Category | Microsoft Docs article | Related commit history on GitHub | Change details |
---|---|---|---|
index | Index | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/copilot/index.md | +# Welcome to microsoft-365-copilot! |
admin | Give Mailbox Permissions To Another User | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/give-mailbox-permissions-to-another-user.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 09/12/2023 audience: Admin |
admin | Remove Former Employee | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/add-users/remove-former-employee.md | f1.keywords: Previously updated : 08/21/2020 Last updated : 09/12/2023 audience: Admin To complete the steps in this series, you use these Microsoft 365 capabilities a |[Step 6 - Remove and delete the Microsoft 365 license from a former employee](remove-former-employee-step-6.md)|When you remove a license, you can assign it to someone else. Or, you can delete the license so you don't pay for it until you hire another person. <p> When you remove or delete a license, the user's old email, contacts, and calendar are retained for **30 days**, then permanently deleted. If you remove or delete a license but don't delete the account, the content in the user's OneDrive will remain accessible to you even after 30 days.| |[Step 7 - Delete a former employee's user account](remove-former-employee-step-7.md)|This removes the account from your admin center. Keeps things clean. Emails to the former employee's user account will not be received.| -## Watch: Delete a user +## Watch: Delete a user overview Check out this video and others on our [YouTube channel](https://go.microsoft.com/fwlink/?linkid=2198203). > [!VIDEO https://www.microsoft.com/videoplayer/embed/RE1FOfR?autoplay=false] -When an employee leaves the company, you'll need to remove them from your Microsoft 365 organization. Before doing so, you should block them from accessing company files, preserve the documents they created, and perform several other admin tasks associated with removing a user. --1. From the admin center, select **Users**, and choose **Active users**. -1. Select the user you want to remove, and then select **Delete user**. -1. Check the box to remove their license, and check the box to remove their email aliases. -1. Check the box to give another user access to the former employeeΓÇÖs email, and choose **Select a user and set email options**. -1. To remove associated email aliases, select **X** next to their aliases. -1. Review the shared mailbox information, and select **Finish**. -1. Confirm your options are set correctly, and choose **Assign and convert**. -1. Review your results, and select **Close**. --After you remove a user, you have up to 30 days to restore their account. - ## Does your organization use Active Directory? If your organization synchronizes user accounts to Microsoft 365 from a local Active Directory environment, you must delete and restore those user accounts in your local Active Directory service. You can't delete or restore them in Microsoft 365. |
admin | Add User Or Contact To Distribution List | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/email/add-user-or-contact-to-distribution-list.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 09/13/2023 audience: Admin description: "Learn how to add a Microsoft 365 user or contact such as an employ Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585). -As the admin of an organization, you may need to add one of your users or contacts to a distribution group (see [Create distribution groups in Microsoft 365](../setup/create-distribution-lists.md). For example, you can add employees or external partners or vendors to an email distribution group. +As the admin of an organization, you may need to add one of your users or contacts to a distribution group. See [Create distribution groups in Microsoft 365](../setup/create-distribution-lists.md). For example, you can add employees or external partners or vendors to an email distribution group. ++## Watch: Add a user to a distribution list -## Add a user or contact to a distribution group +> [!VIDEO https://www.microsoft.com/videoplayer/embed/ed4e6095-9a6a-4d3d-999d-698c39bb7ec8?autoplay=false] -1. In the admin center, go to the **Groups** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2052855" target="_blank">Groups</a> page. +## Steps -2. On the **Groups** page, select the name of the group you want to add a contact to. +1. In the Microsoft 365 admin center, select **Teams and groups** \> **Active teams and groups** \> **Distribution lists**. ++2. On the group page, select the name of the group you want to add a contact to. 3. On the **Members** tab, select **View all and manage members**. -4. On the **View Members** page, select **Add members**, and select the user or contact you want to add to the distribution group. - +4. On the **View Members** page, select **Add members**, and select the user or contact you want to add to the distribution group. + - + 5. Select **Save** and then **Close**. -## Watch: Add a user to a distribution list - -> [!VIDEO https://www.microsoft.com/videoplayer/embed/ed4e6095-9a6a-4d3d-999d-698c39bb7ec8?autoplay=false] + > [!NOTE] + > You can also remove a user on this page. Select the user, select the ellipsis symbol and choose **Remove member**. ## Next steps Learn to [send email as a distribution group in Microsoft 365](../manage/send-email-as-distribution-list.md).--## Related content --[Manage clutter for your organization](configure-clutter.md) (article)\ -[Create a shared mailbox](create-a-shared-mailbox.md) (article) |
admin | Send Email As Distribution List | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/send-email-as-distribution-list.md | f1.keywords: Previously updated : 02/18/2020 Last updated : 09/14/2023 audience: Admin -In Microsoft 365, you can send email as a distribution list. When a person who is a member of the distribution list replies to a message sent to the distribution list, the email appears to be from the distribution list, not from the individual user. This topic shows you how to do this. +In Microsoft 365, you can send email as a distribution list. When a person who is a member of the distribution list replies to a message sent to the distribution list, the email appears to be from the distribution list, not from the individual user. ## Before you begin Before you perform these steps, make sure you've been added to a Microsoft 365 d ## Outlook on the web -1. Open Outlook on the web and go to your inbox. - -2. Open a message that was sent to the distribution list. - -3. Select **Reply**. - -4. At the bottom of the message, select **More** \> **Show from**.<br/>  +1. Open Outlook on the web and go to your inbox. ++2. Open a message that was sent to the distribution list. ++3. Select **Reply**. ++4. At the bottom of the message, select **More** \> **Show from**. ++  -5. Right-click on the From address - such as `Ina@weewalter.me` - and choose **Remove**.