Updates from: 09/08/2022 03:19:07
Category Microsoft Docs article Related commit history on GitHub Change details
bookings Bookings In Outlook https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-in-outlook.md
For more information, see the [Bookings with me Microsoft 365 Roadmap item](http
1. Bookings with me and Bookings share the same licensing model. However, Bookings doesn't have to be turned on for the organization using tenant settings for users to access Bookings with me. The Bookings app must be enabled for users to have access to Bookings with me.
- To turn on Bookings with me without access to Bookings, block access to Microsoft Bookings using the [OWA Mailbox policy PowerShell command](/powershell/module/exchange/set-owamailboxpolicy?view=exchange-ps) or follow the instructions here: [Turn Microsoft Bookings on or off](turn-bookings-on-or-off.md).
+ To turn on Bookings with me without access to Bookings, block access to Microsoft Bookings using the [OWA Mailbox policy PowerShell command](/powershell/module/exchange/set-owamailboxpolicy) or follow the instructions here: [Turn Microsoft Bookings on or off](turn-bookings-on-or-off.md).
2. Calendar FreeBusy Anonymous sharing must be enabled to use Bookings with me. This allows the Bookings page to have access to the free/busy information in your Outlook calendar. Use PowerShell to check the status.
For more information, see the [Bookings with me Microsoft 365 Roadmap item](http
Get-SharingPolicy -Identity "Default Sharing Policy" | fl Domains ```
- "Anonymous:CalendarSharingFreeBusyReviewer"" should be one of the domains in the response.
+ Anonymous:SharingPolicyAction must be one of the domains in the response. SharingPolicyAction value can be CalendarSharingFreeBusySimple, CalendarSharingFreeBusyDetail, or CalendarSharingFreeBusyReviewer (default).
To enable anonymous sharing, use the following command. ```PowerShell
- Set-SharingPolicy "Default Sharing Policy" -Domains @{Add="Anonymous:CalendarSharingFreeBusyReviewer"}
+ Set-SharingPolicy "Default Sharing Policy" -Domains @{Add="Anonymous:CalendarSharingFreeBusySimple"}
```
+
+ For more information, see [Set-SharingPolicy](/powershell/module/exchange/set-sharingpolicy).
## Turn Bookings with me on or off
Use the **Get-OrganizationConfig** and **Set-OrganizationConfig** commands to fi
If the command returns ΓÇ£EwsEnabled: **$true**" then proceed to Step 2.
- If the command returns ΓÇ£EwsEnabled:" (empty is default), then enable and proceed to Step 2.
+ If the command returns ΓÇ£EwsEnabled:" (empty is default), then enable, but only if need to block "Bookings with", and proceed to Step 2.
+ Otherwise the default values of EwsEnabled is enough to leave "Bookings with me" enabled, no further changes are needed.
```PowerShell Set-OrganizationConfig -EwsEnabled: $true
bookings Bookings Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-overview.md
Microsoft Bookings makes scheduling and managing appointments a breeze. Bookings
Use Bookings to make your organizationΓÇÖs meetings virtual with online meetings via [Microsoft Teams](https://support.microsoft.com/office/overview-of-the-bookings-app-in-teams-7b8569e1-0c8a-444e-b712-d9968b05110b) and Skype for Business. Each appointment booked as an online meeting creates a unique meeting link that is sent to attendees so they can join via a web browser, phone dial-in, or the Skype or Teams app. Bookings is also available as an app within Teams, which allows you to create Bookings calendars, assign staff, and both schedule new and manage existing appointments without ever leaving Teams.
-Bookings has three primary components:
+Bookings is made up of these components:
- A booking page where your customers and clients can schedule appointments with the staff member who should provide the service or run the appointment. This web-based scheduling page can be shared via a direct link, your Facebook page, and even through link embedding within your website. - A web app that contains a set of web-based, business-facing pages where Bookings calendar owners and administrators within an organization can define appointment types and details, manage staff schedules and availability, set business hours, and customize how appointments are scheduled. These pages allow for versatility and the ability to customize a Bookings calendar to fit the diverse needs of the person or organization. -- A business-facing mobile app where Bookings calendar owners and administrators can see all of their appointments, access customer lists and contact information, and make manual bookings on the go.- ## Before you begin Microsoft Bookings is available in the following subscriptions:
bookings Bookings Sms https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/bookings-sms.md
Related content
[Microsoft Bookings](bookings-overview.md)\ [Turn Microsoft Bookings on or off](turn-bookings-on-or-off.md)\
-[Get the Microsoft Bookings app for iOS and Android](get-bookings-app.md)\
bookings Create A Manual Booking https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/create-a-manual-booking.md
ms.localizationpriority: medium ms.assetid: 03a9acc9-f29c-456b-9fb2-0f49474b2708
-description: "Follow these instructions to create an appointment and assign an employee through the Microsoft Bookings app."
