Skip to content

Commit 6e43aef

Browse files
authored
Merge pull request #12733 from MicrosoftDocs/main
Publish 02/16/2022, 10:30 AM
2 parents 559df2c + dac49a2 commit 6e43aef

7 files changed

Lines changed: 56 additions & 53 deletions

File tree

microsoft-365/compliance/retention-policies-teams.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,9 @@ Other mailbox types, such as RoomMailbox that is used for Teams conference rooms
6060

6161
Teams uses an Azure-powered chat service as its primary storage for all messages (chats and channel messages). If you need to delete Teams messages for compliance reasons, retention policies for Teams can delete messages after a specified period, based on when they were created. Messages are then permanently deleted from both the Exchange mailboxes where they stored for compliance operations, and from the primary storage used by the underlying Azure-powered chat service. For more information about the underlying architecture, see [Security and compliance in Microsoft Teams](/MicrosoftTeams/security-compliance-overview) and specifically, the [Information Protection Architecture](/MicrosoftTeams/security-compliance-overview#information-protection-architecture) section.
6262

63-
Although this data from Teams chats and channel messages are stored in mailboxes, you must configure a retention policy for the **Teams channel messages** and **Teams chats** locations. Teams chats and channel messages are not included in retention policies that are configured for Exchange user or group mailboxes. If a user is added to a chat, a copy of all messages shared with them are ingested into their mailbox. The created date of those messages does not change for the new user and remains the same for all users.
63+
Although this data from Teams chats and channel messages are stored in mailboxes, you must configure a retention policy for the **Teams channel messages** and **Teams chats** locations. Teams chats and channel messages are not included in retention policies that are configured for Exchange user or group mailboxes. Similarly, retention policies for Teams don't affect other email items stored mailboxes.
64+
65+
If a user is added to a chat, a copy of all messages shared with them are ingested into their mailbox. The created date of those messages does not change for the new user and remains the same for all users.
6466

6567
> [!NOTE]
6668
> If a user is included in an active retention policy that retains Teams messages and you delete a mailbox of a user who is included in this policy, the mailbox is converted into an [inactive mailbox](inactive-mailboxes-in-office-365.md) to retain the Teams data. If you don't need to retain this Teams data for the user, exclude the user account from the retention policy and [wait for this change to take effect](create-retention-policies.md#how-long-it-takes-for-retention-policies-to-take-effect) before you delete their mailbox.

microsoft-365/lighthouse/m365-lighthouse-compare-compliance-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,24 +24,24 @@ description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
2424
> [!NOTE]
2525
> The features described in this article are in Preview, are subject to change, and are only available to partners who meet the [requirements](m365-lighthouse-requirements.md). If your organization does not have Microsoft 365 Lighthouse, see [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md).
2626
27-
Microsoft 365 Lighthouse lets you view compliance policies across your tenants in a single view. You can drive security and standardization across your tenants by comparing policies. You can filter views to see settings that have been configured (versus settings that were left not configured), settings that differ in their configurations, or just the settings that match. You can also search for specific settings you’re interested in and see how that compares among the policies.
27+
Microsoft 365 Lighthouse lets you view compliance policies across your tenants in a single view. You can drive security and standardization across your tenants by comparing policies. You can filter views to see settings that have been configured (versus settings that were left not configured), settings that differ in their configurations, or settings that match. You can also search for specific settings to see how they compare across policies.
2828

2929
## Before you begin
3030

31-
- Devices must have an Intune license and be enrolled in Microsoft Endpoint Manager (MEM).
31+
Make sure devices have a Microsoft Intune license and are enrolled in Microsoft Endpoint Manager (MEM).
3232

3333
## Compare policy settings
3434

3535
1. In the left navigation pane in Lighthouse, select **Devices**.
3636

3737
2. Select the **Policies** tab.
3838

39-
3. From the **Filters** drop-down list, select an operating system/platform.
39+
3. From the **Filters** drop-down list, select an operating system or platform.
4040

4141
> [!NOTE]
42-
> You can only compare policies with the same operating system/platform.
42+
> You can only compare policies with the same operating system or platform.
4343
44-
4. From the filtered list, select up to three policies you want to compare.
44+
4. From the filtered list, select up to three policies that you want to compare.
4545

