Skip to content

Commit 23a90ed

Browse files
authored
Merge pull request #12745 from MicrosoftDocs/main
Publish 02/17/2022, 10:30 AM
2 parents 007822d + dfd94ac commit 23a90ed

26 files changed

Lines changed: 290 additions & 111 deletions

microsoft-365/admin/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -145,11 +145,11 @@
145145
href: add-users/remove-former-employee-step-1.md
146146
- name: Step 2. Save the contents of a former employee's mailbox
147147
href: add-users/remove-former-employee-step-2.md
148-
- name: Step 3. Forward a former employee's email to another employee or convert to a shared mailbox
148+
- name: Step 3. Wipe and block a former employee's mobile device
149149
href: add-users/remove-former-employee-step-3.md
150-
- name: Step 4. Give another employee access to OneDrive and Outlook data
150+
- name: Step 4. Forward a former employee's email to another employee or convert to a shared mailbox
151151
href: add-users/remove-former-employee-step-4.md
152-
- name: Step 5. Wipe and block a former employee's mobile device
152+
- name: Step 5. Give another employee access to OneDrive and Outlook data
153153
href: add-users/remove-former-employee-step-5.md
154154
- name: Step 6. Remove the Microsoft 365 license from a former employee
155155
href: add-users/remove-former-employee-step-6.md

microsoft-365/business-premium/index.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,7 @@ description: "Learn how to collaborate securely in your small business or campai
3131

3232
In our current world, keeping data and communications secure is a priority, particularly for medical and legal practices, political campaigns, and many other smaller businesses. Take advantage of the security features in Microsoft 365 Business Premium to collaborate safely within your small business. This solution provides a set of recommendations designed to help protect you and your data. This library includes help for setting up and using this recommended environment, no matter your business type.
3333

34-
35-
![Microsoft 365 Business Premium protects your productivity tools, collaboration tools, file storage, email, devices, and identity.](../media/M365-WhatIsIt-SecurityFocus.png#lightbox)
34+
:::image type="content" source="media/m365-whatisit-securityfocus2.png" alt-text="Microsoft 365 Business Premium protects your apps, file storage, email, devices, and identities.":::
3635

3736
This configuration includes the following guidance for productivity, collaboration, file storage, email, devices, and identity to protect your business:
3837

45.5 KB
Loading

microsoft-365/security/defender-endpoint/tvm-weaknesses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The **Weaknesses** page lists the software vulnerabilities your devices are expo
4545

4646
Access the Weaknesses page a few different ways:
4747

48-
- Selecting **Weaknesses** from the **Vulnerability management** navigation menu in the [Microsoft 365 Defender portal] (portal-overview.md)
48+
- Selecting **Weaknesses** from the **Vulnerability management** navigation menu in the [Microsoft 365 Defender portal](portal-overview.md)
4949
- Global search
5050

5151
### Navigation menu

microsoft-365/security/defender/microsoft-secure-score.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ Secure Score helps organizations:
3939
* Improve their security posture by providing discoverability, visibility, guidance, and control.
4040
* Compare with benchmarks and establish key performance indicators (KPIs).
4141

42+
Watch this video for a quick overview of Secure score.
43+
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWUPrP]
44+
4245
Organizations gain access to robust visualizations of metrics and trends, integration with other Microsoft products, score comparison with similar organizations, and much more. The score can also reflect when third-party solutions have addressed recommended actions.
4346

4447
![Secure Score homepage.](../../media/secure-score/secure-score-home-page.png)

microsoft-365/security/office-365-security/attack-simulation-training-simulation-automations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ To create a simulation automation, do the following steps:
2727

2828
To go directly to the **Simulation automations** tab, use <https://security.microsoft.com/attacksimulator?viewid=simulationautomation>.
2929

30-
2. On the **Simulation automations** tab, select ![Create simulation icon.](../../media/m365-cc-sc-create-icon.png) **Create simulation**.
30+
2. On the **Simulation automations** tab, select ![Create automation icon.](../../media/m365-cc-sc-create-icon.png) **Create automation**.
3131

