Skip to content

Commit 2365f52

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents bc07bbb + 9ff2517 commit 2365f52

38 files changed

Lines changed: 382 additions & 216 deletions

File tree

copilot/microsoft-365-copilot-privacy.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,13 @@ title: "Data, Privacy, and Security for Microsoft Copilot for Microsoft 365"
33
ms.author: danbrown
44
author: DHB-MSFT
55
manager: laurawi
6-
audience: ITPro
7-
ms.topic: article
6+
ms.topic: conceptual
87
ms.service: microsoft-365-copilot
98
ms.localizationpriority: medium
10-
ms.collection: Tier1
9+
ms.collection: privacy-microsoft365
1110
description: "Learn how Microsoft Copilot for Microsoft 365 uses data and how it stores and protects that data."
1211
hideEdit: true
13-
ms.date: 12/15/2023
12+
ms.date: 01/16/2024
1413
---
1514

1615
# Data, Privacy, and Security for Microsoft Copilot for Microsoft 365
@@ -57,7 +56,7 @@ When you enter prompts using Microsoft Copilot for Microsoft 365, the informatio
5756
> [!NOTE]
5857
> When using Microsoft Copilot for Microsoft 365, your organization’s data might leave the Microsoft 365 service boundary under the following circumstances:
5958
>
60-
> - When you allow Microsoft Copilot for Microsoft 365 chat experiences to reference public web content. The query sent to Bing might include your organization’s data. For more information, see [Microsoft Copilot for Microsoft 365 and public web content](#microsoft-copilot-for-microsoft-365-and-public-web-content).
59+
> - When you allow Microsoft Copilot with Graph-grounded chat to reference public web content. The query sent to Bing might include your organization’s data. For more information, see [Microsoft Copilot for Microsoft 365 and public web content](#microsoft-copilot-for-microsoft-365-and-public-web-content).
6160
> - When you’re using plugins to help Microsoft Copilot for Microsoft 365 to provide more relevant information. Check the privacy statement and terms of use of the plugin to determine how it will handle your organization’s data. For information, see [Extensibility of Microsoft Copilot for Microsoft 365](#extensibility-of-microsoft-copilot-for-microsoft-365).
6261
6362
Abuse monitoring for Microsoft Copilot for Microsoft 365 occurs in real-time, without providing Microsoft any standing access to customer data, either for human or for automated review. While abuse moderation, which includes human review of content, is available in Azure OpenAI, Microsoft Copilot for Microsoft 365 services have opted out of it. Microsoft 365 data isn’t collected or stored by Azure OpenAI.
@@ -67,7 +66,7 @@ Abuse monitoring for Microsoft Copilot for Microsoft 365 occurs in real-time, wi
6766
6867
## Data stored about user interactions with Microsoft Copilot for Microsoft 365
6968

70-
When a user interacts with Microsoft Copilot for Microsoft 365 apps (such as Word, PowerPoint, Excel, OneNote, Loop, or Whiteboard), we store data about these interactions. The stored data includes the user's prompt, how Copilot responded, and information used to ground Copilot's response. For example, this stored data provides users with Copilot interaction history in [Microsoft 365 Chat](https://support.microsoft.com/topic/5b00a52d-7296-48ee-b938-b95b7209f737) and [meetings in Microsoft Teams](https://support.microsoft.com/office/0bf9dd3c-96f7-44e2-8bb8-790bedf066b1). This data is processed and stored in alignment with contractual commitments with your organization’s other content in Microsoft 365. The data is encrypted while it's stored and isn't used to train foundation LLMs, including those used by Microsoft Copilot for Microsoft 365.
69+
When a user interacts with Microsoft Copilot for Microsoft 365 apps (such as Word, PowerPoint, Excel, OneNote, Loop, or Whiteboard), we store data about these interactions. The stored data includes the user's prompt, how Copilot responded, and information used to ground Copilot's response. For example, this stored data provides users with Copilot interaction history in [Microsoft Copilot with Graph-grounded chat](https://support.microsoft.com/topic/5b00a52d-7296-48ee-b938-b95b7209f737) and [meetings in Microsoft Teams](https://support.microsoft.com/office/0bf9dd3c-96f7-44e2-8bb8-790bedf066b1). This data is processed and stored in alignment with contractual commitments with your organization’s other content in Microsoft 365. The data is encrypted while it's stored and isn't used to train foundation LLMs, including those used by Microsoft Copilot for Microsoft 365.
7170