+description: "Follow these instructions to create an appointment and assign an employee."
# Create a manual booking
bookings Customize Booking Page https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/customize-booking-page.md
ms.localizationpriority: medium ms.assetid: 116d7a84-a7a0-4911-a1e9-debb2cca7c43
-description: "Change the color theme of your booking page in the Microsoft Bookings app."
+description: "Change the color theme of your booking page."
# Customize and publish your booking page
bookings Get Bookings App https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/bookings/get-bookings-app.md
- Title: "Get the Microsoft Bookings app for iOS and Android"-----
-description: "The Bookings mobile apps are not yet available worldwide. This article lists those locales where the apps are available now."
--
-# Get the Microsoft Bookings app for iOS and Android
-
-Microsoft Bookings is available as a mobile app for iOS and Android. The Bookings app for iOS is available in all regions and countries that Apple supports. You can download the app from the [iTunes App Store](https://apps.apple.com/app/microsoft-bookings/id1065657468). The Bookings app for Android is available for download from the [Google Play Store](https://play.google.com/store/apps/details?id=com.microsoft.exchange.bookings) in the US and Canada.
-
-## Before you begin
-
-Before getting started, you need to set up Bookings on the web.
-
-1. From the app launcher, select All apps to see an alphabetical list of the Microsoft 365 apps available to you. From there, you can search for a specific app
-
- ![Image of app launcher.](../media/bookings-all-apps-launcher.png)
-
-2. Got to [the Office home page](https://office.com) and from the app launcher, select **Bookings**.
-
-3. Select **Get it now**.
-
-4. Provide the name and type of business or organization you own or run.
-
-5. You're now ready to set up Bookings for your organization. Follow the steps in the [Microsoft Bookings](bookings-overview.md) topic to finish setting up Bookings.
-
-## Download the Bookings app
-
-Once you've set up the Bookings web app, go to your device's online store and download the Bookings app and sign in with your admin account.
-
-## View-only mode
-
-Any user who is not granted read-write access in Bookings can still use the mobile app in view-only mode. Anyone with a Bookings license who gets added to a booking calendar can see their own and their colleaguesΓÇÖ schedules, appointment details, and business information. A user with view-only access can't make changes or edits and cannot access the customer list.
compliance Auditing Solutions Overview https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/auditing-solutions-overview.md
Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization.
+> [!NOTE]
+> Microsoft Purview auditing is the new name for the unified audit log.
+ ## Microsoft Purview auditing solutions Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
compliance Dlp Sensitivity Label As Condition https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/compliance/dlp-sensitivity-label-as-condition.md
You can use sensitivity labels as conditions on these items and in these scenari
- Using sensitivity labels as a condition is supported across all workloads as indicated in the support matrix above. -- DLP policy tips will continue to be shown across workloads (except Outlook Win32) for DLP policies that contain sensitivity label as a condition.
+- DLP policy tips will continue to be shown across workloads (except Outlook for Windows) for DLP policies that contain sensitivity label as a condition.
- Sensitivity labels will also appear as a part of the incident report email if a DLP policy with sensitivity label as a condition is matched.
You can use sensitivity labels as conditions on these items and in these scenari
|Workload |Policy tips supported/not supported | ||| |OWA | supported |
-|Outlook Win 32 | not supported |
+|Outlook for Windows | not supported |
|SharePoint | supported | |OneDrive for Business | supported | |endpoint devices | not supported |
contentunderstanding Syntex Licensing https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/contentunderstanding/syntex-licensing.md
The following tasks require a [SharePoint Syntex license](https://www.microsoft.
- Creating a form processing model via the entry point in a library - Uploading content to a library where a document understanding or form processing model has been applied - Running a document understanding model on-demand-- Use premium taxonomy services. (Premium taxonomy services comprise SKOS-based term set import, pushing enterprise content types to hub-associated sites, and term store reports.)