32-
![Create simulation button on the Simulation automations tab in Attack simulation training in the Microsoft 365 Defender portal.](../../media/attack-sim-training-sim-automations-create.png)
32+
![Create automation button on the Simulation automations tab in Attack simulation training in the Microsoft 365 Defender portal.](../../media/attack-sim-training-sim-automations-create.png)
3333

3434
3. The creation wizard opens. The rest of this article describes the pages and the settings they contain.
3535

microsoft-365/security/office-365-security/migrate-to-defender-for-office-365-prepare.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -79,19 +79,21 @@ Review your existing protection features in Microsoft 365 and consider removing
7979

8080
## Move features that modify messages into Microsoft 365
8181

82-
You need to transfer any customizations or features that modify messages in any way into Microsoft 365. For example, your existing protection service adds an **External** tag to the subject or message body of messages from external senders.
82+
You need to transfer any customizations or features that modify messages in any way into Microsoft 365. For example, your existing protection service adds an **External** tag to the subject or message body of messages from external senders. Any link wrapping feature will also cause problems with some messages. If you're using such a feature today, you should prioritize the rollout of Safe Links as an alternative to minimize problems.
8383

84-
If you don't disable this functionality in your existing protection service, you can expect the following negative results in Microsoft 365:
84+
If you don't turn off message modification features in your existing protection service, you can expect the following negative results in Microsoft 365:
8585

86-
- DKIM will break.
87-
- [Spoof intelligence](anti-spoofing-protection.md) will not work properly.
86+
- DKIM will break. Not all senders rely on DKIM, but those that do will fail authentication.
87+
- [Spoof intelligence](anti-spoofing-protection.md) and the tuning step later in this guide will not work properly.
8888
- You'll probably get a high number of false positives (good mail marked as bad).
8989

90-
To recreate this functionality in Microsoft 365, you have the following options:
90+
To recreate external sender identification in Microsoft 365, you have the following options:
9191

9292
- The [Outlook external sender call-out feature](https://techcommunity.microsoft.com/t5/exchange-team-blog/native-external-sender-callouts-on-email-in-outlook/ba-p/2250098), together with [first contact safety tips](set-up-anti-phishing-policies.md#first-contact-safety-tip).
9393
- Mail flow rules (also known as transport rules). For more information, see [Organization-wide message disclaimers, signatures, footers, or headers in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/disclaimers-signatures-footers-or-headers).
9494

95+
Microsoft is working with the industry to support the Authenticated Received Chain (ARC) standard in the near future. If you wish to leave any message modification features enabled at your current mail gateway provider, then we recommend contacting them about their plans to support this standard.
96+
9597
## Account for any active phishing simulations
9698

9799
If you have active third-party phishing simulations, you need to prevent the messages, links, and attachments from being identified as phishing by Defender for Office 365. For more information, see [Configure third-party phishing simulations in the advanced delivery policy](configure-advanced-delivery.md#use-the-microsoft-365-defender-portal-to-configure-third-party-phishing-simulations-in-the-advanced-delivery-policy).

microsoft-365/security/office-365-security/preset-security-policies.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,7 @@ A profile determines the level of protection. The following profiles are availab
5858

5959
You can only use a condition or exception once, but you can specify multiple values for the condition or exception. Multiple values of the same condition or exception use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). Different conditions or exceptions use AND logic (for example, _\<recipient1\>_ and _\<member of group 1\>_).
6060

61-
- **Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This setting effectively provide default policies for Safe Links and Safe Attachments, which never had default policies.
62-
63-
> [!NOTE]
64-
> The **Built-in protection** preset security policy is currently in General Availability, available to all organizations.
61+
- **Built-in protection** (Defender for Office 365 only): A profile that enables Safe Links and Safe Attachments protection only. This profile effectively provides default policies for Safe Links and Safe Attachments, which never had default policies.
6562

