Skip to content

Commit 06e6b42

Browse files
authored
Merge branch 'main' into docs-editor/pay-for-your-subscription-1750360306
2 parents f446fdb + 80fc2eb commit 06e6b42

30 files changed

Lines changed: 270 additions & 135 deletions

copilot/copilot-tuning-admin-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To manage Copilot Tuning governance controls, make sure that you meet the follow
3232
- Your tenant must have at least 5,000 active Microsoft 365 Copilot add-on licenses.
3333
- An AI Admin must accept the EAP terms on behalf of the organization.
3434
> [!NOTE]
35-
> If Copilot Tuning isn't available in your tenant, contact Microsoft support or your account team to request EAP provisioning.
35+
> If Copilot Tuning isn't available in your tenant, contact your Microsoft Customer Success Account Manager (CSAM) to request EAP provisioning.
3636
- You must have one of the following roles:
3737
- Global Administrator
3838
- AI Administrator (if defined as a custom role in your organization)

microsoft-365/business-premium/m365bp-add-m365e5s.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ author: chrisda
99
manager: deniseb
1010
audience: Admin
1111
ms.topic: overview
12-
ms.date: 03/05/2025
12+
ms.date: 06/18/2025
1313
ms.service: microsoft-365-business-security
1414
ms.localizationpriority: medium
1515
ms.collection:
@@ -25,7 +25,7 @@ f1.keywords: NOCSH
2525

2626
- [Microsoft 365 Business Premium](m365bp-overview.md)
2727

28-
As you probably already know, [Microsoft 365 Business Premium](m365bp-overview.md) is an excellent productivity and security solution for small and medium-sized businesses (1-300 employees). With this solution, you get:
28+
As you probably already know, [Microsoft 365 Business Premium](m365bp-overview.md) is an excellent productivity and security solution for small and medium-sized businesses (1-300 user accounts). With this solution, you get:
2929

3030
- [Microsoft 365 Apps](/microsoft-365/admin/setup/install-applications) installed on your devices
3131
- Protection for your user accounts with [Microsoft Entra ID Plan 1](/entra/fundamentals/whatis)

microsoft-365/enterprise/PortalLaunchScheduler.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,9 @@ The SharePoint Portal launch scheduler tool was originally only available via [S
181181
182182
1. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
183183

184+
> [!IMPORTANT]
185+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
186+
184187
### View any existing portal launch setups
185188

186189
To see if there are existing portal launch configurations:

microsoft-365/enterprise/add-a-sharepoint-geo-admin.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Add or remove a geo administrator"
33
ms.reviewer: anfra
4-
ms.date: 09/27/2024
4+
ms.date: 06/19/2025
55
ms.author: kvice
66
author: kelleyvice-msft
77
manager: scotv
@@ -29,6 +29,9 @@ Some services - such as the term store - are administered from the _Primary Prov
2929

3030
Global administrators and SharePoint administrators continue to have access to settings in the _Primary Provisioned Geography_ location and all _Satellite Geography_ locations.
3131

32+
> [!IMPORTANT]
33+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
34+
3235
## Configuring _Geography_ administrators
3336

3437
Configuring _Geography_ admins requires the SharePoint PowerShell module.

microsoft-365/enterprise/additional-network-security-requirements-for-office-365-gcchigh-and-dod.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Additional network security requirements for Office 365 Government Commu
33
ms.author: dzazzo
44
author: dzazzo-msft
55
manager: dzazzo
6-
ms.date: 05/19/2020
6+
ms.date: 06/19/2025
77
audience: ITPro
88
ms.topic: article
99
ms.service: microsoft-365-enterprise
@@ -37,30 +37,33 @@ GCC High and DOD customers planning to use federated identities or hybrid coexis
3737
To permit the service to communicate with your on-premises endpoints, you **must** send an email to Office 365 engineering for network changes.
3838

3939
> [!WARNING]
40-
> All requests have a **three-week** SLA and cannot be expedited due to the required security and compliance controls and deployment pipelines. This includes initial onboarding network requests as well as any changes after you have migrated to the service. Make sure that your network teams are aware of this timeline and include it in their planning cycles.
40+
> All requests have a **three-week** SLA and can't be expedited due to the required security and compliance controls and deployment pipelines. This SLA includes initial onboarding network requests and any changes after you have migrated to the service. Make sure that your network teams are aware of this timeline and include it in their planning cycles.
4141
42-
Send an email to [Office 365 Government Allow-List Requests](mailto:[email protected]) with the following information:
42+
Send an email to [Office 365 Government allowlist requests](mailto:[email protected]) with the following information:
4343

44-
* **To**: [Office 365 Government Allow-List Requests](mailto:[email protected])
45-
* **From**: A tenant administrator - the send email **must** match a Global Administrator contact in your tenant
44+
* **To**: [Office 365 Government allowlist requests](mailto:[email protected])
45+
* **From**: A tenant administrator - the sent email **must** match a Global Administrator contact in your tenant
4646
* **Email subject**: Office 365 GCC High Network Request - contoso.onmicrosoft.us (replace with your tenant name)
4747

48+
> [!IMPORTANT]
49+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
50+
4851
The body of your message should include the following data:
4952