+- Creating a modern template with content assembly
+- Generating a document from a modern template
+- Use of advanced metadata search
+- Use of premium taxonomy services. (Premium taxonomy services comprise SKOS-based term set import, pushing enterprise content types to hub-associated sites, and term store reports.)
Unlicensed users can be granted access to a content center and can create document understanding models there but can't apply them to a document library.
security Attack Surface Reduction Rules Report https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report.md
Title: Attack surface reduction rules reporting
-description: Provides information about Attack surface reduction (ASR) rules detections, configuration, block threats, and methods to enable basic rules and exclusions.
+ Title: Attack surface reduction (ASR) rules reporting
+description: Provides information about attack surface reduction (ASR) rules detections, configuration, block threats, and methods to enable three standard rules and exclusions.
keywords: Attack surface reduction rules, ASR, asr rules, hips, host intrusion prevention system, protection rules, anti-exploit rules, antiexploit, exploit rules, infection prevention rules, Microsoft Defender for Endpoint, configure ASR rules, ASR rule description ms.prod: m365-security ms.mktglfcycl: manage
Last updated 08/25/2022
-# Attack surface reduction rules report
+# Attack surface reduction (ASR) rules report
**Applies to:**
The attack surface reduction (ASR) rules report provides information about the _
- detected threats - blocked threats-- devices that don't use basic rules to block threats
+- devices that aren't configured to use the standard protection rules to block threats
Additionally, this report provides an easy-to-use interface that enables you to:
For more information about individual attack surface reduction rules, see [Attac
## Prerequisites > [!IMPORTANT]
-> For Windows Server 2012 R2 and Windows Server 2016 to appear in Attack surface reduction rules reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
+> For Windows Server 2012 R2 and Windows Server 2016 to appear in the **Attack surface reduction rules report**, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution).
## Report access permissions
-To access the Attack surface reduction rules report in the Microsoft 365 Security dashboard, the following permissions are required:
+To access the **Attack surface reduction rules report** in the Microsoft 365 Security dashboard, the following permissions are required:
| Permission type | Permission | Permission display name | |:|:|:|
To navigate to the summary cards for the attack surface reduction rules report
The summary report cards for ASR rules are shown in the following figure.
->:::image type="content" source="images/attack-surface-reduction-rules-report-summary.png" alt-text="Shows the Attack surface reduction (ASR) rules report summary cards" lightbox="images/attack-surface-reduction-rules-report-summary.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-summary.png" alt-text="Shows the ASR rules report summary cards" lightbox="images/attack-surface-reduction-rules-report-summary.png":::
## ASR rules report summary cards
Shows a summary of the number of detected threats blocked by ASR rules.
Provides two 'action' buttons: -- View detections - opens the Attack surface reduction rules > main Detections tab-- Add exclusions - Opens the Attack surface reduction rules > main Exclusions tab
+- View detections - opens the **Attack surface reduction rules** > main **Detections** tab
+- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab
Clicking on the **ASR rules detections** link at the top of the card also opens the main [Attack surface reduction rules Detections tab](#attack-surface-reduction-rules-main-detections-tab). ### ASR rules configuration summary card
-**The top section** focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three basic attack surface reduction \(ASR\) rules](#three-basic-asr-rules) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
+**The top section** focuses on three recommended rules, which protect against common attack techniques. This card shows current-state information about the computers in your organization that have the following [Three \(ASR\) standard protection rules](#simplified-standard-protection-option) set in **Block mode**, **Audit mode**, or **off** (not configured).The **Protect devices** button will show full configuration details for only the three rules; customers can quickly take action to enable these rules.