6663
For **Built-in protection**, the preset security policy is on by default for all Defender for Office 365 customers. Although we don't recommend it, you can also configure exceptions based on **Users**, **Groups**, and **Domains** so the protection isn't applied to specific users.
6764

microsoft-365/solutions/empower-people-to-work-remotely-manage-endpoints.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,17 @@ With hybrid workers, you need to support a growing number of personal devices. E
2525

2626
[Microsoft Endpoint Manager](/mem/endpoint-manager-overview) provides services and tools for managing mobile devices, desktop computers, virtual machines, embedded devices, and servers by combining the following services you may already know and be using.
2727

28-
![The components of endpoint management for Microsoft 365.](../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png)
28+
:::image type="content" source="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png" alt-text="The components of endpoint management for Microsoft 365" lightbox="../media/empower-people-to-work-remotely/endpoint-managment-step-grid.png":::
2929

3030
## Microsoft Intune
3131

3232
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM) that is included with Microsoft 365.
3333

3434
- **MDM:** For organization-owned devices, you can exercise full control including settings, features, and security. Devices are "enrolled" in Intune where they receive Intune policies with rules and settings. For example, you can set password and PIN requirements, create a VPN connection, set up threat protection, and more.
3535

36-
- **MAM:** Remote workers might not want you to have full control on their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
36+
- **MAM:** Remote workers might not want you to have full control of their personal devices, also known as bring-your-own device (BYOD) devices. You can give your hybrid workers options and still protect your organization. For example, hybrid workers can enroll their devices if they want full access to your organization resources. Or, if these users only want access to email or Microsoft Teams, then use app protection policies that require multi-factor authentication (MFA) to use these apps.
3737

38-
For more information, see the [Manage endpoints with Intune and Microsoft 365](manage-devices-with-intune-overview.md) foundation solution.
38+
For more information, see the [Manage devices with Intune](manage-devices-with-intune-overview.md) foundation solution.
3939

4040
## Configuration Manager
4141

@@ -53,17 +53,9 @@ For more information, see this [overview of co-management](/mem/configmgr/comana
5353

5454
## Endpoint Analytics
5555

56-
Endpoint Analytics is a cloud-based service that integrates with Configuration Manager and provides you with insight and intelligence so you can make informed decisions about your Windows clients. It combines data from your organization with data aggregated from millions of other devices connected to Microsoft cloud services.
56+
Endpoint analytics aims to improve user productivity and reduce IT support costs by providing insights into the user experience. The insights enable IT to optimize the end-user experience with proactive support and to detect regressions to the user experience by assessing user impact of configuration changes.
5757

58-
With Endpoint Analytics, you can:
59-
60-
- Create an inventory of apps running in your organization.
61-
- Assess app compatibility with the latest Windows 10 feature updates.
62-
- Identify compatibility issues and receive mitigation suggestions based on cloud-enabled data insights.
63-
- Create pilot groups that represent the entire application and driver estate across a minimal set of devices.
64-
- Deploy Windows 10 to pilot and production-managed devices.
65-
66-
For more information, see this [overview of Endpoint Analytics](/mem/configmgr/desktop-analytics/overview)
58+
For more information, see this [overview of Endpoint Analytics](/mem/analytics/overview)
6759

6860
## Windows Autopilot
6961

microsoft-365/solutions/empower-people-to-work-remotely-remote-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ With split tunneling, you can configure your VPN client to exclude specific type
5252

5353
To optimize access to Microsoft 365 cloud resources, configure your split tunneling VPN clients to exclude traffic to the **Optimize** category Microsoft 365 endpoints over the VPN connection. For more information, see [Office 365 endpoint categories](../enterprise/microsoft-365-network-connectivity-principles.md#new-office-365-endpoint-categories). See [this list](../enterprise/urls-and-ip-address-ranges.md) of Optimize category endpoints.
5454

55-
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypass the VPN connection.
55+
Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypasses the VPN connection.
5656

5757
:::image type="content" source="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png" alt-text="Network traffic from VPN clients with tunneling." lightbox="../media/empower-people-to-work-remotely-remote-access/empower-people-to-work-remotely-remote-access-after-tunneling.png":::
5858

0 commit comments

Comments
 (0)