<br/>  +5. Right-click on the From address - such as `Ina@weewalter.me` - and choose **Remove**. ++  -6. Then type the distribution list address such as support@contoso.com, and send the message. The next time you reply from the distribution list, its address will appear as an option in the **From** list.<br/> +6. Then type the distribution list address such as support@contoso.com, and send the message. The next time you reply from the distribution list, its address will appear as an option in the **From** list. ++  ## Outlook 1. Open Outlook desktop client. -2. Compose a New Email. Click the **From** field and select **Other email address**. If you do not see the From field, navigate to **Options** and select **From** in the Show fields section. +2. Select **New Email**. Click the **From** field and select **Other email address**. If you do not see the From field, navigate to **Options** and select **From** in the Show fields section. 3. Select the **Distribution List** address from the Global Address List. 4. Send the email. ## Related content--[Create, edit, or delete a security group in the Microsoft 365 admin center](../email/create-edit-or-delete-a-security-group.md) (article)\ -[Email collaboration](../email/email-collaboration.md) (article)\ -[Add a user or contact to a distribution group](../email/add-user-or-contact-to-distribution-list.md) (article) |
admin | Use Qr Code Download Outlook | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/manage/use-qr-code-download-outlook.md | f1.keywords: Previously updated : 10/26/2020 Last updated : 09/12/2023 audience: Admin description: "Learn how to use a QR code to authenticate and download Outlook mo As the Microsoft 365 administrator, you can enable your users to sign in to Outlook for Android or iOS app on their mobile devices without having to enter their username and password. By scanning a QR code, users can securely authenticate and sign in to Outlook mobile. -In Outlook on the web or other desktop Outlook applications, users may see notifications informing them that they can use Outlook on their mobile device. These notifications can be managed by the administrator using Exchange PowerShell. If users choose to send themselves an SMS text message to download the app on their mobile device, a QR code will appear on their computer. They will be able to scan the QR code to log into Outlook on their phone or tablet. This QR code is a short lived token that can only be redeemed once. +In Outlook on the web or other desktop Outlook applications, users may see notifications informing them that they can use Outlook on their mobile device. The administrator can manage these notifications by using Exchange PowerShell. If users choose to send themselves an SMS text message to download the app on their mobile device, a QR code appears on their computer. They'll be able to scan the QR code to log into Outlook on their phone or tablet. This QR code is a short lived token that can only be redeemed once. The notification is only generated if the following conditions are met: 1. The QR code experience is enabled for the tenant (this experience is enabled by default). -2. The user is not already using Outlook for iOS and Android. +2. The user isn't already using Outlook for iOS and Android. -3. The user has an empty state at reading pane (does not select the option of auto opening the first email). +3. The user has an empty state at reading pane (doesn't select the option of auto opening the first email). -4. The user did not dismiss the notification. +4. The user didn't dismiss the notification. > [!NOTE] > In some cases, your users must re-authenticate on their computer to generate the QR code. ## Use Exchange PowerShell -This feature is on by default. To disable this feature, follow the steps below. +This feature is on by default. To disable this feature, use the following steps. 1. [Connect to Exchange PowerShell](/powershell/exchange/connect-to-exchange-online-powershell).+ 2. Using PowerShell, you can disable the notifications informing your users about the Outlook mobile apps. This also prevents the QR code sign-in flow from being shown. -```powershell -Set-OrganizationConfig -MobileAppEducationEnabled <Boolean> -``` + ```powershell + Set-OrganizationConfig -MobileAppEducationEnabled <Boolean> + ``` > [!NOTE] > When using the Exchange PowerShell command, changes may take up to 8 hours to propagate. |
admin | Create Distribution Lists | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/create-distribution-lists.md | Title: Create distribution groups + Title: Create distribution lists f1.keywords: - NOCSH Previously updated : 02/19/2020 Last updated : 09/13/2023 audience: Admin description: "Create distribution groups or lists in the Microsoft 365 admin cen # Create distribution groups in the Microsoft 365 admin center Check out all of our small business content on [Small business help & learning](https://go.microsoft.com/fwlink/?linkid=2224585).- -Used when you want to send email to group of people without having to type each individual recipient's name, distribution groups (distribution lists) are organized by a particular discussion subject (such as "Marketing") or by users who share common work that requires them to communicate frequently. They also provide a way for you to automatically forward email to multiple email addresses. -Distribution groups are sometimes called distribution lists. +Use distribution lists (sometimes called distribution groups) when you want to send email to group of people without having to type each individual recipient's name. Distribution lists can be organized by a particular discussion subject (such as "Marketing") or by users who share common work that requires them to communicate frequently. They also provide a way for you to automatically forward email to multiple email addresses. -## Create a distribution group (list) +## Create a distribution list (group) ::: moniker range="o365-worldwide" Go to the admin center at <a href="https://go.microsoft.com/fwlink/p/?linkid=850 ::: moniker-end -1. Select the app launcher icon and choose **Admin**. - - Can't find the app you're looking for? From the app launcher, select **All apps** to see an alphabetical list of the apps available to you. From there, you can search for a specific app. - -2. Select **Groups** \> **Groups** in the left navigation pane, and then select **Add a group**. - -3. On the **Choose a group type** field, choose **Distribution**, and then choose **Next**. - -4. Enter a name, description, and email alias for your new group, and choose whether you want people outside your organization to send email to the group. - -5. Press **Add** to create a group, and then review your group and choose **Close**. - -6. To add users to your distribution list, see [Add a user or contact to a distribution group](../email/add-user-or-contact-to-distribution-list.md). - -Check out how to use group in Outlook 2016 and Outlook on the web in [Use contact groups (formerly distribution lists) in Outlook](https://support.microsoft.com/office/1c97fcb2-0ed4-41e6-b401-58f9d7d40e39). +1. Select **Teams and groups** \> **Active teams and groups** \> **Distribution lists**. ++2. Select **Add a distribution list**. ++3. On the **Set up the basics** page, enter a name, description, and select **Next**. ++4. On the **Assign owners** page, select **Assign owners** and select a user and choose **Add**. Select **Next**. ++5. On the **Edit settings** page, create a group email address for your new group, and choose whether you want people outside your organization to send email to the group. Select **Next**. ++6. On the **Review and finish adding group** page, verify your group information and select **Create group**. ++To add users to your distribution list after you've created it, see [Add a user or contact to a distribution list](../email/add-user-or-contact-to-distribution-list.md). ++Check out how to use group in Outlook 2016 and Outlook on the web in [Use contact groups (formerly distribution lists) in Outlook](https://support.microsoft.com/office/1c97fcb2-0ed4-41e6-b401-58f9d7d40e39). -Check out [Distribution group issues](/office365/troubleshoot/groups/distribution-list-issues) for help with distribution list issues. +Check out [Distribution list issues](/office365/troubleshoot/groups/distribution-list-issues) for help with distribution list issues. ## Related content |
admin | Setup Outlook | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/admin/setup/setup-outlook.md | f1.keywords: Previously updated : 11/17/2020 Last updated : 09/14/2023 audience: Admin |
bookings | Add Staff | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/add-staff.md | Title: "Add staff to Bookings" Previously updated : 06/18/2020 Last updated : 09/14/2023 audience: Admin Although Bookings is a feature of Microsoft 365, not all of your staff members a ## Steps -1. Choose your calendar from the homepage. +1. From the Bookings home page, choose your calendar from the homepage. -2. Go to staff option in left pane and select **Add new staff**. +2. Go to staff option in left pane and select **Staff**, and then **Add new staff**. -3. When adding staff from within your organization, type their name in the **Add people** field and select them when they appear in the drop-down menu. The other fields will automatically populate. -- Once a staff member is added, you can edit the name that appears on all Bookings communications by selecting the **x** next to their name and editing the **Add people** field. This can be useful if you would like staff members to have a specific title or name displayed for customers, such as listing Adele Vance as ΓÇ£Dr. Vance, MD.ΓÇ¥ --4. To add staff from outside of your organization, manually fill in their email and other information. +3. When adding staff from within your organization, type their name in the search field and select them when they appear in the drop-down menu. The other fields will automatically populate. > [!NOTE]- > Staff from outside your tenant will not be able to share free/busy information with Bookings. + > To add staff from outside of your organization, manually fill in their email and other information. Staff from outside your tenant will not be able to share free/busy information with Bookings. -5. For each staff member, select a role: Team member, Scheduler, Viewer, or Guest. +4. For each staff member, select a role: Team member, Scheduler, Viewer, or Guest. - **Team member** can manage bookings on their own calendar and their availability in the booking mailbox. When adding or editing a booking in their calendar, they'll be assigned as staff. - **Scheduler** can manage bookings on the calendar and customer details. They have read-only access to settings, staff, and services. - **Viewer** can see all the bookings on the calendar, but they canΓÇÖt modify or delete them. They have read-only access to settings. - **Guest** can be assigned to bookings, but they canΓÇÖt open the booking mailbox. -6. Select **Notify all staff via email when a booking assigned to them is created or changed** to enable staff emails. The following is an example email: +5. Select **Notify all staff via email when a booking assigned to them is created or changed** to enable staff emails. The following is an example email: :::image type="content" source="media/bookings-notify-all-email.jpg" alt-text="A notification email from Bookings."::: -7. Select **Events on Microsoft 365 calendar affect availability** if you want the free/busy information from staff membersΓÇÖ calendars to impact availability for bookings services through Bookings. +6. Select **Events on Microsoft 365 calendar affect availability** if you want the free/busy information from staff membersΓÇÖ calendars to impact availability for bookings services through Bookings. For example, if a staff member has a team meeting or a personal appointment scheduled for 3pm on a Wednesday, Bookings will show that staff member as unavailable to be booked in that time slot. That time will appear as busy or tentative in the Bookings Page view, as shown in the below example. Although Bookings is a feature of Microsoft 365, not all of your staff members a > [!IMPORTANT] > We highly recommend leaving this setting on (it is turned on by default) to avoid double-bookings and to optimize the availability of your staff members. -8. Select **Use business hours** to set all bookable times for your staff members to be only within the business hours that you set in the **Business hours** section on the Business Information page. +7. Select **Use business hours** to set all bookable times for your staff members to be only within the business hours that you set in the **Business hours** section on the Business Information page. By deselecting this box, staff can be given custom hours that further limit when they can be booked. This is helpful for scenarios where a staff member may only be on site Tuesdays and Wednesdays, or they dedicate their mornings for one type of appointments, and their afternoons for other types. You may want to add a person to your staff list in Bookings without making them ```powershell Add-MailboxPermission -Identity <bookingmailbox@emailaddress> -User <adminusers@emailaddress> -AccessRights FullAccess -Deny:$false ```- + By default, the mailbox gets automatically mapped to Outlook. If you do not want the booking mailbox to appear in the user's Outlook, assign full access with the following commands:- + ```powershell Add-MailboxPermission -Identity <bookingmailbox@emailaddress> -User <adminusers@emailaddress> -AccessRights FullAccess -Deny:$false -AutoMapping:$false ``` Here's an example PowerShell command to add Allie Bellew to the Contoso daycare ```powershell Add-MailboxPermission -Identity "daycare@contoso.com" -User "Allie Bellew" -AccessRights FullAccess -AutoMapping:$false -InheritanceType All ```- + 2. Then run this command: ```powershell |