**The bottom section** surfaces six rules based on the number of unprotected devices per rule. The ΓÇ£View configurationΓÇ¥ button surfaces all configuration details for all ASR rules. The ΓÇ£Add exclusionΓÇ¥ button shows the add exclusion page with all detected file/process names listed for Security Operation Center (SOC) to evaluate. The **Add exclusion** page is linked to Microsoft Endpoint Manager (MEM). Provides two 'action' buttons: -- View configuration - opens the Attack surface reduction rules > main Detections tab-- Add exclusions - Opens the Attack surface reduction rules > main Exclusions tab
+- View configuration - opens the **Attack surface reduction rules** > main **Detections** tab
+- Add exclusions - Opens the **Attack surface reduction rules** > main **Exclusions** tab
Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
-#### Three basic ASR rules
+#### Simplified standard protection option
-This card provides a button to **Protect devices** with the three basic rules. At minimum, Microsoft recommends that you enable the three basic attack surface reduction rules:
+The configuration summary card provides a button to **Protect devices** with the three standard protection rules. At minimum, Microsoft recommends that you enable these three attack surface reduction standard protection rules:
- [Block credential stealing from the Windows local security authority subsystem (lsass.exe)](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem) - [Block abuse of exploited vulnerable signed drivers](attack-surface-reduction-rules-reference.md#block-abuse-of-exploited-vulnerable-signed-drivers) - [Block persistence through Windows Management Instrumentation (WMI) event subscription](attack-surface-reduction-rules-reference.md#block-persistence-through-wmi-event-subscription)
-To enable the three basic rules:
+To enable the three standard protection rules:
1. Select **Protect devices**. The main **Configuration** tab opens.
-1. On the **Configuration** tab, **Basic rules** automatically toggles from **All rules** to **Basic rules** enabled.
-1. In the **Devices** list, select the devices for which you want the basic rules to apply, and then select **Save**.
+1. On the **Configuration** tab, **Basic rules** automatically toggles from **All rules** to **Standard protection rules** enabled.
+1. In the **Devices** list, select the devices for which you want the standard protection rules to apply, and then select **Save**.
This card has two other navigation buttons: -- **View configuration** - Opens the Attack surface reduction rules > main Configuration tab.-- **Add exclusions** - Opens the Attack surface reduction rules > main Exclusions tab.
+- **View configuration** - Opens the **Attack surface reduction rules** > main **Configuration** tab.
+- **Add exclusions** - Opens the **Attack surface reduction rules** > main **Exclusions** tab.
Clicking on the **ASR rules configuration** link at the top of the card also opens the main [Attack surface reduction rules Configuration tab](#attack-surface-reduction-rules-main-configuration-tab).
While the ASR rules report summary cards are useful for getting quick summary of
Search capability is added to **Detection**, **Configuration**, and **Add exclusion** main tabs. With this capability, you can search by using device ID, file name, or process name.
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-tabs-search.png" alt-text="Shows the Attack surface reduction (ASR) rules report search feature." lightbox="images/attack-surface-reduction-rules-report-main-tabs-search.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-tabs-search.png" alt-text="Shows the ASR rules report search feature." lightbox="images/attack-surface-reduction-rules-report-main-tabs-search.png":::
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Shows the Attack surface reduction (ASR) rules report search feature on the configuration tab." lightbox="images/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Shows the ASR rules report search feature on the configuration tab." lightbox="images/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
### Filtering Filtering provides a way for you to specify what results are returned: -- **Basic rules** enables you to limit results to the [three basic ASR rules](#three-basic-asr-rules). By default, this filter is set to **false**. - **Date** enables you to specify a date range for data results. - **Filters**
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-filtering.png" alt-text="Shows the Attack surface reduction (ASR) rules report filtering feature" lightbox="images/attack-surface-reduction-rules-report-main-detections-filtering.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-filtering.png" alt-text="Shows the ASR rules report filtering feature" lightbox="images/attack-surface-reduction-rules-report-main-detections-filtering.png":::
### Attack surface reduction rules main detections tab
Filtering provides a way for you to specify what results are returned:
- **Blocked Detections** Shows how many threat detections were blocked by rules set in _Block_ mode. - **Large, consolidated graph** Shows blocked and audited detections.
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the Attack surface reduction (ASR) rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="images/attack-surface-reduction-rules-report-main-detections-tab.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-tab.png" alt-text="Shows the ASR rules report main detections tab, with _Audit detections_ and _Blocked detections_ outlined." lightbox="images/attack-surface-reduction-rules-report-main-detections-tab.png":::
The graphs provide detection data over the displayed date range, with the capability to hover over a specific location to gather date-specific information.
The bottom section of the report lists detected threats - on a per-device basis
|:|:| | Detected file | The file determined to contain a possible or known threat | | Detected on | The date the threat was detected |
-| Blocked\/Audited? | Whether the detecting rule was in Block or Audit mode |
+| Blocked\/Audited? | Whether the detecting rule for the specific event was in Block or Audit mode |
| Rule | Which rule detected the threat | | Source app | The application that made the call to the offending "detected file" | | Device | The name of the device on which the Audit or Block event occurred |
For more information about ASR rule audit and block modes, see [Attack surface r
The ΓÇ£DetectionΓÇ¥ main page has a list of all detections (files/processes) in the last 30 days. Select on any of the detections to open with drill-down capabilities.