7271
To view and manage this stored data, admins can use Content search or Microsoft Purview. Admins can also use Microsoft Purview to set retention policies for the data related to chat interactions with Copilot. For more information, see the following articles:
7372

@@ -89,11 +88,13 @@ For European Union (EU) users, we have additional safeguards to comply with the
8988

9089
## Microsoft Copilot for Microsoft 365 and data residency
9190

92-
Customers with [Advanced Data Residency (ADR) in Microsoft 365](/microsoft-365/enterprise/advanced-data-residency) or [Microsoft 365 Multi-Geo](/microsoft-365/enterprise/microsoft-365-multi-geo) can purchase and enable Microsoft Copilot for Microsoft 365. At this time, Microsoft doesn't provide data residency commitments for Microsoft Copilot for Microsoft 365, beyond EU Data Boundary. When customers store data generated by Copilot in Microsoft 365 products that have data residency commitments under the Product Terms, the applicable commitments will be upheld.
91+
Copilot for Microsoft 365 is upholding data residency commitments as outlined in the Microsoft Product Terms and Data Protection Addendum. Copilot will be added as a covered workload in the data residency commitments in Microsoft Product Terms later in 2024.
92+
93+
Microsoft [Advanced Data Residency (ADR)](/microsoft-365/enterprise/advanced-data-residency) and [Multi-Geo Capabilities](/microsoft-365/enterprise/microsoft-365-multi-geo) offerings will include data residency commitments for Copilot for Microsoft 365 customers later in 2024. For EU customers, Copilot for Microsoft 365 is an EU Data Boundary service. Customers outside the EU may have their queries processed in the US, EU, or other regions.
9394

9495
## Microsoft Copilot for Microsoft 365 and public web content
9596

96-
Microsoft Copilot Graph-grounding chat experiences can reference public web content from the Bing search index to ground user prompts and responses. Based on the user’s prompt, Copilot for Microsoft 365 determines whether it needs to use Bing to query public web content to help provide a relevant response to the user. There are [controls available to manage the use of public web content](#controls-available-to-manage-the-use-of-public-web-content) for both admins and users.
97+
Microsoft Copilot with Graph-grounded chat can reference public web content from the Bing search index to ground user prompts and responses. Based on the user’s prompt, Copilot for Microsoft 365 determines whether it needs to use Bing to query public web content to help provide a relevant response to the user. There are [controls available to manage the use of public web content](#controls-available-to-manage-the-use-of-public-web-content) for both admins and users.
9798

9899
> [!NOTE]
99100
> Public web content grounding in Copilot uses only the Bing Search service. Copilot with commercial data protection (previously named Bing Chat Enterprise) is a separate offering and not involved with public web content grounding.

microsoft-365/security/defender/advanced-hunting-aadsignineventsbeta-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 01/16/2024
2424
---
2525

2626
# AADSignInEventsBeta
@@ -61,7 +61,7 @@ Use this reference to construct queries that return information from the table.
6161
|`ResourceTenantId`|`string`|Unique identifier of the tenant of the resource accessed|
6262
|`DeviceName`|`string`|Fully qualified domain name (FQDN) of the device|
6363
|`AadDeviceId`|`string`|Unique identifier for the device in Microsoft Entra ID|
64-
|`OSPlatform`|`string`|Platform of the operating system running on the machine. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7.|
64+
|`OSPlatform`|`string`|Platform of the operating system running on the device. Indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7.|
6565
|`DeviceTrustType`|`string`|Indicates the trust type of the device that signed in. For managed device scenarios only. Possible values are Workplace, AzureAd, and ServerAd.|
6666
|`IsManaged`|`int`|Indicates whether the device that initiated the sign-in is a managed device (1) or not a managed device (0)|
6767
|`IsCompliant`|`int`|Indicates whether the device that initiated the sign-in is compliant (1) or non-compliant (0)|

microsoft-365/security/defender/advanced-hunting-aadspnsignineventsbeta-table.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
- m365-security
2020
- tier3
2121
ms.topic: reference
22-
ms.date: 02/16/2021
22+
ms.date: 01/16/2024
2323
---
2424

