You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/microsoft-365-non-compliant-shared-mailboxes-exo-service-advisory.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,13 +28,13 @@ description: "Learn about service advisories for non-compliant shared mailboxes
28
28
29
29
An Exchange Online service advisory informs you about shared mailboxes which are out of compliance. These service advisories provide visibility to the number of shared mailboxes in your organization that might require admin intervention.
30
30
31
-
These service advisories are displayed in the Microsoft 365 admin center. To view these service advisories, you can go to **Health > Service health > Overview** and then look for **Shared mailbox(es) have exceeded the 50 GB storage limit in your tenant**, or you can go **Health > Service health > Exchange Online** and select the **Active issues** tab. Here's an example of a non-compliant shared mailbox service advisory under Service Health.
31
+
These service advisories are displayed in the Microsoft 365 admin center. To view these service advisories, you can go to **Health > Service health > Overview** and then look for **Shared mailbox(es) have exceeded the 50 GB storage limit in your tenant**, or you can go to **Health > Service health > Exchange Online** and select the **Active issues** tab. Here's an example of a non-compliant shared mailbox service advisory under Service Health.
32
32
33
33
:::image type="content" source="../media/m365-non-compliant-shared-mailboxes-exo-service-advisory-1.png" alt-text="Service health - issues for your organization to act on":::
34
34
35
35
## What does this service advisory indicate?
36
36
37
-
The service advisories for non-compliant shared mailboxes inform admins about their tenants having shared mailboxes that exceed 50 GB storage and don't have a required license. These advisories provide awareness so that you can take these limits into consideration when managing and troubleshooting shared mailboxes.
37
+
The service advisories for non-compliant shared mailboxes inform admins about their tenants having shared mailboxes that exceed 50 GB storage without having the required licenses. These advisories provide awareness so that you can take these limits into consideration when managing and troubleshooting shared mailboxes.
38
38
39
39
Here’s an example of the advisory:
40
40
@@ -46,43 +46,43 @@ You can expect to see this type of advisory until the time when shared mailbox s
46
46
47
47
## More information
48
48
49
-
Identifying Non-compliant Shared Mailboxes is a two-step process:
49
+
Identifying non-compliant shared mailboxes is a two-step process:
50
50
51
-
1. Identify Shared Mailboxes with > 50 GB storage
52
-
2. Check licensing for those Shared Mailboxes
51
+
1. Identify shared mailboxes with > 50 GB storage.
52
+
2. Check licensing for those shared mailboxes.
53
53
54
-
## Identifying Non-Compliant Shared Mailboxes in Exchange Online via Exchange Admin Center
54
+
## Identifying non-compliant shared mailboxes in Exchange Online via Exchange Admin Center
55
55
56
-
To ensure your shared mailboxes comply with Exchange storage limits, follow these steps to identify those exceeding 50 GB and check their licensing status.
56
+
To ensure your shared mailboxes comply with Exchange storage limits, follow these steps to identify those exceeding 50 GB and to check their licensing status.
57
57
58
-
### Retrieve Shared Mailboxes Exceeding 50 GB
58
+
### Retrieve shared mailboxes exceeding 50 GB
59
59
60
-
1. Access the Exchange Admin Center Portal.
60
+
1. Access the Microsoft 365 admin center portal.
61
61
2. Generate Usage Reports:
62
-
- Go to **Reports -> Usage -> Exchange**.
63
-
- Select **Mailbox Usage**.
62
+
1. Go to **Reports -> Usage -> Exchange**.
63
+
1. Select **Mailbox Usage**.
64
64
3. Export Mailbox Data:
65
-
- Ensure the **Recipient type** column is checked.
66
-
- Select **Export** to download the report.
65
+
1. Ensure the **Recipient type** column is checked.
66
+
1. Select **Export** to download the report.
67
67
4. Filter Shared Mailboxes:
68
-
- Open the downloaded CSV file.
69
-
- Filter the **Recipient type** column to show only "**Shared**" mailboxes.
68
+
1. Open the downloaded CSV file.
69
+
1. Filter the **Recipient type** column to show only "**Shared**" mailboxes.
70
70
5. Convert Storage Data:
71
-
- The Storage Used (Byte) column displays data in Bytes. Convert this to Gigabytes (GB) by dividing the values by 1,073,741,824 (1024^3).
72
-
6. Identify Mailboxes with Storage > 50 GB:
73
-
- Filter the converted storage data to identify mailboxes with sizes greater than 50 GB.
71
+
1. The **Storage Used (Byte)** column displays data in "Bytes". Convert this to Gigabytes (GB) by dividing the values by 1,073,741,824 (1024^3).
72
+
6. Identify mailboxes with Storage > 50 GB:
73
+
1. Filter the converted storage data to identify mailboxes with sizes greater than 50 GB.
74
74
75
-
### Check Licensing for Shared Mailboxes exceeding 50 GB
75
+
### Check licensing for shared mailboxes exceeding 50 GB
76
76
77
-
1. Access Active Users:
78
-
- Go to **Home -> Active Users**.