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the Attack surface reduction (ASR) rules report main detections tab flyout" lightbox="images/attack-surface-reduction-rules-report-main-detections-flyout.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-detections-flyout.png" alt-text="Shows the ASR rules report main detections tab flyout" lightbox="images/attack-surface-reduction-rules-report-main-detections-flyout.png":::
The **Possible exclusion and impact** section provides impact of the selected file or process. You can:
For more information about Advanced hunting, see [Proactively hunt for threats w
### Attack surface reduction rules main Configuration tab
-The Attack surface reduction rules main Configuration tab provides summary and per-device ASR rules configuration details. There are three main aspects to the Configuration tab:
+The ASR rules main **Configuration** tab provides summary and per-device ASR rules configuration details. There are three main aspects to the Configuration tab:
**Basic rules** Provides a method to toggle results between **Basic rules** and **All Rules**. By default, **Basic rules** is selected.
The Attack surface reduction rules main Configuration tab provides summary and p
These elements are shown in the following figure.
->:::image type="content" source="images/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Shows the Attack surface reduction (ASR) rules report main configuration tab" lightbox="images/attack-surface-reduction-rules-report-main-configuration-tab.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Shows the ASR rules report main configuration tab" lightbox="images/attack-surface-reduction-rules-report-main-configuration-tab.png":::
To enable ASR rules:
The **Configuration** tab and _add rule_ flyout are shown in the following image
> [NOTE!] > If you have devices that require that different ASR rules be applied, you should configure those devices individually.
->:::image type="content" source="images/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Shows the Attack surface reduction (ASR) rules fly-out to add ASR rules to devices" lightbox="images/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Shows the ASR rules fly-out to add ASR rules to devices" lightbox="images/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
### Attack surface reduction rules Add exclusions tab
The **Add exclusions** tab presents a ranked list of detections by file name and
- **Detections** The total number of detected events for named file. Individual devices can trigger multiple ASR rules events. - **Devices** The number of devices on which the detection occurred.
->:::image type="content" source="images/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the Attack surface reduction (ASR) rules report add exclusions tab" lightbox="images/attack-surface-reduction-rules-report-exclusion-tab.png":::
+>:::image type="content" source="images/attack-surface-reduction-rules-report-exclusion-tab.png" alt-text="Shows the ASR rules report add exclusions tab" lightbox="images/attack-surface-reduction-rules-report-exclusion-tab.png":::
> [!IMPORTANT] > Excluding files or folders can severely reduce the protection provided by ASR rules. Excluded files are allowed to run, and no report or event will be recorded.
security Machine Reports https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/defender-endpoint/machine-reports.md
The Device health and compliance dashboard is structured in two tabs:
- The [**Sensor health & OS** tab](#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes: - [Sensor health card](#sensor-health-card) - [Operating systems and platforms card](#operating-systems-and-platforms-card)
- - [Windows 10 versions card](#windows-10-versions-card)
+ - [Windows versions card](#windows-versions-card)
- The [**Microsoft Defender Antivirus health** tab](#microsoft-defender-antivirus-health-tab) has eight cards that report on aspects of Microsoft Defender Antivirus (MDAV): - [Antivirus mode card](#antivirus-mode-card)
For example, Secure Boot (introduced in Windows 8) practically eliminated the th
Ideally, the ΓÇ£Current stateΓÇ¥ graph shows that the number of operating systems is weighted in favor of more current OS over older versions. Otherwise, the trends graph indicates that new systems are being adopted and/or older systems are being updated or replaced.
-### Windows 10 versions card
+### Windows versions card
The Windows 10 versions card shows the distribution of Windows devices and their versions in your organization. In the same way that an upgrade from Windows 8 to Windows 10 improves security in your organization, changing from early releases of Windows to more current versions improves your posture against possible threats.
The up-to-date cards show the up-to-date status forΓÇ»**Antivirus engine**,ΓÇ»**
Definitions for  _Up to date_, out of date_, and _no data available_ are provided for each card below.
