You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/business-premium/m365bp-add-m365e5s.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ author: chrisda
9
9
manager: deniseb
10
10
audience: Admin
11
11
ms.topic: overview
12
-
ms.date: 03/05/2025
12
+
ms.date: 06/18/2025
13
13
ms.service: microsoft-365-business-security
14
14
ms.localizationpriority: medium
15
15
ms.collection:
@@ -25,7 +25,7 @@ f1.keywords: NOCSH
25
25
26
26
-[Microsoft 365 Business Premium](m365bp-overview.md)
27
27
28
-
As you probably already know, [Microsoft 365 Business Premium](m365bp-overview.md) is an excellent productivity and security solution for small and medium-sized businesses (1-300 employees). With this solution, you get:
28
+
As you probably already know, [Microsoft 365 Business Premium](m365bp-overview.md) is an excellent productivity and security solution for small and medium-sized businesses (1-300 user accounts). With this solution, you get:
29
29
30
30
-[Microsoft 365 Apps](/microsoft-365/admin/setup/install-applications) installed on your devices
31
31
- Protection for your user accounts with [Microsoft Entra ID Plan 1](/entra/fundamentals/whatis)
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/PortalLaunchScheduler.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,6 +181,9 @@ The SharePoint Portal launch scheduler tool was originally only available via [S
181
181
182
182
1. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
183
183
184
+
> [!IMPORTANT]
185
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
186
+
184
187
### View any existing portal launch setups
185
188
186
189
To see if there are existing portal launch configurations:
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/add-a-sharepoint-geo-admin.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "Add or remove a geo administrator"
3
3
ms.reviewer: anfra
4
-
ms.date: 09/27/2024
4
+
ms.date: 06/19/2025
5
5
ms.author: kvice
6
6
author: kelleyvice-msft
7
7
manager: scotv
@@ -29,6 +29,9 @@ Some services - such as the term store - are administered from the _Primary Prov
29
29
30
30
Global administrators and SharePoint administrators continue to have access to settings in the _Primary Provisioned Geography_ location and all _Satellite Geography_ locations.
31
31
32
+
> [!IMPORTANT]
33
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
34
+
32
35
## Configuring _Geography_ administrators
33
36
34
37
Configuring _Geography_ admins requires the SharePoint PowerShell module.
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/additional-network-security-requirements-for-office-365-gcchigh-and-dod.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Additional network security requirements for Office 365 Government Commu
3
3
ms.author: dzazzo
4
4
author: dzazzo-msft
5
5
manager: dzazzo
6
-
ms.date: 05/19/2020
6
+
ms.date: 06/19/2025
7
7
audience: ITPro
8
8
ms.topic: article
9
9
ms.service: microsoft-365-enterprise
@@ -37,30 +37,33 @@ GCC High and DOD customers planning to use federated identities or hybrid coexis
37
37
To permit the service to communicate with your on-premises endpoints, you **must** send an email to Office 365 engineering for network changes.
38
38
39
39
> [!WARNING]
40
-
> All requests have a **three-week** SLA and cannot be expedited due to the required security and compliance controls and deployment pipelines. This includes initial onboarding network requests as well as any changes after you have migrated to the service. Make sure that your network teams are aware of this timeline and include it in their planning cycles.
40
+
> All requests have a **three-week** SLA and can't be expedited due to the required security and compliance controls and deployment pipelines. This SLA includes initial onboarding network requests and any changes after you have migrated to the service. Make sure that your network teams are aware of this timeline and include it in their planning cycles.
41
41
42
-
Send an email to [Office 365 Government Allow-List Requests](mailto:[email protected]) with the following information:
42
+
Send an email to [Office 365 Government allowlist requests](mailto:[email protected]) with the following information:
43
43
44
-
***To**: [Office 365 Government Allow-List Requests](mailto:[email protected])
45
-
***From**: A tenant administrator - the send email **must** match a Global Administrator contact in your tenant
44
+
***To**: [Office 365 Government allowlist requests](mailto:[email protected])
45
+
***From**: A tenant administrator - the sent email **must** match a Global Administrator contact in your tenant
46
46
***Email subject**: Office 365 GCC High Network Request - contoso.onmicrosoft.us (replace with your tenant name)
47
47
48
+
> [!IMPORTANT]
49
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
50
+
48
51
The body of your message should include the following data:
49
52
50
53
* Your Microsoft Online Services tenant name (for example, contoso.onmicrosoft.com, fabrikam.onmicrosoft.us)
51
-
* An email distribution list that Microsoft communicates with for on-going communications related to network changes and/or follow up for invalid subnets
54
+
* An email distribution list that Microsoft communicates with for ongoing communications related to network changes and/or follow up for invalid subnets
52
55
* Indicate whether you plan to use Microsoft Teams hybrid coexistence with your on-premises deployments
53
56
* Federated identity system externally accessible URL (for example, sts.contoso.com) and IP address range in CIDR (Classless Inter-Domain Routing) notation (for example, 10.1.1.0/28)
54
-
* On-Premises public key infrastructure (PKI) Certificate Revocation List URL and IP address range in CIDR notation
57
+
* On-premises public key infrastructure (PKI) Certificate Revocation List URL and IP address range in CIDR notation
55
58
* Externally accessible URL and IP address range for Exchange Server on-premises deployment in CIDR notation
56
59
* Externally accessible URL and IP address range for Skype for Business on-premises deployment in CIDR notation
57
60
58
61
For security and compliance reasons, keep in mind the following restrictions on your request:
59
62
60
63
* There's a four subnet limitation per tenant
61
64
* Subnets must be in CIDR Notation (for example, 10.1.1.0/28)
62
-
* Subnet ranges can’t be larger than /24
65
+
* Subnet ranges can't be larger than /24
63
66
* We **cannot** accommodate requests to allow access to commercial cloud services (commercial Office 365, Google G-Suite, Amazon Web Services, etc.)