2525
# AADSpnSignInEventsBeta
@@ -41,7 +41,7 @@ For information on other tables in the advanced hunting schema, see [the advance
4141
****
4242

4343
|Column name|Data type|Description|
44-
|---|---|---|
44+
|-----------|---------|-----------|
4545
|`Timestamp`|`datetime`|Date and time when the record was generated|
4646
|`Application`|`string`|Application that performed the recorded action|
4747
|`ApplicationId`|`string`|Unique identifier for the application|
@@ -61,7 +61,6 @@ For information on other tables in the advanced hunting schema, see [the advance
6161
|`Longitude`|`string`|The east to west coordinates of the sign-in location|
6262
|`RequestId`|`string`|Unique identifier of the request|
6363
|`ReportId`|`string`|Unique identifier for the event|
64-
||||
6564

6665
## Related articles
6766

microsoft-365/security/defender/advanced-hunting-alertevidence-table.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 01/16/2024
2424
---
2525

2626
# AlertEvidence
@@ -61,7 +61,7 @@ For information on other tables in the advanced hunting schema, [see the advance
6161
| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
6262
| `AccountUpn` | `string` | User principal name (UPN) of the account |
6363
| `DeviceId` | `string` | Unique identifier for the device in the service |
64-
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the machine |
64+
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
6565
| `LocalIP` | `string` | IP address assigned to the local device used during communication |
6666
| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Office 365 |
6767
| `EmailSubject` | `string` | Subject of the email |
@@ -72,7 +72,7 @@ For information on other tables in the advanced hunting schema, [see the advance
7272
| `RegistryKey` |`string` | Registry key that the recorded action was applied to |
7373
| `RegistryValueName` |`string` | Name of the registry value that the recorded action was applied to |
7474
| `RegistryValueData` |`string` | Data of the registry value that the recorded action was applied to |
75-
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
75+
| `AdditionalFields` | `string` | Additional information about the entity or event |
7676
| `Severity` | `string` | Indicates the potential impact (high, medium, or low) of the threat indicator or breach activity identified by the alert |
7777
| `CloudResource` | `string` | Cloud resource name |
7878
| `CloudPlatform` | `string` | The cloud platform that the resource belongs to, can be Azure, Amazon Web Services, or Google Cloud Platform |

microsoft-365/security/defender/advanced-hunting-alertinfo-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 12/29/2023
2424
---
2525

2626
# AlertInfo

microsoft-365/security/defender/advanced-hunting-behaviorentities-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 12/29/2023
2424
---
2525

2626
# BehaviorEntities

microsoft-365/security/defender/advanced-hunting-behaviorinfo-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 12/29/2023
2424
---
2525

2626
# BehaviorInfo

microsoft-365/security/defender/advanced-hunting-cloudappevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 10/16/2023
23+
ms.date: 12/29/2023
2424
---
2525

2626
# CloudAppEvents

microsoft-365/security/defender/advanced-hunting-deviceevents-table.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 01/16/2024
2424
---
2525

