You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/business-premium/index.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,8 +31,7 @@ description: "Learn how to collaborate securely in your small business or campai
31
31
32
32
In our current world, keeping data and communications secure is a priority, particularly for medical and legal practices, political campaigns, and many other smaller businesses. Take advantage of the security features in Microsoft 365 Business Premium to collaborate safely within your small business. This solution provides a set of recommendations designed to help protect you and your data. This library includes help for setting up and using this recommended environment, no matter your business type.
33
33
34
-
35
-

34
+
:::image type="content" source="media/m365-whatisit-securityfocus2.png" alt-text="Microsoft 365 Business Premium protects your apps, file storage, email, devices, and identities.":::
36
35
37
36
This configuration includes the following guidance for productivity, collaboration, file storage, email, devices, and identity to protect your business:
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,9 @@ To create a simulation automation, do the following steps:
27
27
28
28
To go directly to the **Simulation automations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulationautomation>.
29
29
30
-
2. On the **Simulation automations** tab, select **Create simulation**.
30
+
2. On the **Simulation automations** tab, select **Create automation**.
31
31
32
-

32
+

33
33
34
34
3. The creation wizard opens. The rest of this article describes the pages and the settings they contain.
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/preset-security-policies.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,10 +58,7 @@ A profile determines the level of protection. The following profiles are availab
58
58
59
59
You can only use a condition or exception once, but you can specify multiple values for the condition or exception. Multiple values of the same condition or exception use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). Different conditions or exceptions use AND logic (for example, _\<recipient1\>_ and _\<member of group 1\>_).
60
60
61
-
-**Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This setting effectively provide default policies for Safe Links and Safe Attachments, which never had default policies.
62
-
63
-
> [!NOTE]
64
-
> The **Built-in protection** preset security policy is currently in General Availability, available to all organizations.
61
+
-**Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This profile effectively provides default policies for Safe Links and Safe Attachments, which never had default policies.
65
62
66
63
For **Built-in protection**, the preset security policy is on by default for all Defender for Office 365 customers. Although we don't recommend it, you can also configure exceptions based on **Users**, **Groups**, and **Domains** so the protection isn't applied to specific users.
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-manage-endpoints.md
+5-13Lines changed: 5 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,17 +25,17 @@ With hybrid workers, you need to support a growing number of personal devices. E
25
25
26
26
[Microsoft Endpoint Manager](/mem/endpoint-manager-overview) provides services and tools for managing mobile devices, desktop computers, virtual machines, embedded devices, and servers by combining the following services you may already know and be using.
27
27
28
-

28
+
:::image type="content" source="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png" alt-text="The components of endpoint management for Microsoft 365" lightbox="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png":::
29
29
30
30
## Microsoft Intune
31
31
32
32
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM) that is included with Microsoft 365.
33
33
34
34
-**MDM:** For organization-owned devices, you can exercise full control including settings, features, and security. Devices are "enrolled" in Intune where they receive Intune policies with rules and settings. For example, you can set password and PIN requirements, create a VPN connection, set up threat protection, and more.
35
35
36
-
-**MAM:** Remote workers might not want you to have full control on their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
36
+
-**MAM:** Remote workers might not want you to have full control of their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
37
37
38
-
For more information, see the [Manage endpoints with Intune and Microsoft 365](manage-devices-with-intune-overview.md) foundation solution.
38
+
For more information, see the [Manage devices with Intune](manage-devices-with-intune-overview.md) foundation solution.
39
39
40
40
## Configuration Manager
41
41
@@ -53,17 +53,9 @@ For more information, see this [overview of co-management](/mem/configmgr/comana
53
53
54
54
## Endpoint Analytics
55
55
56
-
Endpoint Analytics is a cloud-based service that integrates with Configuration Manager and provides you with insight and intelligence so you can make informed decisions about your Windows clients. It combines data from your organization with data aggregated from millions of other devices connected to Microsoft cloud services.
56
+
Endpoint analytics aims to improve user productivity and reduce IT support costs by providing insights into the user experience. The insights enable IT to optimize the end-user experience with proactive support and to detect regressions to the user experience by assessing user impact of configuration changes.
57
57
58
-
With Endpoint Analytics, you can:
59
-
60
-
- Create an inventory of apps running in your organization.
61
-
- Assess app compatibility with the latest Windows 10 feature updates.
62
-
- Identify compatibility issues and receive mitigation suggestions based on cloud-enabled data insights.
63
-
- Create pilot groups that represent the entire application and driver estate across a minimal set of devices.
64
-
- Deploy Windows 10 to pilot and production-managed devices.
65
-
66
-
For more information, see this [overview of Endpoint Analytics](/mem/configmgr/desktop-analytics/overview)
58
+
For more information, see this [overview of Endpoint Analytics](/mem/analytics/overview)
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-remote-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ With split tunneling, you can configure your VPN client to exclude specific type
52
52
53
53
To optimize access to Microsoft 365 cloud resources, configure your split tunneling VPN clients to exclude traffic to the **Optimize** category Microsoft 365 endpoints over the VPN connection. For more information, see [Office 365 endpoint categories](../enterprise/microsoft-365-network-connectivity-principles.md#new-office-365-endpoint-categories). See [this list](../enterprise/urls-and-ip-address-ranges.md) of Optimize category endpoints.
54
54
55
-
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypass the VPN connection.
55
+
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypasses the VPN connection.
56
56
57
57
:::image type="content" source="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png" alt-text="Network traffic from VPN clients with tunneling." lightbox="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png":::
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-security-compliance.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Remote work needs these elements of security and compliance:
36
36
37
37
Here are the features of Microsoft 365 that provide security and compliance services for hybrid workers.
38
38
39
-