64
67
65
-
Once Microsoft receives and approves your request, there's a three-week service-level agreement (SLA) for implementation and can’t be expedited. You receive an initial acknowledgment when we receive your request and a final acknowledgment once it's complete.
68
+
Once Microsoft receives and approves your request, there's a three-week service-level agreement (SLA) for implementation and can't be expedited. You receive an initial acknowledgment when we receive your request and a final acknowledgment once it's complete.
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/contoso-infra-needs.md
+13-29Lines changed: 13 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
- NOCSH
6
6
ms.author: kvice
7
7
manager: scotv
8
-
ms.date: 09/06/2024
8
+
ms.date: 06/19/2025
9
9
audience: ITPro
10
10
ms.topic: article
11
11
ms.service: microsoft-365-enterprise
@@ -67,47 +67,29 @@ Contoso business needs fall into five main categories:
67
67
68
68
### Security
69
69
70
-
- Identity and access management
70
+
- Identity and access management: Enforce multifactor and other forms of authentication and protect user and administrator account credentials.
71
71
72
-
Enforce multifactor and other forms of authentication and protect user and administrator account credentials.
72
+
- Threat protection: Protect against external security threats, including email and operating system-based malware.
73
73
74
-
-Threat protection
74
+
-Information protection: Lock down access to and encrypt high-value digital assets, such as customer data, design and manufacturing specifications, and employee information.
75
75
76
-
Protect against external security threats, including email and operating system-based malware.
77
-
78
-
- Information protection
79
-
80
-
Lock down access to and encrypt high-value digital assets, such as customer data, design and manufacturing specifications, and employee information.
81
-
82
-
- Security management
83
-
84
-
Monitor security posture and detect and respond to threats in real time.
76
+
- Security management: Monitor security posture and detect and respond to threats in real time.
85
77
86
78
### Remote and mobile access and business partners
87
79
88
-
- Improve security for remote and mobile workers
89
-
90
-
Implement bring your own device (BYOD) and company-owned device management to ensure secured access, correct application behavior, and company data protection.
80
+
- Improve security for remote and mobile workers: Implement bring your own device (BYOD) and company-owned device management to ensure secured access, correct application behavior, and company data protection.
91
81
92
-
- Reduce remote access infrastructure for employees
82
+
- Reduce remote access infrastructure for employees: Reduce maintenance and support costs and improve performance for remote access solution by moving commonly accessed resources to the cloud.
93
83
94
-
Reduce maintenance and support costs and improve performance for remote access solution by moving commonly accessed resources to the cloud.
95
-
96
-
- Provide better connectivity and lower overhead for business-to-business (B2B) transactions
97
-
98
-
Replace an aging and expensive partner extranet with a cloud-based solution that uses federated authentication.
84
+
- Provide better connectivity and lower overhead for business-to-business (B2B) transactions: Replace an aging and expensive partner extranet with a cloud-based solution that uses federated authentication.
99
85
100
86
### Compliance
101
87
102
-
- Adhere to regional regulatory requirements
103
-
104
-
Ensure compliance with industry and regional regulations for data storage, encryption, data privacy, and personal data regulations, such as the General Data Protection Regulation (GDPR) for the Europe Union.
88
+
- Adhere to regional regulatory requirements: Ensure compliance with industry and regional regulations for data storage, encryption, data privacy, and personal data regulations, such as the General Data Protection Regulation (GDPR) for the Europe Union.
105
89
106
90
### Management
107
91
108
-
- Lower IT overhead for managing software running on client PCs and devices
109
-
110
-
Automate installation of updates to the Windows operating system and Microsoft 365 Apps for enterprise across the organization.
92
+
- Lower IT overhead for managing software running on client PCs and devices: Automate installation of updates to the Windows operating system and Microsoft 365 Apps for enterprise across the organization.
111
93
112
94
## Mapping Contoso business needs to Microsoft 365 for enterprise
113
95
@@ -132,7 +114,9 @@ The Contoso IT department determined the following mapping of business needs to
132
114
|| Adhere to regional regulatory requirements | GDPR features in Microsoft 365 |
133
115
| Management |||
134
116
|| Lower IT overhead for installing client updates | Windows 11 Enterprise updates <br> Microsoft 365 Apps for enterprise updates |
135
-
||||
117
+
118
+
> [!IMPORTANT]
119
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
0 commit comments