79
-
2. Locate Mailboxes with Storage > 50 GB:
80
-
- Select the mailboxes identified in the previous step 6 that have more than 50 GB of storage.
81
-
3. Verify Licensing:
82
-
- Go to **License and Apps** for the selected user.
83
-
- If the mailbox is assigned Exchange Online (Plan 1), it isn't in compliance. You need to either assign Exchange Online (Plan 2) or reduce the storage to less than 50 GB.
77
+
1. Access active users:
78
+
1. Go to **Home -> Active Users**.
79
+
2. Locate mailboxes with storage > 50 GB:
80
+
1. Select the mailboxes identified in the earlier step that have more than 50 GB of storage.
81
+
3. Verify licensing:
82
+
1. Go to **License and Apps** for the selected user.
83
+
1. If the mailbox is assigned Exchange Online (Plan 1), it isn't in compliance. You need to either assign Exchange Online (Plan 2) or reduce the storage to less than 50 GB.
84
84
85
-
## Identifying Non-Compliant Shared Mailboxes in Exchange Online through PowerShell
85
+
## Identifying non-compliant shared mailboxes in Exchange Online through PowerShell
86
86
87
87
You can use PowerShell to identify non-compliant shared mailboxes. Save the following script to your local hard drive and run it in PowerShell:
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/microsoft-365-u-s-government-dod-endpoints.md
+21-8Lines changed: 21 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Microsoft 365 US Government DOD endpoints
3
3
ms.author: kvice
4
4
author: kelleyvice-msft
5
5
manager: scotv
6
-
ms.date: 02/28/2025
6
+
ms.date: 03/31/2025
7
7
audience: ITPro
8
8
ms.topic: article
9
9
ms.service: microsoft-365-enterprise
@@ -21,7 +21,7 @@ search.appverid:
21
21
ms.assetid: 5d7dce60-4892-4b58-b45e-ee42fe8a907f
22
22
f1.keywords:
23
23
- NOCSH
24
-
description: Microsoft 365 requires connectivity to the Internet. The endpoints below should be reachable for customers using Microsoft 365 U.S. Government DoD plans only.
24
+
description: Microsoft 365 requires connectivity to the Internet. The following endpoints should be reachable for customers using Microsoft 365 U.S. Government DoD plans only.
25
25
hideEdit: true
26
26
ms.custom: seo-marvel-mar2020
27
27
---
@@ -30,7 +30,7 @@ ms.custom: seo-marvel-mar2020
30
30
31
31
*Applies To: Microsoft 365 Admin*
32
32
33
-
Microsoft 365 requires connectivity to the Internet. The endpoints below should be reachable for customers using Microsoft 365 U.S. Government DoD plans only.
33
+
Microsoft 365 requires connectivity to the Internet. The following endpoints should be reachable for customers using Microsoft 365 U.S. Government DoD plans only.
34
34
35
35
**Microsoft 365 endpoints:**[Worldwide (including GCC)](urls-and-ip-address-ranges.md)\|[Microsoft 365 operated by 21 Vianet](urls-and-ip-address-ranges-21vianet.md)\|*Microsoft 365 U.S. Government DoD*\|[Microsoft 365 U.S. Government GCC High](microsoft-365-u-s-government-gcc-high-endpoints.md)
36
36
@@ -42,11 +42,11 @@ Microsoft 365 requires connectivity to the Internet. The endpoints below should
42
42
|**Last updated:** 02/28/2025 - [Change Log subscription](https://endpoints.office.com/version/USGOVDoD?allversions=true&format=rss&clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|**Download:** the full list in [JSON format](https://endpoints.office.com/endpoints/USGOVDoD?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7)|
43
43
|
44
44
45
-
Start with [Managing Microsoft 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This lets customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints may also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page below is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
45
+
Start with [Managing Microsoft 365 endpoints](managing-office-365-endpoints.md) to understand our recommendations for managing network connectivity using this data. Endpoints data is updated as needed at the beginning of each month with new IP Addresses and URLs published 30 days in advance of being active. This lets customers who don't yet have automated updates to complete their processes before new connectivity is required. Endpoints might also be updated during the month if needed to address support escalations, security incidents, or other immediate operational requirements. The data shown on this page is all generated from the REST-based web services. If you're using a script or a network device to access this data, you should go to the [Web service](microsoft-365-ip-web-service.md) directly.
46
46
47
47
Endpoint data below lists requirements for connectivity from a user's machine to Microsoft 365. It doesn't include network connections from Microsoft into a customer network, sometimes called hybrid or inbound network connections. For more information, see [Additional endpoints not included in the web service](additional-office365-ip-addresses-and-urls.md).