5053
* Your Microsoft Online Services tenant name (for example, contoso.onmicrosoft.com, fabrikam.onmicrosoft.us)
51-
* An email distribution list that Microsoft communicates with for on-going communications related to network changes and/or follow up for invalid subnets
54+
* An email distribution list that Microsoft communicates with for ongoing communications related to network changes and/or follow up for invalid subnets
5255
* Indicate whether you plan to use Microsoft Teams hybrid coexistence with your on-premises deployments
5356
* Federated identity system externally accessible URL (for example, sts.contoso.com) and IP address range in CIDR (Classless Inter-Domain Routing) notation (for example, 10.1.1.0/28)
54-
* On-Premises public key infrastructure (PKI) Certificate Revocation List URL and IP address range in CIDR notation
57+
* On-premises public key infrastructure (PKI) Certificate Revocation List URL and IP address range in CIDR notation
5558
* Externally accessible URL and IP address range for Exchange Server on-premises deployment in CIDR notation
5659
* Externally accessible URL and IP address range for Skype for Business on-premises deployment in CIDR notation
5760

5861
For security and compliance reasons, keep in mind the following restrictions on your request:
5962

6063
* There's a four subnet limitation per tenant
6164
* Subnets must be in CIDR Notation (for example, 10.1.1.0/28)
62-
* Subnet ranges cant be larger than /24
65+
* Subnet ranges can't be larger than /24
6366
* We **cannot** accommodate requests to allow access to commercial cloud services (commercial Office 365, Google G-Suite, Amazon Web Services, etc.)
6467

65-
Once Microsoft receives and approves your request, there's a three-week service-level agreement (SLA) for implementation and cant be expedited. You receive an initial acknowledgment when we receive your request and a final acknowledgment once it's complete.
68+
Once Microsoft receives and approves your request, there's a three-week service-level agreement (SLA) for implementation and can't be expedited. You receive an initial acknowledgment when we receive your request and a final acknowledgment once it's complete.
6669

microsoft-365/enterprise/contoso-infra-needs.md

Lines changed: 13 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
- NOCSH
66
ms.author: kvice
77
manager: scotv
8-
ms.date: 09/06/2024
8+
ms.date: 06/19/2025
99
audience: ITPro
1010
ms.topic: article
1111
ms.service: microsoft-365-enterprise
@@ -67,47 +67,29 @@ Contoso business needs fall into five main categories:
6767

6868
### Security
6969

70-
- Identity and access management
70+
- Identity and access management: Enforce multifactor and other forms of authentication and protect user and administrator account credentials.
7171

72-
Enforce multifactor and other forms of authentication and protect user and administrator account credentials.
72+
- Threat protection: Protect against external security threats, including email and operating system-based malware.
7373

74-
- Threat protection
74+
- Information protection: Lock down access to and encrypt high-value digital assets, such as customer data, design and manufacturing specifications, and employee information.
7575

76-
Protect against external security threats, including email and operating system-based malware.
77-
78-
- Information protection
79-
80-
Lock down access to and encrypt high-value digital assets, such as customer data, design and manufacturing specifications, and employee information.
81-
82-
- Security management
83-
84-
Monitor security posture and detect and respond to threats in real time.
76+
- Security management: Monitor security posture and detect and respond to threats in real time.
8577

8678
### Remote and mobile access and business partners
8779

88-
- Improve security for remote and mobile workers
89-
90-
Implement bring your own device (BYOD) and company-owned device management to ensure secured access, correct application behavior, and company data protection.
80+
- Improve security for remote and mobile workers: Implement bring your own device (BYOD) and company-owned device management to ensure secured access, correct application behavior, and company data protection.
9181

92-
- Reduce remote access infrastructure for employees
82+
- Reduce remote access infrastructure for employees: Reduce maintenance and support costs and improve performance for remote access solution by moving commonly accessed resources to the cloud.
9383

94-
Reduce maintenance and support costs and improve performance for remote access solution by moving commonly accessed resources to the cloud.
95-
96-
- Provide better connectivity and lower overhead for business-to-business (B2B) transactions
97-
98-
Replace an aging and expensive partner extranet with a cloud-based solution that uses federated authentication.
84+
- Provide better connectivity and lower overhead for business-to-business (B2B) transactions: Replace an aging and expensive partner extranet with a cloud-based solution that uses federated authentication.
9985

10086
### Compliance
10187

102-
- Adhere to regional regulatory requirements
103-
104-
Ensure compliance with industry and regional regulations for data storage, encryption, data privacy, and personal data regulations, such as the General Data Protection Regulation (GDPR) for the Europe Union.
88+
- Adhere to regional regulatory requirements: Ensure compliance with industry and regional regulations for data storage, encryption, data privacy, and personal data regulations, such as the General Data Protection Regulation (GDPR) for the Europe Union.
10589

10690
### Management
10791

108-
- Lower IT overhead for managing software running on client PCs and devices
109-
110-
Automate installation of updates to the Windows operating system and Microsoft 365 Apps for enterprise across the organization.
92+
- Lower IT overhead for managing software running on client PCs and devices: Automate installation of updates to the Windows operating system and Microsoft 365 Apps for enterprise across the organization.
11193

11294
## Mapping Contoso business needs to Microsoft 365 for enterprise
11395

@@ -132,7 +114,9 @@ The Contoso IT department determined the following mapping of business needs to
132114
| | Adhere to regional regulatory requirements | GDPR features in Microsoft 365 |
133115
| Management | | |
134116
| | Lower IT overhead for installing client updates | Windows 11 Enterprise updates <br> Microsoft 365 Apps for enterprise updates |
135-
||||
117+
118+
> [!IMPORTANT]
119+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
136120
137121
## Next step
138122

0 commit comments

Comments
 (0)