers have access to **Microsoft 365 Defender integration** to efficiently detect, review, and respond to incidents and alerts. > [!TIP]-> ***Insider tip***. You can use the docs.microsoft.com table of contents to learn about EOP and Microsoft Defender for Office 365. Navigate back to this page, [Office 365 Security overview](index.yml), and you'll notice that table of contents organization in the side-bar. It begins with Deployment (including migration) and then continues into prevention, detection, investigation, and response. <p> This structure is divided so that **Security Administration** topics are followed by **Security Operations** topics. If you're a new member of either job role, use the link in this tip, and your knowledge of the table of contents, to help learn the space. Remember to use *feedback links* and *rate articles* as you go. Feedback helps us improve what we offer you. +> ***Insider tip***. You can use the Microsoft Docs table of contents to learn about EOP and Microsoft Defender for Office 365. Navigate back to this page, [Office 365 Security overview](index.yml), and you'll notice that table of contents organization in the side-bar. It begins with Deployment (including migration) and then continues into prevention, detection, investigation, and response. <p> This structure is divided so that **Security Administration** topics are followed by **Security Operations** topics. If you're a new member of either job role, use the link in this tip, and your knowledge of the table of contents, to help learn the space. Remember to use *feedback links* and *rate articles* as you go. Feedback helps us improve what we offer you. ## Where to go next |
security | Safe Attachments | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/safe-attachments.md | Safe Attachments in [Microsoft Defender for Office 365](defender-for-office-365. Safe Attachments protection for email messages is controlled by Safe Attachments policies. Although there's no default Safe Attachments policy, the **Built-in protection** preset security policy provides Safe Attachments protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Attachments policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Attachments policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Attachments policies in Microsoft Defender for Office 365](set-up-safe-attachments-policies.md). -If a file attachment is encrypted or password protected, it can't be examined by Safe Attachments. The message with the attachment will be delivered, and the recipient receives no warning that the file hasn't been scanned by Safe Attachments. - The following table describes scenarios for Safe Attachments in Microsoft 365 and Office 365 organizations that include Microsoft Defender for Office 365 (in other words, lack of licensing is never an issue in the examples). |Scenario|Result| |
security | Assess The Impact Of Security Configuration Changes With Explorer | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/assess-the-impact-of-security-configuration-changes-with-explorer.md | Title: Assess the impact of security configuration changes with Explorer description: Examples and walkthrough of using Explorer to determine the impact of a security control (configuration) change in Microsoft Defender for Office 365 search.product: search.appverid:- ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Assess the impact of security configuration changes with Explorer |
security | Connect Microsoft Defender For Office 365 To Microsoft Sentinel | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md | Title: Connect Microsoft Defender for Office 365 to Microsoft Sentinel description: The steps to connect Microsoft Defender for Office 365 to Sentinel. Add your Microsoft Defender for Office 365 data (*and* data from the rest of the Microsoft 365 Defender suite), including incidents, to Microsoft Sentinel for a single pane of glass into your security. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Connect Microsoft Defender for Office 365 to Microsoft Sentinel |
security | Deploy And Configure The Report Message Add In | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md | Title: How-to deploy and configure the report message add-in description: The steps to deploy and configure Microsoft's phish reporting add-in(s) aimed at security administrators. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Deploy and configure the report message add-in to users. |
security | Ensuring You Always Have The Optimal Security Controls With Preset Security Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/ensuring-you-always-have-the-optimal-security-controls-with-preset-security-policies.md | Title: Steps to quickly set up the Standard or Strict preset security policies f description: Step to setup preset security policies in Microsoft Defender for Office 365 so you have the security recommended by the product. Preset policies set a security profile of either *Standard* or *Strict*. Set these and Microsoft Defender for Office 365 will manage and maintain these security controls for you. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Set up steps for the Standard or Strict preset security policies in Microsoft Defender for Office 365 |