48
48
49
-
The Microsoft 365 suite is broken down into four major service areas representing the three primary workloads and a set of common resources. These service areas may be used to associate traffic flows with a particular application, however given that features often consume endpoints across multiple workloads, these service areas can't effectively be used to restrict access.
49
+
The Microsoft 365 suite is broken down into four major service areas representing the three primary workloads and a set of common resources. These service areas might be used to associate traffic flows with a particular application, however given that features often consume endpoints across multiple workloads, these service areas can't effectively be used to restrict access.
50
50
51
51
Data columns shown are:
52
52
@@ -56,14 +56,27 @@ Data columns shown are:
56
56
57
57
-**ER**: This is **Yes** if the endpoint set is supported over Azure ExpressRoute with Microsoft 365 route prefixes. The BGP community that includes the route prefixes shown aligns with the service area listed. When ER is **No**, this means that ExpressRoute isn't supported for this endpoint set. However, it shouldn't be assumed that no routes are advertised for an endpoint set where ER is **No**. If you plan to use Microsoft Entra Connect, read the [special considerations section](/azure/active-directory/hybrid/reference-connect-instances#microsoft-azure-government) to ensure you have the appropriate Microsoft Entra Connect configuration.
58
58
59
-
-**Addresses**: Lists the FQDNs or wildcard domain names and IP Address ranges for the endpoint set. Note that an IP Address range is in CIDR format and may include many individual IP Addresses in the specified network.
59
+
-**Addresses**: Lists the FQDNs or wildcard domain names and IP Address ranges for the endpoint set. An IP Address range is in CIDR format and might include many individual IP Addresses in the specified network.
60
60
61
-
-**Ports**: Lists the TCP or UDP ports that are combined with the Addresses to form the network endpoint. You may notice some duplication in IP Address ranges where there are different ports listed.
61
+
-**Ports**: Lists the TCP or UDP ports that are combined with the Addresses to form the network endpoint. You might notice some duplication in IP Address ranges where there are different ports listed.
62
+
63
+
## Microsoft 365 Unified Domains
64
+
65
+
> [!NOTE]
66
+
> In response to customer feedback and to streamline endpoint management, Microsoft has initiated the process of consolidating Microsoft 365 apps and services into a select group of dedicated, secured, and purpose-managed domains within the **.microsoft** top level domain (TLD).
67
+
>
68
+
> To avoid connectivity issues for users, ensure that the following essential domains are included in your allowlist and that connectivity to these domains isn't blocked.
69
+
70
+
| ID | Category | Domain name| Purpose | Ports |
71
+
|---|---|---|---|---|
72
+
|12|Required|`*.usgovcloud.microsoft`|Dedicated to authenticated user facing Microsoft SaaS product experiences.|**TCP:** 443,80<br>**UDP:** 443|
73
+
|12|Required|`*.usgovcloud-static.microsoft`|Dedicated to static (not customer generated) content hosted on CDNs.|**TCP:** 443,80<br>**UDP:** 443|
74
+
|12|Required|`*.usgovcloud-usercontent.microsoft`|Content used in Microsoft 365 experiences that requires domain isolation from applications.|**TCP:** 443,80<br>**UDP:** 443|
62
75
63
76
[!INCLUDE [Microsoft 365 U.S. Government DoD endpoints](../includes/office-365-u.s.-government-dod-endpoints.md)]
64
77
65
78
Notes for this table:
66
79
67
80
- The Security and Compliance Center (SCC) provides support for Azure ExpressRoute for Microsoft 365. The same applies for many features exposed through the SCC such as Reporting, Auditing, eDiscovery (Premium), Unified DLP, and Data Governance. Two specific features, PST Import and eDiscovery Export, currently don't support Azure ExpressRoute with only Microsoft 365 route filters due to their dependency on Azure Blob Storage. To consume those features, you need separate connectivity to Azure Blob Storage using any supportable Azure connectivity options, which include Internet connectivity or Azure ExpressRoute with Azure Public route filters. You have to evaluate establishing such connectivity for both of those features. The Microsoft 365 Information Protection team is aware of this limitation and is actively working to bring support for Azure ExpressRoute for Microsoft 365 as limited to Microsoft 365 route filters for both of those features.
68
81
69
-
- There are additional optional endpoints for Microsoft 365 Apps for enterprise that aren't listed and aren't required for users to launch Microsoft 365 Apps for enterprise applications and edit documents. Optional endpoints are hosted in Microsoft datacenters and don't process, transmit, or store customer data. We recommend that user connections to these endpoints be directed to the default Internet egress perimeter.
82
+
- There are other optional endpoints for Microsoft 365 Apps for enterprise that aren't listed and aren't required for users to launch Microsoft 365 Apps for enterprise applications and edit documents. Optional endpoints are hosted in Microsoft datacenters and don't process, transmit, or store customer data. We recommend that user connections to these endpoints be directed to the default Internet egress perimeter.
0 commit comments