bookings | Bookings Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md | Title: "Microsoft Bookings" Previously updated : 06/24/2020 Last updated : 09/12/2023 audience: Admin |
bookings | Get Access | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/get-access.md | Title: "Get access to Microsoft Bookings" Previously updated : 06/18/2020 Last updated : 09/13/2023 audience: Admin ms.localizationpriority: medium - Tier1 - scotvorg description: "Learn how to get access to the Bookings feature in Microsoft 365." The first time you use [Bookings](https://outlook.office.com/bookings/onboarding 1. Enter your business name and business type and select **Continue**. -You're now ready to set up Bookings for your organization. You can get to the Bookings page with this [link](https://outlook.office.com/bookings/onboarding), from the app launcher or from office.com. Use the following topics to continue setting up your Bookings features. +You're ready to go. You can get to the Bookings page with this [link](https://outlook.office.com/bookings/onboarding), from the app launcher or from office.com. Use the following topics to continue setting up your Bookings features. - [Enter your business information](enter-business-information.md) - [Add staff to Bookings](add-staff.md) |
bookings | Turn Bookings On Or Off | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/turn-bookings-on-or-off.md | Title: "Turn Microsoft Bookings on or off" Previously updated : 08/04/2020 Last updated : 09/13/2023 audience: Admin ms.localizationpriority: medium - Tier1 - scotvorg description: "Learn how to get access to Microsoft Bookings in Microsoft 365." description: "Learn how to get access to Microsoft Bookings in Microsoft 365." Bookings can be turned on or off for your entire organization or for specific users. When you turn on Bookings for users, they can create a Bookings page, create a calendar, and allow other people to book time with them. This article is for owners and administrators who manage Bookings for their organizations. > [!NOTE]-> The admin controls described in these sections are not available for Office 365 Operated by 21Vianet (China) customers. +> The admin controls described in these sections aren't available for Office 365 Operated by 21Vianet (China) customers. ## Turn Bookings on or off for your organization using the Microsoft 365 admin center Bookings can be turned on or off for your entire organization or for specific us 2. In the admin center, go to **Settings** \> <a href="https://go.microsoft.com/fwlink/p/?linkid=2053743" target="_blank">**Org settings**</a>. -3. Select the checkbox for **Allow your organization to use Bookings** to enable or disable Bookings for your organization. +3. Select Bookings and choose the checkbox for **Allow your organization to use Bookings** to turn on or turn off Bookings for your organization. > [!NOTE] > Turning off Bookings will disable all access to the service including creation and management of Bookings pages. You can require employees in your organization to opt-in before their availabili When this setting is enabled, people added as staff in booking calendars will get an email with a link to **Approve/Reject** the request. +### Allow Microsoft to send SMS messages ++Set up Bookings to send reminders and information customers might need for a meeting or appointment. ++### Disable direct search engine indexing ++Hide your Bookings page from search results on Google, Bing or other search engines. + ### Enforce naming policy for Bookings calendar alias You can enforce a naming policy in your organization for all calendars. When this setting is enabled, administrators can define Prefix and Suffix. If selected, these rules will be enforced across all calendars. |
frontline | Deploy Dynamic Teams At Scale | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/frontline/deploy-dynamic-teams-at-scale.md | Last updated 08/04/2023 ## Overview >[!IMPORTANT]->This feature will begin rolling out for public preview in July 2023. If you would like to provide feedback and improve this feature while in preview, please fill out [this form](https://forms.microsoft.com/r/DWaJXA6Dax) +>This feature will begin rolling out for public preview in July 2023. If you would like to provide feedback and improve this feature while in preview, please fill out [this form](https://forms.microsoft.com/r/DWaJXA6Dax). Frontline teams are a collection of people, content, and tools within an organization for different frontline worker locations. Membership of frontline dynamic teams is determined and managed by a set of Azure Active Directory (Azure AD) attributes. [Learn more about Azure AD attributes](/azure/active-directory/external-identities/customers/how-to-define-custom-attributes). You also determine team structure and team owners. Then, you can choose which locations you want to create dynamic frontline teams for. -Team membership will be automatically managed over time through the power of dynamic teams. As frontline workers are onboarded, offboarded, or change locations, their membership in these teams will update accordingly. +Team membership is automatically managed over time through the power of dynamic teams. As frontline workers are onboarded, offboarded, or change locations, their membership in these teams are updated accordingly. ## Prerequisites -- Users must have a Microsoft 365 F3, F1, E1, E3, or E5 license. If a user doesn't have one of these licenses, they'll need an Azure AD P1 add-on license to use dynamic teams. [Learn more about frontline licensing](flw-licensing-options.md).-- The admin running the deployment process needs Teams admin center permissions.+- Users must have a Microsoft 365 F3, F1, E3, or E5 license. If a user doesn't have one of these licenses, they'll need an Azure AD P1 add-on license to use dynamic teams. [Learn more about frontline licensing](flw-licensing-options.md). +- The admin running the deployment process must have one of the following role combinations: + - Teams admin and Global admin + - Teams admin and Groups admin + - Teams admin and User admin + - Teams admin and Intune admin + - Ensure you can define your frontline workers and their work locations through data available in Azure AD. If you don't have this data in Azure AD, you can sync it through a [human capital management (HCM) connector](/azure/active-directory/app-provisioning/plan-cloud-hr-provision) or [use the PowerShell solution](deploy-teams-at-scale.md) to create teams at scale. - When evaluating the right solution, we recommend you do the following: 1. Plan your frontline deployment. You can manage your teams when changes happen in your organization. ### Edit your frontline team settings ->[!IMPORTANT] ->The ability to edit your frontline team settings is coming soon. - 1. In the left navigation of the [Teams admin center](https://admin.teams.microsoft.com), choose **Teams** > **Manage frontline teams**. 2. In the **Deploy settings** column, choose **Deploy frontline teams** . 3. Edit your settings on this page, and then select **Save**. Your settings may take several hours to update. See the following table for the effects of updating your settings. |