security | How To Configure Quarantine Permissions With Quarantine Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-configure-quarantine-permissions-with-quarantine-policies.md | Title: How to configure quarantine permissions and policies description: The steps to configure quarantine policies and permissions across different groups, including AdminOnlyPolicy, limited access, full access, and providing security admins and users with a simple way to manage false positive folders. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to configure quarantine permissions and policies |
security | How To Enable Dmarc Reporting For Microsoft Online Email Routing Address Moera And Parked Domains | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md | Title: How to enable DMARC Reporting for Microsoft Online Email Routing Address description: The steps to configure DMARC for MOERA and parked domains. search.product: search.appverid:- ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains |
security | How To Handle False Negatives In Microsoft Defender For Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-negatives-in-microsoft-defender-for-office-365.md | Title: (False Negatives) How to handle malicious emails that are delivered to re description: The steps to handle malicious emails coming through to end users and inboxes (as False Negatives) with Microsoft Defender for Office 365 in order to prevent loss of business. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to handle malicious emails that are delivered to recipients (False Negatives), using Microsoft Defender for Office 365 |
security | How To Handle False Positives In Microsoft Defender For Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-handle-false-positives-in-microsoft-defender-for-office-365.md | Title: (False Positives) How to handle legitimate emails getting blocked from de description: The steps to handle legitimate email getting blocked(False Positive) by Microsoft Defender for Office 365 in order to prevent lose of business. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to handle Legitimate emails getting blocked (False Positive), using Microsoft Defender for Office 365 |
security | How To Prioritize And Manage Automated Investigations And Response Air | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-and-manage-automated-investigations-and-response-air.md | Title: How to prioritize and manage Automated Investigations and Response (AIR). description: How to steps to analyze and approve AIR actions directly from the Action Center. When alerts are triggered, Automated Investigation and Response (AIR) determines the scope of impact of a threat in your organization and provided recommended remediation actions. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Prioritize and manage Automated Investigations and Response (AIR) |
security | How To Prioritize Manage Investigate And Respond To Incidents In Microsoft 365 Defender | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-prioritize-manage-investigate-and-respond-to-incidents-in-microsoft-365-defender.md | Title: How to prioritize, Manage, Investigate & Respond to Incidents in Microsof description: The steps to manage alerts triggered in Microsoft 365 Defender. Automated investigation and response (AIR) hunt across the subscription and determines the impact and scope of a threat, and combines the information into a single Incident. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Prioritize, Manage, Investigate & Respond to Incidents in Microsoft 365 Defender |
security | How To Run Attack Simulations For Your Team | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-run-attack-simulations-for-your-team.md | Title: How to run attack simulations for your team description: The steps to send an Attack Simulation payload to your target users for your team or organization for training. Simulated attacks can help you identify and find vulnerable users, policies and practices before a real attack impacts your organization. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to run attack simulations for your team |
security | How To Setup Attack Simulation Training For Automated Attacks And Training | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md | Title: How to setup automated attacks and training within Attack simulation trai description: The steps to automate Attack Simulation training and send a payload to target users. By following this guide, you will learn to create automated attack flows with specific techniques and payloads. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # How to setup automated attacks and training within Attack simulation training |
security | Optimize And Correct Security Policies With Configuration Analyzer | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md | Title: Optimize and correct security policies with configuration analyzer description: The steps to optimize and correct security policies with configuration analyzer. Configuration analyzer is a central location and single pane of glass for administering and viewing the email security policies you have configured in your tenant. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Optimize and correct security policies with configuration analyzer |
security | Protect Your C Suite With Priority Account Protection | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md | Title: Protect your c-suite with Priority account protection in Microsoft Defend description: The steps to protect your c-suite with priority account protection. Tagging an account as a Priority account will enable the additional protection tuned for the mail flow patterns targeting company executives, along with extra visibility in reports, alerts, and investigations. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Protect your c-suite with priority account protection |