4646
5. Select **Compare**.
4747

microsoft-365/lighthouse/m365-lighthouse-deploy-baselines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Select **Baselines** from the left navigation pane to open the Baselines page. Y
4444

4545
## Deploy a baseline configuration
4646

47-
1. In the left navigation page, select **Tenants** to view a list of your onboarded tenants.
47+
1. In the left navigation pane in Lighthouse, select **Tenants** to view a list of your onboarded tenants.
4848

4949
2. Select the tenant you want to deploy the baseline configuration to.
5050

microsoft-365/lighthouse/m365-lighthouse-reset-user-password.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,29 +23,29 @@ description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
2323
> [!NOTE]
2424
> The features described in this article are in Preview, are subject to change, and are only available to partners who meet the [requirements](m365-lighthouse-requirements.md). If your organization does not have Microsoft 365 Lighthouse, see [Sign up for Microsoft 365 Lighthouse](m365-lighthouse-sign-up.md).
2525
26-
Microsoft 365 Lighthouse lets you change or reset user passwords. You can reset a single user or multiple risky users across different tenants.
26+
Microsoft 365 Lighthouse lets you change or reset user passwords. You can reset the password for a single user or for multiple risky users across different tenants.
2727

2828
## Reset a password for a user
2929

3030
1. In the left navigation pane in Lighthouse, select **Users**.
3131

3232
2. Select the **Search users** tab.
3333

34-
3. In the search box, enter a users name.
34+
3. In the search box, enter a user's name.
3535

3636
4. From the search results list, select the user.
3737

3838
5. In the user details pane, select **Reset password**.
3939

4040
6. In the Reset password pane, select **Autogenerate a password** or **Let me create a password**.
4141

42-
a. If you choose to create a password, enter a password.
42+
- If you choose to create a password, enter a password.
4343

44-
b. If you want the user to change their password after first sign in, select the checkbox.
44+
- If you want the user to change their password after first sign-in, select the checkbox.
4545

4646
7. Select **Reset password**.
4747

48-
## Reset password for risky users
48+
## Reset a password for a risky user
4949

5050
1. In the left navigation pane in Lighthouse, select **Users**.
5151

@@ -57,13 +57,13 @@ Microsoft 365 Lighthouse lets you change or reset user passwords. You can reset
5757

5858
5. In the Reset password pane, select **Autogenerate a password** or **Let me create a password**.
5959

60-
1. If you choose to create a password, enter a password.
60+
- If you choose to create a password, enter a password.
6161

62-
1. If you want the user to change their password after first sign in, select the checkbox.
62+
- If you want the user to change their password after first sign-in, select the checkbox.
6363

6464
6. Select **Reset password**.
6565

6666
## Related content
6767

68-
[Manage Microsoft 365 user accounts](../enterprise/manage-microsoft-365-accounts.md)\
69-
[Block user sign-in](m365-lighthouse-block-user-signin.md)
68+
[Manage Microsoft 365 user accounts](../enterprise/manage-microsoft-365-accounts.md) (article)\
69+
[Block user sign-in](m365-lighthouse-block-user-signin.md) (article)

microsoft-365/lighthouse/m365-lighthouse-review-audit-logs.md

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -29,58 +29,58 @@ Microsoft 365 Lighthouse audit logs record actions that generate a change in Lig
2929

3030
To view audit logs, you must have one of the following permissions:
3131

32-
- Azure AD role - Global Administrator of partner tenant
32+
- Azure Active Directory (Azure AD) role - Global Administrator of partner tenant
3333

34-
- Partner Center role - Admin Agent
34+
- Microsoft Partner Center role - Admin agent
3535

36-
## Review logs
36+
## Review audit logs
3737

3838
1. In the left navigation pane in Lighthouse, select **Audit logs**.
3939

4040
> [!NOTE]
4141
> It might take up to 1 hour to see new logs. Go to the respective service to see the most recent changes.
4242
43-
2. To filter the logs, refine the list using the following options:
43+
2. Filter the logs, as needed, by using the following options:
4444