security | Mdb Get Help | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-business/mdb-get-help.md | - Title: Get help and support for Microsoft Defender for Business------ Previously updated : 09/07/2023--- SMB-- m365-security -- tier3- -description: Get help or contact support if you have any issues with Defender for Business. ---# Get help and support for Microsoft Defender for Business --## Get help and support --1. If you need help with Defender for Business, select the Help icon (?) in the upper right corner of the screen. --2. Type your question or issue, and then select the blue arrow, as shown in the following screenshot: -- :::image type="content" source="media/help-pane.png" alt-text="Screenshot of help pane with a question about how to add devices."::: -- Several options, such as quick answers or help articles, will be listed. --3. Select an item in the list of results. If you don't see the answer to your question, select **Contact Support** at the bottom of the flyout pane. For more information, see [Get support](../../admin/get-help-support.md) --## Resources for partners --If you're a Microsoft partner helping your customer with security capabilities in Defender for Business, see [Microsoft Defender for Business and Microsoft partner resources](mdb-partners.md). --## See also --- [Defender for Business - Frequently asked questions and answers](mdb-faq.yml)-- [Defender for Business troubleshooting](mdb-troubleshooting.yml) -- [Microsoft 365 Business Premium Overview](../../business-premium/index.md) |
security | Mac Whatsnew | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/mac-whatsnew.md | Network protection for macOS is now available for all Mac devices onboarded to D **Known issues** -Apple has fixed an issue on macOS [Ventura upgrade](<https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes>), which is fixed with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly.<br> -<br> -**Catalina Deprecation**<br> +Apple has fixed an issue on macOS [Ventura upgrade](<https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes>), which is fixed with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly. ++**Catalina Deprecation** + Microsoft Defender for Endpoint no longer supports macOS Catalina (10.15) as Apple ended support for Catalina (10.15) in December 2022.-</br> ++**Sonoma support** ++Microsoft Defender will support macOS Sonoma (14.0) as soon as Apple makes it generally available (September 26th, 2023). ++### Sep-2023 (Build: 101.23072.0025 | Release version: 20.123072.25.0) ++| Build: | **101.23072.0025** | +|--|--| +| Release version: | **20.123072.25.0** | +| Engine version: | **1.1.23050.3** | +| Signature version: | **1.397.911.0** | ++##### What's new ++- Bug and performance fixes +- Fix: Security Portal events may have missed ancestors details for short lived processes ### Aug-2023 (Build: 101.23062.0016 | Release version: 20.123062.16.0) -| Build: | **101.23062.0016** | +| Build: | **101.23062.0016** | |--|--|-| Release version: | **20.123062.16.0** | +| Release version: | **20.123062.16.0** | | Engine version: | **1.1.23050.3** |-| Signature version: | **1.395.436.0** | +| Signature version: | **1.395.436.0** | ##### What's new Microsoft Defender for Endpoint no longer supports macOS Catalina (10.15) as App ### Jul-2023 (Build: 101.23052.0004 | Release version: 20.123052.4.0) -| Build: | **101.23052.0004** | +| Build: | **101.23052.0004** | |--|--|-| Release version: | **20.123052.4.0** | +| Release version: | **20.123052.4.0** | | Engine version: | **1.1.20100.7** | | Signature version: | **1.391.2163.0** | Microsoft Defender for Endpoint no longer supports macOS Catalina (10.15) as App |--|--| | Release version: | **20.123042.19884.0** | | Engine version: | **1.1.20300.4** |-| Signature version: | **1.391.221.0** | +| Signature version: | **1.391.221.0** | ##### What's new |
security | Manage Security Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/manage-security-policies.md | Title: Manage endpoint security policies in Microsoft Defender for Endpoint description: Learn how to set windows, mac, and linux endpoint security policies such as antivirus, firewall, endpoint detection and response in Microsoft Defender for Endpoint. -keywords: policies, security policy, configure policies, -ms.sitesec: library -ms.pagetype: security ms.localizationpriority: medium Use security policies to manage security settings on devices. As a security admi You'll find endpoint security policies under **Endpoints > Configuration management > Endpoint security policies**. +> [!NOTE] +> The **Endpoint Security Policies** page in Microsoft 365 Defender is available only for [users with the security administrator role in Microsoft 365 Defender](/microsoft-365/security/defender-endpoint/assign-portal-access). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft 365 Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft 365 Defender portal. We recommend granting security administrators with the [Intune built-in role, ΓÇ£Endpoint Security ManagerΓÇ¥](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft 365 Defender. :::image type="content" source="./images/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft 365 Defender portal"::: The following list provides a brief description of each endpoint security policy - **Antivirus** - Antivirus policies help security admins focus on managing the discrete group of antivirus settings for managed devices. -- **Disk encryption** - Endpoint security Disk encryption profiles focus on only the settings that are relevant for a devices built-in encryption method, like FileVault or BitLocker. This focus makes it easy for security admins to manage disk encryption settings without having to navigate a host of unrelated settings.+- **Disk encryption** - Endpoint security disk encryption profiles focus on only the settings that are relevant for a devices built-in encryption method, like FileVault or BitLocker. This focus makes it easy for security admins to manage disk encryption settings without having to navigate a host of unrelated settings. - **Firewall** - Use the endpoint security Firewall policy in Intune to configure a devices built-in firewall for devices that run macOS and Windows 10/11. - **Endpoint detection and response** - When you integrate Microsoft Defender for Endpoint with Intune, use the endpoint security policies for endpoint detection and response (EDR) to manage the EDR settings and onboard devices to Microsoft Defender for Endpoint. -- **Attack surface reduction** - When Defender antivirus is in use on your Windows 10/11 devices, use Intune endpoint security policies for Attack surface reduction to manage those settings for your devices.+- **Attack surface reduction** - When Microsoft Defender Antivirus is in use on your Windows 10/11 devices, use Intune endpoint security policies for attack surface reduction to manage those settings for your devices. ## Create an endpoint security policy |
