You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/PortalLaunchScheduler.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,6 +181,9 @@ The SharePoint Portal launch scheduler tool was originally only available via [S
181
181
182
182
1. Connect to SharePoint as a [global admin or SharePoint admin](/sharepoint/sharepoint-admin-role) in Microsoft 365. To learn how, see [Getting started with SharePoint Management Shell](/powershell/sharepoint/sharepoint-online/connect-sharepoint-online).
183
183
184
+
> [!IMPORTANT]
185
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
186
+
184
187
### View any existing portal launch setups
185
188
186
189
To see if there are existing portal launch configurations:
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
32
+
>[!IMPORTANT]
33
+
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
34
34
35
35
Now you're ready to start your OneDrive migration. Before starting any cross-tenant migration, do the following steps.
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/cross-tenant-sharepoint-migration-step6.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ description: "Step 6 of the SharePoint site Cross-tenant migration feature"
18
18
---
19
19
# Step 6: Start a SharePoint site cross-tenant migration (preview)
20
20
21
-
>[!Note]
22
-
>Cross-Tenant SharePoint migration is currently in a private preview stage of development. As an unfinished project, any information or availability is subject to change at any time. Support for private-preview customers will be handled via email. Cross-Tenant SharePoint migration is covered by the preview terms of the [Microsoft Universal License Terms for Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
21
+
>[!NOTE]
22
+
>Cross-Tenant SharePoint migration is currently in a private preview stage of development. As an unfinished project, any information or availability is subject to change at any time. Support for private-preview customers will be handled via email. Cross-Tenant SharePoint migration is covered by the preview terms of the [Microsoft Universal License Terms for Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
23
23
24
24
This is Step 6 in a solution designed to complete a Cross-tenant SharePoint migration. To learn more, see [Cross-tenant SharePoint migration overview](cross-tenant-SharePoint-migration.md).
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/deploy-identity-solution-identity-model.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,6 @@ Here are the two types of identity and their best fit and benefits.
58
58
|**How Microsoft 365 authenticates user credentials**| The Microsoft Entra tenant for your Microsoft 365 subscription performs the authentication with the cloud identity account. | The Microsoft Entra tenant for your Microsoft 365 subscription either handles the authentication process or redirects the user to another identity provider. |
59
59
|**Best for**| Organizations that do not have or need an on-premises AD DS. | Organizations using AD DS or another identity provider. |
60
60
|**Greatest benefit**| Simple to use. No extra directory tools or servers required. | Users can use the same credentials when accessing on-premises or cloud-based resources. |
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/join-leave-multi-tenant-org.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,9 @@ To join a multitenant organization, a global administrator in the owner organiza
22
22
23
23
Once you've joined, you can leave a multitenant organization at any time.
24
24
25
+
> [!IMPORTANT]
26
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/m365-dr-workload-copilot.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,9 @@ Required Conditions:
53
53
1. For existing _Tenant_ that has data stored in a _Macro Region Geography_, the _Tenant_ Global Admin must opt in to move the _Tenant_ data into the _Local Region Geography_.
54
54
1. The Microsoft 365 Copilot subscription customer data is provisioned in _Local Region Geography_.
55
55
56
+
> [!IMPORTANT]
57
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
58
+
56
59
**Commitment:**
57
60
58
61
Refer to the [ADR Commitment page](m365-dr-commitments.md#microsoft-365-copilot) to understand the specific data at rest commitments for Microsoft 365 Copilot. Examples of the committed data include:
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/microsoft-365-secure-sign-in.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,6 +59,9 @@ MFA requires that user sign-ins be subject to an additional verification beyond
59
59
60
60
Your first step in using MFA is to [require it for all administrator accounts](protect-your-global-administrator-accounts.md), also known as privileged accounts. Beyond this first step, Microsoft recommends MFA For all users.
61
61
62
+
> [!IMPORTANT]
63
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
64
+
62
65
There are three ways to require your users to use MFA based on your Microsoft 365 plan.
63
66
64
67
| Plan | Recommendation |
@@ -107,8 +110,8 @@ This table shows the results of enabling MFA with security defaults and Conditio
|**Security defaults**| Can’t use Conditional Access policies | Can use Conditional Access policies | Microsoft Authenticator app |
111
-
|**Conditional Access policies**| If any are enabled, you can’t enable security defaults | If all are disabled, you can enable security defaults | User specifies during MFA registration |
113
+
|**Security defaults**| Can't use Conditional Access policies | Can use Conditional Access policies | Microsoft Authenticator app |
114
+
|**Conditional Access policies**| If any are enabled, you can't enable security defaults | If all are disabled, you can enable security defaults | User specifies during MFA registration |
112
115
||||
113
116
114
117
## Zero Trust identity and device access configurations
@@ -133,14 +136,14 @@ Microsoft highly recommends configuring and rolling out Zero Trust identity and
133
136
134
137
## Microsoft Entra ID Protection
135
138
136
-
In this section, you'll learn how to configure policies that protect against credential compromise, where an attacker determines a user’s account name and password to gain access to an organization’s cloud services and data. Microsoft Entra ID Protection provides a number of ways to help prevent an attacker from compromising a user account's credentials.
139
+
In this section, you'll learn how to configure policies that protect against credential compromise, where an attacker determines a user's account name and password to gain access to an organization's cloud services and data. Microsoft Entra ID Protection provides a number of ways to help prevent an attacker from compromising a user account's credentials.
137
140
138
141
With Microsoft Entra ID Protection, you can:
139
142
140
143
|Capability|Description|
141
144
|:---------|:---------|
142
-
| Determine and address potential vulnerabilities in your organization’s identities | Microsoft Entra ID uses machine learning to detect anomalies and suspicious activity, such as sign-ins and post-sign-in activities. Using this data, Microsoft Entra ID Protection generates reports and alerts that help you evaluate the issues and take action.|
143
-
|Detect suspicious actions that are related to your organization’s identities and respond to them automatically|You can configure risk-based policies that automatically respond to detected issues when a specified risk level has been reached. These policies, in addition to other Conditional Access controls provided by Microsoft Entra ID and Microsoft Intune, can either automatically block access or take corrective actions, including password resets and requiring Microsoft Entra multifactor authentication for subsequent sign-ins. |
145
+
| Determine and address potential vulnerabilities in your organization's identities | Microsoft Entra ID uses machine learning to detect anomalies and suspicious activity, such as sign-ins and post-sign-in activities. Using this data, Microsoft Entra ID Protection generates reports and alerts that help you evaluate the issues and take action.|
146
+
|Detect suspicious actions that are related to your organization's identities and respond to them automatically|You can configure risk-based policies that automatically respond to detected issues when a specified risk level has been reached. These policies, in addition to other Conditional Access controls provided by Microsoft Entra ID and Microsoft Intune, can either automatically block access or take corrective actions, including password resets and requiring Microsoft Entra multifactor authentication for subsequent sign-ins. |
144
147
| Investigate suspicious incidents and resolve them with administrative actions | You can investigate risk events using information about the security incident. Basic workflows are available to track investigations and initiate remediation actions, such as password resets. |
0 commit comments