39
+
:::image type="content" source="../media/empower-people-to-work-remotely/remote-workers-security-compliance-grid.png" alt-text="Use these Microsoft 365 services to stay secure and compliant" lightbox="../media/empower-people-to-work-remotely/remote-workers-security-compliance-grid.png":::
40
40
41
41
## Security
42
42
@@ -85,7 +85,7 @@ For your hybrid workers, you have implemented:
85
85
- Malware protection for cloud service data, email, and Windows 11 or 10 devices
86
86
- Compliance
87
87
- Consistent labeling for levels of sensitivity and protection
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-teams-productivity-apps.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,23 +35,23 @@ To be productive, people need to communicate and collaborate with one another. T
35
35
36
36
## Keep people connected with Microsoft Teams
37
37
38
-
Teams allows you to chat, meet, call, and collaborate all in one place. Millions of people get their work done in Teams every day because it brings together everything you need to work on-site or remotely into a hub for teamwork.
38
+
Teams with Microsoft Teams allows your organization to chat, meet, call, and collaborate all in one place. Millions of people get their work done with teams every day because it brings together everything you need to work on-site or remotely into a hub for teamwork.
39
39
40
40
For detailed guidance, see [Support remote workers using Microsoft Teams](/microsoftteams/support-remote-work-with-teams).
41
41
42
42
Watch the [Enabling hybrid work with Microsoft Teams webcasts](https://resources.techcommunity.microsoft.com/enabling-hybrid-work/) for guidance and demos on using Teams for hybrid work.
43
43
44
44
### Chat and conversations
45
45
46
-
Chat and threaded conversations are at the center of Teams with support for individual 1:1 chats and group chats and conversations. Remote workers can share information, opinions, and personality by using gifs, stickers, and emojis in group chats or one-to-one messages.
46
+
Chat and threaded conversations are at the center of Teams with support for individual 1:1 chats and group chats and conversations. Remote workers can share information, opinions, and personality by using pictures, stickers, and emojis in group chats or one-to-one messages.
47
47
48
48
### Meetings and conferencing
49
49
50
50
Teams can certainly help maintain communications and information sharing with hybrid workers, especially with meetings that support up to 250 people. Teams meetings enable interactive, collaborative meetings with people inside and outside your organization. Remote workers can use Teams meetings for day-to-day activities including recurring project checkpoints, catching-up with colleagues, brainstorming sessions, and facilitating conversations with customers.
51
51
52
52
### Calling
53
53
54
-
Teams supports direct VoIP calling between users and even other organizations using federation. It uses the same codecs as meetings and provide great audio world-wide without additional PSTN charges. However, some users may need a dedicated phone number to take external calls when working on-site or remotely. Teams can quickly provide cloud phone service for these users to make and receive phone calls.
54
+
Teams supports direct VoIP calling between users and even other organizations using federation. It uses the same codecs as meetings and provides great audio world-wide without additional PSTN charges. However, some users may need a dedicated phone number to take external calls when working on-site or remotely. Teams can quickly provide cloud phone service for these users to make and receive phone calls.
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,13 +23,13 @@ description: Step through the layers of infrastructure so your hybrid workers ca
23
23
24
24
# Set up your infrastructure for hybrid work with Microsoft 365
25
25
26
-
To secure and optimize your worker’s productivity and collaboration, you need to allow on-site and remote workers to easily and securely access your organization's on-premises and cloud-based information, tools, and resources. This solution steps through the deployment of key layers of infrastructure that empower your workers to do their best work, wherever they are.
26
+
To secure and optimize your worker’s productivity and collaboration, you need to allow on-site and remote workers to access your organization's on-premises and cloud-based information, tools, and resources easily and securely. This solution steps through the deployment of key layers of infrastructure that empower your workers to do their best work, wherever they are.
27
27
28
28
Hybrid workers can work on-site or remotely in a combination of locations. Allowing workers to work away from a traditional office is important for many organizations to:
29
29
30
30
- Hire and retain workers who are unwilling to relocate or require a flexible work environment.
31
31
- Reduce worker commuting, leaving workers with more time to be productive and for stress-reducing activities outside of work.
32
-
- Save on office space.
32
+
- Save office space.
33
33
34
34
Microsoft 365 has the capabilities to empower your hybrid workers to work either on-site or remotely.
0 commit comments