You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/business-premium/index.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,8 +31,7 @@ description: "Learn how to collaborate securely in your small business or campai
31
31
32
32
In our current world, keeping data and communications secure is a priority, particularly for medical and legal practices, political campaigns, and many other smaller businesses. Take advantage of the security features in Microsoft 365 Business Premium to collaborate safely within your small business. This solution provides a set of recommendations designed to help protect you and your data. This library includes help for setting up and using this recommended environment, no matter your business type.
33
33
34
-
35
-

34
+
:::image type="content" source="media/m365-whatisit-securityfocus2.png" alt-text="Microsoft 365 Business Premium protects your apps, file storage, email, devices, and identities.":::
36
35
37
36
This configuration includes the following guidance for productivity, collaboration, file storage, email, devices, and identity to protect your business:
Organizations gain access to robust visualizations of metrics and trends, integration with other Microsoft products, score comparison with similar organizations, and much more. The score can also reflect when third-party solutions have addressed recommended actions.
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,9 @@ To create a simulation automation, do the following steps:
27
27
28
28
To go directly to the **Simulation automations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulationautomation>.
29
29
30
-
2. On the **Simulation automations** tab, select **Create simulation**.
30
+
2. On the **Simulation automations** tab, select **Create automation**.
31
31
32
-

32
+

33
33
34
34
3. The creation wizard opens. The rest of this article describes the pages and the settings they contain.
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,19 +79,21 @@ Review your existing protection features in Microsoft 365 and consider removing
79
79
80
80
## Move features that modify messages into Microsoft 365
81
81
82
-
You need to transfer any customizations or features that modify messages in any way into Microsoft 365. For example, your existing protection service adds an **External** tag to the subject or message body of messages from external senders.
82
+
You need to transfer any customizations or features that modify messages in any way into Microsoft 365. For example, your existing protection service adds an **External** tag to the subject or message body of messages from external senders. Any link wrapping feature will also cause problems with some messages. If you're using such a feature today, you should prioritize the rollout of Safe Links as an alternative to minimize problems.
83
83
84
-
If you don't disable this functionality in your existing protection service, you can expect the following negative results in Microsoft 365:
84
+
If you don't turn off message modification features in your existing protection service, you can expect the following negative results in Microsoft 365:
85
85
86
-
- DKIM will break.
87
-
-[Spoof intelligence](anti-spoofing-protection.md) will not work properly.
86
+
- DKIM will break. Not all senders rely on DKIM, but those that do will fail authentication.
87
+
-[Spoof intelligence](anti-spoofing-protection.md)and the tuning step later in this guide will not work properly.
88
88
- You'll probably get a high number of false positives (good mail marked as bad).
89
89
90
-
To recreate this functionality in Microsoft 365, you have the following options:
90
+
To recreate external sender identification in Microsoft 365, you have the following options:
91
91
92
92
- The [Outlook external sender call-out feature](https://techcommunity.microsoft.com/t5/exchange-team-blog/native-external-sender-callouts-on-email-in-outlook/ba-p/2250098), together with [first contact safety tips](set-up-anti-phishing-policies.md#first-contact-safety-tip).
93
93
- Mail flow rules (also known as transport rules). For more information, see [Organization-wide message disclaimers, signatures, footers, or headers in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/disclaimers-signatures-footers-or-headers).
94
94
95
+
Microsoft is working with the industry to support the Authenticated Received Chain (ARC) standard in the near future. If you wish to leave any message modification features enabled at your current mail gateway provider, then we recommend contacting them about their plans to support this standard.
96
+
95
97
## Account for any active phishing simulations
96
98
97
99
If you have active third-party phishing simulations, you need to prevent the messages, links, and attachments from being identified as phishing by Defender for Office 365. For more information, see [Configure third-party phishing simulations in the advanced delivery policy](configure-advanced-delivery.md#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy).
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/preset-security-policies.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,10 +58,7 @@ A profile determines the level of protection. The following profiles are availab
58
58
59
59
You can only use a condition or exception once, but you can specify multiple values for the condition or exception. Multiple values of the same condition or exception use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). Different conditions or exceptions use AND logic (for example, _\<recipient1\>_ and _\<member of group 1\>_).
60
60
61
-
-**Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This setting effectively provide default policies for Safe Links and Safe Attachments, which never had default policies.
62
-
63
-
> [!NOTE]
64
-
> The **Built-in protection** preset security policy is currently in General Availability, available to all organizations.
61
+
-**Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This profile effectively provides default policies for Safe Links and Safe Attachments, which never had default policies.
65
62
66
63
For **Built-in protection**, the preset security policy is on by default for all Defender for Office 365 customers. Although we don't recommend it, you can also configure exceptions based on **Users**, **Groups**, and **Domains** so the protection isn't applied to specific users.
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-manage-endpoints.md
+5-13Lines changed: 5 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,17 +25,17 @@ With hybrid workers, you need to support a growing number of personal devices. E
25
25
26
26
[Microsoft Endpoint Manager](/mem/endpoint-manager-overview) provides services and tools for managing mobile devices, desktop computers, virtual machines, embedded devices, and servers by combining the following services you may already know and be using.
27
27
28
-