security | Search For Emails And Remediate Threats | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/search-for-emails-and-remediate-threats.md | Title: Search for emails and remediate threats using Threat Explorer in Microsof description: The steps to do manual remediation in Threat Explorer in Microsoft 365 Defender, including how to get the best performance and scenarios that call for remediation. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Steps to use manual email remediation in Threat Explorer |
security | Stay Informed With Message Center | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/stay-informed-with-message-center.md | Title: Steps to set up a weekly digest email of message center changes for Micro description: The steps to setup a weekly digest email of message center activity to stay up-to-date about changes to Microsoft Defender for Office 365. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Set up a digest notification of changes to Microsoft Defender for Office 365 using the message center |
security | Step By Step Guide Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/step-by-step-guide-overview.md | Title: Microsoft Defender for Office 365 step-by-step guides and how to use them description: What are the step-by-step-guides for Microsoft 365 Defender for Office 365? See *only the steps needed to complete a task* and set up features. Information for use in trial subscriptions and production. Guidance designed to minimise information overload and speed up your configuration and use. search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Welcome to the Microsoft Defender for Office 365 step-by-step guides |
security | Utilize Microsoft Defender For Office 365 In Sharepoint Online | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md | Title: Use Microsoft Defender for Office 365 in SharePoint Online description: The steps to ensure that you can use, and get the value from, Microsoft Defender for Office 365 in SharePoint Online and OneDrive for Business search.product: search.appverid: - ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security+ms.technology: mdo # Use Microsoft Defender for Office 365 with SharePoint Online |
security | View Email Security Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/view-email-security-reports.md | |
security | View Mail Flow Reports | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/view-mail-flow-reports.md | |
security | View Reports For Mdo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/view-reports-for-mdo.md | |
security | Virus Detection In Spo | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/virus-detection-in-spo.md | |
security | Walkthrough Spoof Intelligence Insight | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight.md | |
security | What S The Difference Between Junk Email And Bulk Email | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/what-s-the-difference-between-junk-email-and-bulk-email.md | |
security | Whats New In Defender For Office 365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/whats-new-in-defender-for-office-365.md | |
security | Zero Hour Auto Purge | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/zero-hour-auto-purge.md | |
security | Top Security Tasks For Remote Work | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/top-security-tasks-for-remote-work.md | Microsoft 365 includes several ways to monitor status and take appropriate actio Congratulations! You have quickly implemented some of the most important security protections and your organization is much more secure. Now you're ready to go even further with threat protection capabilities (including Microsoft Defender for Endpoint), data classification and protection capabilities, and securing administrative accounts. For a deeper, methodical set of security recommendations for Microsoft 365, see [Microsoft 365 Security for Business Decision Makers (BDMs)](Microsoft-365-security-for-bdm.md). -Also visit Microsoft's new Defender for Cloud on [docs.microsoft.com/security](/security). +Also visit Microsoft's new Defender for Cloud in [Security documentation](/security). |
whiteboard | Manage Clients Gcc | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-clients-gcc.md | -description: Learn which clients are currently supported for Whiteboard. -+description: Learn which clients are currently supported for Whiteboard in GCC environments. Whiteboard clients are currently being updated to support OneDrive for Business. The following clients are currently supported in Whiteboard: -- Standalone Whiteboard web application at [https://whiteboard.office365.us](https://whiteboard.office365.us)+- Standalone Whiteboard web application at [https://whiteboard.office.com](https://whiteboard.office.com) - Microsoft Teams meetings, chats, and channels using Teams desktop and web - Standalone Whiteboard application for mobile - Standalone Whiteboard applications for Windows 10 |
whiteboard | Manage Data Gcc | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-data-gcc.md | search.appverid: MET150 ms.localizationpriority: medium description: Learn how to enable, disable, and manage access to Whiteboard.- |
whiteboard | Manage Sharing Gcc | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/whiteboard/manage-sharing-gcc.md | search.appverid: MET150 ms.localizationpriority: medium description: Learn how to manage sharing for Microsoft Whiteboard in GCC environments.- |