security | Microsoft Defender Endpoint Linux | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux.md | If you experience any installation failures, refer to [Troubleshooting installat > After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only. > [!CAUTION]- > Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. + > Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine). - Disk space: 2 GB |
security | Anti Spam Policies Configure | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/anti-spam-policies-configure.md | You can configure anti-spam policies in the Microsoft 365 Defender portal or in > [!NOTE] > The default value is 15 days in the default anti-spam policy and in new anti-spam policies that you create in PowerShell. The default value is 30 days in new anti-spam policies that you create in the Microsoft 365 Defender portal. >- > This setting also controls how long messages that were quarantined by **anti-phishing** policies are retained. For more information, see [Quarantined messages in EOP and Defender for Office 365](quarantine-about.md). + > This setting also controls how long messages that were quarantined by **anti-phishing** policies are retained. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention). - **Add this X-header text**: This box is required and available only if you selected **Add X-header** as the action for a spam filtering verdict. The value you specify is the header field _name_ that's added to the message header. The header field _value_ is always `This message appears to be spam`. |
security | Quarantine About | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-about.md | For anti-spam and anti-phishing protection, admins can also modify the default p The protection policies for [supported features](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features) have one or more _quarantine policies_ assigned to them (each action within the protection policy has an associated quarantine policy assignment). +## Quarantine policies + _Quarantine policies_ define what users are able to do or not do to quarantined messages, and whether users receive quarantine notifications for those messages. For more information, see [Anatomy of a quarantine policy](quarantine-policies.md#anatomy-of-a-quarantine-policy). +> [!TIP] +> You can create customized [quarantine notifications for different languages](quarantine-policies.md#customize-quarantine-notifications-for-different-languages). You can also [use a custom logo in quarantine notifications](quarantine-policies.md#customize-all-quarantine-notifications). + The default quarantine policies that are assigned to protection feature verdicts enforce the historical capabilities that users get for their quarantined messages (messages where they're a recipient). For more information, see the table in [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). For example, only admins can work with messages that were quarantined as malware or high confidence phishing. By default, users can work with their messages that were quarantined as spam, bulk, phishing, spoof, user impersonation, domain impersonation, or mailbox intelligence. Admins can create and apply custom quarantine policies that define less restrictive or more restrictive capabilities for users, and also turn on quarantine notifications. For more information, see [Create quarantine policies](quarantine-policies.md#step-1-create-quarantine-policies-in-the-microsoft-365-defender-portal). Both users and admins can work with quarantined messages: - Admins can work with all types of quarantined messages for all users, including messages that were quarantined as malware, high confidence phishing, or as a result of mail flow rules (also known as transport rules). For more information, see [Manage quarantined messages and files as an admin in EOP](quarantine-admin-manage-messages-files.md). + > [!TIP] + > For the permissions required to download and release any messages from quarantine, see the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin). + - Users can work with their quarantined messages based on the protection feature that quarantined the message, and the setting in corresponding quarantine policy. For more information, see [Find and release quarantined messages as a user in EOP](quarantine-end-user.md). - Admins can report false positives to Microsoft from quarantine. For more information, see [Take action on quarantined email](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-email) and [Take action on quarantined files](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-files). - Users can also report false positives to Microsoft from quarantine, depending on the value of the **Reporting from quarantine** setting in [user reported settings](submissions-user-reported-messages-custom-mailbox.md). +### Quarantine retention + How long quarantined messages or files are held in quarantine before they expire depends why the message or file was quarantined. Features and their corresponding retention periods are described in the following table: |Quarantine reason|Default retention period|Customizable?|Comments| |
security | Quarantine Admin Manage Messages Files | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-admin-manage-messages-files.md | Watch this short video to learn how to manage quarantined messages as an admin. - _Submit messages from quarantine to Microsoft_: Membership in the **Security Administrator** role. - _Read-only access to quarantined messages for all users_: Membership in the **Global Reader** or **Security Reader** roles. -- Quarantined messages and files are retained for a default period of time based on why they were quarantined. After the retention period expires, the messages are automatically deleted and aren't recoverable. For more information, see [Quarantined email messages in EOP and Defender for Office 365](quarantine-about.md).+- Quarantined messages and files are retained for a default period of time based on why they were quarantined. After the retention period expires, the messages are automatically deleted and aren't recoverable. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention). ## Use the Microsoft 365 Defender portal to manage quarantined email messages If you don't release or remove a message, it's automatically deleted from quaran - Members of the **Security Administrators** role group can see and use the **Submit the message to Microsoft to improve detection** and **Allow email with similar attributes** options. - Users can report false positives to Microsoft from quarantine, depending on the value of the **Reporting from quarantine** setting in [user reported settings](submissions-user-reported-messages-custom-mailbox.md). +> [!TIP] +> - If a message is released from quarantine and then routed to a third party security service or device before delivery to the original recipient, there will be some content loss when the message arrives at the recipient's mailbox. +> - Admins can use [message trace](message-trace-scc.md) to determine if a released message was delivered to the recipient's Inbox. +> - Third party anti-virus solutions can prevent a released email message from making it to the recipient's Inbox. + After you select the message, use either of the following methods to release it: - **On the Email tab**: Select :::image type="icon" source="../../media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**. |