-The MDAV reports make up-to-date determinations and reports based on the following criteria:
+Microsoft Defender Antivirus makes up-to-date reports and determinations based on the following criteria:
- **For engine & platform updates**: "Signature Refresh Time" (the time client events were last received for up to date reports) and "Security Intelligence Publish Time" (security intelligence VDMs are used to determine engine & platform versions) - **For security intelligence updates**: "Signature Refresh Time" (the time client events were last received for up to date reports), Security Intelligence Publish Time, and the last up-to-date status communicated from client
security Allow Block Urls https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/security/office-365-security/allow-block-urls.md
Valid URL entries and their results are described in the following sections.
**Entry**: `*.contoso.com` - **Block match**:
- - contoso.com
- xyz.abc.contoso.com - **Block not matched**:
solutions Productivity Illustrations https://github.com/MicrosoftDocs/microsoft-365-docs/commits/public/microsoft-365/solutions/productivity-illustrations.md
Use the following posters to start envisioning what your organization can do wit
| Item | Description | |:--|:--|
-|[![Microsoft 365 for frontline worker scenarios.](/microsoft-365/frontline/media/m365-frontline-scenarios-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206713) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206713) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206386) <br>Updated September 2022 |This poster provides an overview of the scenarios you can implement for your frontline workforce to increase communications, enhance wellbeing and engagement, train and onboard your workers, and manage your workforce and operations.<br/><br/>**Related solution guides** <br/> <ul><li>[Microsoft 365 for frontline workers](/microsoft-365/frontline/flw-overview)|
-|[![Microsoft 365 for frontline workers: Healthcare scenarios.](/microsoft-365/frontline/media/m365-frontline-healthcare-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206475) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206475) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206474) <br>Updated September 2022 |This poster provides an overview of the scenarios you can implement for your frontline workforce in a healthcare setting.<br/><br/>**Related solution guides** <br/> <ul><li>[Get started with Microsoft 365 for healthcare organizations](/microsoft-365/frontline/teams-in-hc)|
-|[![Microsoft 365 for frontline workers: Retail scenarios.](/microsoft-365/frontline/media/m365-frontline-retail-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206476) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206476) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206271) <br>Updated September 2022 |This poster provides an overview of the scenarios you can implement for your frontline workforce in a retail setting.<br/><br/>**Related solution guides** <br/> <ul><li>[Get started with Microsoft 365 for retail organizations](/microsoft-365/frontline/teams-for-retail-landing-page)|
+|[![Microsoft 365 for frontline worker scenarios.](/microsoft-365/frontline/media/m365-frontline-scenarios-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206713) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206713) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206386) <br>Updated September 2022 |**Frontline worker scenarios**<br><br>This poster provides an overview of the scenarios you can implement for your frontline workforce to increase communications, enhance wellbeing and engagement, train and onboard your workers, and manage your workforce and operations.<br/><br/>**Related solution guides** <br/> <ul><li>[Microsoft 365 for frontline workers](/microsoft-365/frontline/flw-overview)|
+|[![Microsoft 365 for frontline workers: Healthcare scenarios.](/microsoft-365/frontline/media/m365-frontline-healthcare-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206475) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206475) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206474) <br>Updated September 2022 |**Healthcare scenarios**<br><br>This poster provides an overview of the scenarios you can implement for your frontline workforce in a healthcare setting.<br/><br/>**Related solution guides** <br/> <ul><li>[Get started with Microsoft 365 for healthcare organizations](/microsoft-365/frontline/teams-in-hc)|
+|[![Microsoft 365 for frontline workers: Retail scenarios.](/microsoft-365/frontline/media/m365-frontline-retail-thumb.png)](https://go.microsoft.com/fwlink/?linkid=2206476) <br/> [PDF](https://go.microsoft.com/fwlink/?linkid=2206476) \| [Visio](https://go.microsoft.com/fwlink/?linkid=2206271) <br>Updated September 2022 |**Retail scenarios**<br><br>This poster provides an overview of the scenarios you can implement for your frontline workforce in a retail setting.<br/><br/>**Related solution guides** <br/> <ul><li>[Get started with Microsoft 365 for retail organizations](/microsoft-365/frontline/teams-for-retail-landing-page)|
## Corporate communications with Microsoft 365 ΓÇö a Contoso case study Employee engagement is a significant contributor to workplace satisfaction, retention, and productivity at any organization. Across Microsoft 365, there are multiple ways to communicate and engage your audience.