2626
# DeviceEvents
@@ -44,7 +44,7 @@ For information on other tables in the advanced hunting schema, [see the advance
4444
| `Timestamp` | `datetime` | Date and time when the event was recorded |
4545
| `DeviceId` | `string` | Unique identifier for the device in the service |
4646
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
47-
| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details |
47+
| `ActionType` | `string` | Type of activity that triggered the event. See the [in-portal schema reference](advanced-hunting-schema-tables.md?#get-schema-information-in-the-security-center) for details. |
4848
| `FileName` | `string` | Name of the file that the recorded action was applied to |
4949
| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to |
5050
| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
@@ -55,19 +55,19 @@ For information on other tables in the advanced hunting schema, [see the advance
5555
| `AccountName` | `string` | User name of the account |
5656
| `AccountSid` | `string` | Security Identifier (SID) of the account |
5757
| `RemoteUrl` | `string` | URL or fully qualified domain name (FQDN) that was being connected to |
58-
| `RemoteDeviceName` | `string` | Name of the device that performed a remote operation on the affected device. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information |
58+
| `RemoteDeviceName` | `string` | Name of the device that performed a remote operation on the affected device. Depending on the event being reported, this name could be a fully-qualified domain name (FQDN), a NetBIOS name, or a host name without domain information. |
5959
| `ProcessId` | `long` | Process ID (PID) of the newly created process |
6060
| `ProcessCommandLine` | `string` | Command line used to create the new process |
6161
| `ProcessCreationTime` | `datetime` | Date and time the process was created |
6262
| `ProcessTokenElevation` | `string` | Indicates the type of token elevation applied to the newly created process. Possible values: TokenElevationTypeLimited (restricted), TokenElevationTypeDefault (standard), and TokenElevationTypeFull (elevated) |
63-
| `LogonId` | `string` | Identifier for a logon session. This identifier is unique on the same device only between restarts |
63+
| `LogonId` | `long` | Identifier for a logon session. This identifier is unique on the same device only between restarts. |
6464
| `RegistryKey` | `string` | Registry key that the recorded action was applied to |
6565
| `RegistryValueName` | `string` | Name of the registry value that the recorded action was applied to |
6666
| `RegistryValueData` | `string` | Data of the registry value that the recorded action was applied to |
6767
| `RemoteIP` | `string` | IP address that was being connected to |
6868
| `RemotePort` | `int` | TCP port on the remote device that was being connected to |
69-
| `LocalIP` | `string` | IP address assigned to the local machine used during communication |
70-
| `LocalPort` | `int` | TCP port on the local machine used during communication |
69+
| `LocalIP` | `string` | IP address assigned to the local device used during communication |
70+
| `LocalPort` | `int` | TCP port on the local device used during communication |
7171
| `FileOriginUrl` | `string` | URL where the file was downloaded from |
7272
| `FileOriginIP` | `string` | IP address where the file was downloaded from |
7373
| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
@@ -93,7 +93,7 @@ For information on other tables in the advanced hunting schema, [see the advance
9393
| `InitiatingProcessParentId` | `long` | Process ID (PID) of the parent process that spawned the process responsible for the event |
9494
| `InitiatingProcessParentFileName` | `string` | Name or full path of the parent process that spawned the process responsible for the event |
9595
| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
96-
| `InitiatingProcessLogonId` | `long` | Identifier for a logon session of the process that initiated the event. This identifier is unique on the same device only between restarts |
96+
| `InitiatingProcessLogonId` | `long` | Identifier for a logon session of the process that initiated the event. This identifier is unique on the same device only between restarts. |
9797
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9898
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9999
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |

microsoft-365/security/defender/advanced-hunting-devicefilecertificateinfo-table.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection:
2020
- m365-security
2121
- tier3
2222
ms.topic: reference
23-
ms.date: 02/16/2021
23+
ms.date: 01/16/2024
2424
---
2525

2626
# DeviceFileCertificateInfo
@@ -42,7 +42,7 @@ For information on other tables in the advanced hunting schema, [see the advance
4242
| `DeviceId` | `string` | Unique identifier for the device in the service |
4343
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
4444
| `SHA1` | `string` | SHA-1 of the file that the recorded action was applied to |
45-
| `IsSigned` | `boolean` | Indicates whether the file is signed |
45+
| `IsSigned` | `bool` | Indicates whether the file is signed |
4646
| `SignatureType` | `string` | Indicates whether signature information was read as embedded content in the file itself or read from an external catalog file |
4747
| `Signer` | `string` | Information about the signer of the file |
4848
| `SignerHash` | `string` | Unique hash value identifying the signer |
@@ -53,7 +53,7 @@ For information on other tables in the advanced hunting schema, [see the advance
5353
| `CertificateCreationTime` | `datetime` | Date and time the certificate was created |
5454
| `CertificateExpirationTime` | `datetime` | Date and time the certificate is set to expire |
5555
| `CertificateCountersignatureTime` | `datetime` | Date and time the certificate was countersigned |
56-
| `IsTrusted` | `boolean` | Indicates whether the file is trusted based on the results of the WinVerifyTrust function, which checks for unknown root certificate information, invalid signatures, revoked certificates, and other questionable attributes |
56+
| `IsTrusted` | `bool` | Indicates whether the file is trusted based on the results of the WinVerifyTrust function, which checks for unknown root certificate information, invalid signatures, revoked certificates, and other questionable attributes |
5757
| `IsRootSignerMicrosoft` | `boolean` | Indicates whether the signer of the root certificate is Microsoft and if the file is included in Windows operating system |
5858
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
5959

0 commit comments

Comments
 (0)