security | Quarantine Policies | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/quarantine-policies.md | You create and assign quarantine policies in the Microsoft 365 Defender portal o - If you change the quarantine policy that's assigned to a supported protection feature, the change affects quarantined message _after_ you make the change. Messages that were quarantined before you made the change aren't affected by the settings of the new quarantine policy assignment. -- How long messages that were quarantined by anti-spam and anti-phishing protection are held before they expire is controlled by the **Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_) in anti-spam policies. For more information, see the table in [Quarantined email messages in EOP and Defender for Office 365](quarantine-about.md).+- How long messages that were quarantined by anti-spam and anti-phishing protection are held before they expire is controlled by the **Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_) in anti-spam policies. For more information, see the table in [Quarantine retention](quarantine-about.md#quarantine-retention). - You need to be assigned permissions before you can do the procedures in this article. You have the following options: - [Email & collaboration RBAC in the Microsoft 365 Defender portal](mdo-portal-permissions.md): Membership in any of the following role groups: Quarantine notifications are already localized based on the recipient's language :::image type="content" source="../../media/quarantine-tags-esn-customization-disclaimer.png" alt-text="A custom disclaimer at the bottom of a quarantine notification." lightbox="../../media/quarantine-tags-esn-customization-disclaimer.png"::: +> [!TIP] +> A custom quarantine notification for a different language is shown to users only when their account/mailbox language matches the language in the custom quarantine notification. + To create customized quarantine notifications for up to three languages, do the following steps: 1. In the Microsoft 365 Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Policies & rules** \> **Threat policies** \> **Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>. If the **Delete** permission is enabled: If the **Delete** permission is disabled, users can't delete their own messages from quarantine (the action isn't available). > [!TIP]-> Admins can find out who deleted a quarantined message by searching the admin audit log. For instructions, see [Find who deleted a quarantined message](quarantine-admin-manage-messages-files.md#find-who-deleted-a-quarantined-message). +> Admins can find out who deleted a quarantined message by searching the admin audit log. For instructions, see [Find who deleted a quarantined message](quarantine-admin-manage-messages-files.md#find-who-deleted-a-quarantined-message). Admins can use [message trace](message-trace-scc.md) to find out what happened to a released message if the original recipient can't find it. ##### Preview permission |
security | Recommended Settings For Eop And Office365 | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365.md | Admins can create or use quarantine policies with more restrictive or less restr |**Bulk compliant level (BCL) met or exceeded** (_BulkSpamAction_)|**Move message to Junk Email folder** (`MoveToJmf`)|**Move message to Junk Email folder** (`MoveToJmf`)|**Quarantine message** (`Quarantine`)|| |**Quarantine policy** for **Bulk compliant level (BCL) met or exceeded** (_BulkQuarantineTag_)|DefaultFullAccessPolicy┬╣|DefaultFullAccessPolicy|DefaultFullAccessWithNotificationPolicy|The quarantine policy is meaningful only if bulk detections are quarantined.| |**Intra-Organizational messages to take action on** (_IntraOrgFilterState_)|**Default** (Default)|**Default** (Default)|**Default** (Default)|The value **Default** is the same as selecting **High confidence phishing messages**. Currently, in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), the value **Default** is the same as selecting **None**.|-|**Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_)|15 days|30 days|30 days|This value also affects messages that are quarantined by anti-phishing policies. For more information, see [Quarantined email messages in EOP](quarantine-about.md).| +|**Retain spam in quarantine for this many days** (_QuarantineRetentionPeriod_)|15 days|30 days|30 days|This value also affects messages that are quarantined by anti-phishing policies. For more information, see [Quarantine retention](quarantine-about.md#quarantine-retention).| |**Enable spam safety tips** (_InlineSafetyTipsEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|| |Enable zero-hour auto purge (ZAP) for phishing messages (_PhishZapEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|| |Enable ZAP for spam messages (_SpamZapEnabled_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|| |
syntex | Ocr Overview | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/syntex/ocr-overview.md | For example, you enable the OCR service and then add image files to your documen ### Supported file types -The OCR service is available for the following file types: --- JPEG-- JPG-- PNG-- BMP+|Endpoint |Supported file types | +||| +|SharePoint and OneDrive |.bmp, .png, .jpeg, .jpg, .jfif, .arw, .cr2, .crw, .erf, .gif, .mef, .mrw, .nef, .nrw, .orf, .pef, .raw, .rw2, .rw1, .sr2, .tif, .tiff, .heic, .heif, .ari, .bay, .cap, .cr3, .dcs, .dcr, .drf, .eip, .fff, .iiq, .k25, .kdc, .mef, .mos, .ptx, .pxn, .raf, .rwl, .sr2, .srf, .srw, .x3f, and .dng | +|Teams, Exchange, and Windows devices |.bmp, .png, .jpeg, .jpg, .tiff, and .pdf (image only) | ### Supported languages |