28
+
:::image type="content" source="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png" alt-text="The components of endpoint management for Microsoft 365" lightbox="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png":::
29
29
30
30
## Microsoft Intune
31
31
32
32
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM) that is included with Microsoft 365.
33
33
34
34
-**MDM:** For organization-owned devices, you can exercise full control including settings, features, and security. Devices are "enrolled" in Intune where they receive Intune policies with rules and settings. For example, you can set password and PIN requirements, create a VPN connection, set up threat protection, and more.
35
35
36
-
-**MAM:** Remote workers might not want you to have full control on their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
36
+
-**MAM:** Remote workers might not want you to have full control of their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
37
37
38
-
For more information, see the [Manage endpoints with Intune and Microsoft 365](manage-devices-with-intune-overview.md) foundation solution.
38
+
For more information, see the [Manage devices with Intune](manage-devices-with-intune-overview.md) foundation solution.
39
39
40
40
## Configuration Manager
41
41
@@ -53,17 +53,9 @@ For more information, see this [overview of co-management](/mem/configmgr/comana
53
53
54
54
## Endpoint Analytics
55
55
56
-
Endpoint Analytics is a cloud-based service that integrates with Configuration Manager and provides you with insight and intelligence so you can make informed decisions about your Windows clients. It combines data from your organization with data aggregated from millions of other devices connected to Microsoft cloud services.
56
+
Endpoint analytics aims to improve user productivity and reduce IT support costs by providing insights into the user experience. The insights enable IT to optimize the end-user experience with proactive support and to detect regressions to the user experience by assessing user impact of configuration changes.
57
57
58
-
With Endpoint Analytics, you can:
59
-
60
-
- Create an inventory of apps running in your organization.
61
-
- Assess app compatibility with the latest Windows 10 feature updates.
62
-
- Identify compatibility issues and receive mitigation suggestions based on cloud-enabled data insights.
63
-
- Create pilot groups that represent the entire application and driver estate across a minimal set of devices.
64
-
- Deploy Windows 10 to pilot and production-managed devices.
65
-
66
-
For more information, see this [overview of Endpoint Analytics](/mem/configmgr/desktop-analytics/overview)
58
+
For more information, see this [overview of Endpoint Analytics](/mem/analytics/overview)
Copy file name to clipboardExpand all lines: microsoft-365/solutions/empower-people-to-work-remotely-remote-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ With split tunneling, you can configure your VPN client to exclude specific type
52
52
53
53
To optimize access to Microsoft 365 cloud resources, configure your split tunneling VPN clients to exclude traffic to the **Optimize** category Microsoft 365 endpoints over the VPN connection. For more information, see [Office 365 endpoint categories](../enterprise/microsoft-365-network-connectivity-principles.md#new-office-365-endpoint-categories). See [this list](../enterprise/urls-and-ip-address-ranges.md) of Optimize category endpoints.
54
54
55
-
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypass the VPN connection.
55
+
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypasses the VPN connection.
56
56
57
57
:::image type="content" source="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png" alt-text="Network traffic from VPN clients with tunneling." lightbox="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png":::
0 commit comments