test-base | Validate Apps Against A Custom Image | https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/test-base/validate-apps-against-a-custom-image.md | + + Title: 'Validate apps against a custom image' +description: This guide will show you how to onboard your own Windows image to Test Base as a baseline for security update or in-place upgrade validation. +search.appverid: MET150 ++++audience: Software-Vendor + Last updated : 09/14/2023++ms.localizationpriority: medium ++++f1.keywords: NOCSH +++# Validate apps against a custom image +> [!NOTE] +> This guide will show you how to onboard your own Windows image to Test Base as a baseline for security update or in-place upgrade validation. ++## Custom Image +Many enterprises' IT departments have customized Windows builds which contain their tier 0 applications, configurations, and settings. Those images are commonly used for classic image-based deployment for new PCs or Windows updates. +Test Base supports IT Pros, allowing them to share their custom image directly as a baseline to transfer the validation process to the cloud testing solution where the latest Windows updates can be deployed to their own image just as how they validate in their own environment to gain additional app confidence for monthly Windows updates or major Windows upgrade (e.g. Windows 11 deployment pre-validation). +To set up your own image-based tests, please follow below guidance: +* [Prerequisites](#prerequisites) +* [Upload an image as baseline](#uploadanimageasbaseline) +* [Create an in-place upgrade test using a custom image as the baseline](#createinplaceupgrade) +* [Create a security update test using a custom image as the baseline](#createsecurityupgrade) ++## <a name="prerequisites"></a>Prerequisites +Users need to prepare their own images from working environments (e.g. export from Configure Manager or take snapshots from Hyper-V). Please follow below instructions to ensure the image is prepared in VHD format and compatible for Test Base usage. +[How to prepare a Windows VHD for Test Base](prepare-testbase-vhd-file.md) ++## <a name="uploadanimageasbaseline"></a>Upload an image as baseline +Users can upload images exported from their working environments to use as baseline for validation. ++##### Step 1: Upload your VHD file +1. Visit the 'New image' tab from the navigation bar on the left. Click on the 'Upload VHD' link to direct to the VHD upload page. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_1.png#lightbox) ++2. Click the "Select a VHD file to upload" button. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_2.png#lightbox) ++3. Follow the instructions from the popup to select your VHD image file from local. Once selected, click 'Download' link to generate PowerShell script which would help upload the file from your local path via PowerShell. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_3.png#lightbox) ++4. Launch the PowerShell script from command line and provide the file path of the selected VHD to continue with the upload. +5. Once uploaded, refreshing the 'Upload VHD to storage blob' page will display your file in Validation/Ready mode. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_4.png#lightbox) ++##### Step 2: Create image from uploaded VHD +1. Visit the 'New image' tab under the left navigation bar +2. For the VHD section under 'Image source', select your uploaded VHD from the dropdown and make sure all the basic info for the image is correctly configured before publishing +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_5.png#lightbox) ++3. Image creation might take a while to complete. Please stay on the resource deployment page until the creation process finishes. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_6.png#lightbox) ++4. Access the 'Manage image' tab under the navigation bar. The new image should be under the 'Validation in progress' status with other existing images shown as below. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_7.png#lightbox) ++> [!NOTE] +> The uploaded VHD files will be automatically deleted in 14 days in accordance to Microsoft's data retention policy. You may upload up to 10 custom images due to storage limitations. ++## <a name="createinplaceupgrade"></a>Create an in-place upgrade test using a custom image as the baseline +Users can create an in-place upgrade test by choosing an existing custom image as their baseline, allowing the validation to be based on their existing OS settings and configuration. ++##### Step 1: Define custom image as the baseline from the 'Edit package' tab +1. Either create a new package or open an existing package to edit +2. Choose 'Flow driven' as in the 'Configure test' step and make the corresponding script changes in the 'Edit package' step. +3. Continue to the 'Test matrix' step and choose the target custom image from the dropdown list +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_8.png#lightbox) ++4. Toggle on 'Pre-install security update release on baseline OS' if you would like the target security update installed before the base image gets upgraded. Otherwise, the latest available security update will be installed after the base image gets upgraded to the target OS version. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_9.png#lightbox) ++5. Review and publish the package once you have confirmed the Test matrix is properly configured with your desired custom image selected. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_10.png#lightbox) +++##### Step 2: Review the test result once your package has completed execution. +1. Under the navigation, click on the 'In-place upgrade results' tab and search for the package you created with your custom image as the baseline OS. The test results should be displayed for review. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_11.png#lightbox) ++2. Click the 'See details' link to view the package test results with your custom image as a baseline. There should be a 'Custom Image' tag next to your OS Product at the top to indicate your custom image was used as the baseline. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_12.png#lightbox) +++## <a name="createsecurityupgrade"></a>Create a security update test using a custom image as the baseline +Users can create a security update test by selecting the desired custom image as the baseline from existing custom images to validation against their existing settings and configuration. ++##### Step 1: Define the custom image as the baseline from the Edit package tab +1. Create a new package or open an existing package to edit +2. Choose 'Out of Box' or 'Functional' in the 'Configure test' step and make corresponding script changes in the 'Edit package' step. +3. Navigate to the 'Test matrix step', choose 'Security update' as the test type, and select the target custom image from the dropdown list of 'OS versions to test' +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_13.png#lightbox) ++4. Review and publish the package once you have confirmed the Test matrix is properly configured with your desired custom image selected. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_14.png#lightbox) ++##### Step 2: Review the test results once the package has completed execution +1. Under the left navigation bar, click on the 'Security update results' tab and search for the package you created with your custom image as the baseline OS. The test results should be displayed for review. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_15.png#lightbox) ++2. Click the 'See details' link to view the package test results with your custom image as a baseline. +> [!div class="mx-imgBorder"] +> [](Media/Validate_apps_against_a_custom_image_16.png#lightbox) |