4545
- **Date range** - Previous month, week, or day.
4646
- **Tenants** - Tenant tags or customer tenant names.
47-
- **Activity** - Microsoft 365 activity type that corresponds to the action taken. For more information, see Activity Types table.
47+
- **Activity** - Microsoft 365 activity type that corresponds to the action taken. For more information, see the [Activities](#activities) table.
4848
- **Initiated by** - Who initiated the action.
4949

50-
3. Select a log from the list to see full details including the **Request** body.
51-
52-
Select **Export**, to export log data to a comma-separated values (.csv) file.
53-
54-
## Activity Types
55-
56-
The following table is a list of activity types captured within Lighthouse audit logs. The list is subject to change as new actions are created. You can use the activity value from the audit log to see what action was initiated.
57-
58-
| Activity name | Area in Microsoft 365 Lighthouse | Action initiated | Service impacted |
59-
|------------------|----------------------------------|-------------------|----------------------------|
60-
|**apply** | Tenants | Apply deployment plan | Azure AD, Microsoft Endpoint Manager |
61-
|**assignTag** | Tenants | Apply a tag from a customer | Microsoft 365 Lighthouse |
62-
|**changeDeploymentStatus** | Tenants | Action plan status for deployment plan | Microsoft 365 Lighthouse |
63-
|**offboardTenant** | Tenants | Inactivate a customer | Microsoft 365 Lighthouse |
64-
|**resetTenantOnboardingStatus** | Tenants | Reactive a customer | Microsoft 365 Lighthouse |
65-
|**tenantTags** | Tenants | Create or delete a tag | Microsoft 365 Lighthouse |
66-
|**tenantCustomizedInformation** | Tenants | Create, update, or delete customer website or contact information | Microsoft 365 Lighthouse |
67-
|**unassignTag** | Tenants | Remove a tag from a customer | Microsoft 365 Lighthouse |
68-
| **blockUserSignin** | Users | Block sign-in | Azure AD |
69-
| **confirmUsersCompromised** | Users | Confirm user compromised | Azure AD |
70-
| **dismissUsersRisk** | Users | Dismiss user risk | Azure AD |
71-
| **resetUserPassword** | Users | Reset password | Azure AD |
72-
| **setCustomerSecurityDefaultsEnabledStatus** | Users | Enable MFA with Security Defaults | Azure AD |
73-
|**restartDevice** | Devices | Restart | Microsoft Endpoint Manager |
74-
| **syncDevice** | Devices | Sync | Microsoft Endpoint Manager |
75-
| **rebootNow** | Threat management | Reboot | Microsoft Endpoint Manager |
76-
| **reprovision** | Windows 365 | Retry Provisioning | Windows 365 |
77-
| **windowsDefenderScanFull** | Threat management | Full scan | Microsoft Endpoint Manager |
78-
| **windowsDefenderScan** | Threat management | Quick scan | Microsoft Endpoint Manager |
79-
| **windowsDefenderUpdateSignatures** | Threat management | Update antivirus | Microsoft Endpoint Manager |
50+
3. Select a log from the list to see full details, including the **Request** body.
51+
52+
To export log data to a comma-separated values (.csv) file, select **Export**.
53+
54+
## Activities
55+
56+
The following table lists activities captured within Lighthouse audit logs. The list is subject to change as new actions are created. You can use the activity listed in the audit log to see which action was initiated.<br><br>
57+
58+
| Activity name | Area in Lighthouse | Action initiated | Service impacted |
59+
|--|--|--|--|
60+
| **apply** | Tenants | Apply deployment plan | Azure AD, Microsoft Endpoint Manager (MEM) |
61+
| **assignTag** | Tenants | Apply a tag from a customer | Lighthouse |
62+
| **changeDeploymentStatus** | Tenants | Action plan status for deployment plan | Lighthouse |
63+
| **offboardTenant** | Tenants | Inactivate a customer | Lighthouse |
64+
| **resetTenantOnboardingStatus** | Tenants | Reactive a customer | Lighthouse |
65+
| **tenantTags** | Tenants | Create or delete a tag | Lighthouse |
66+
| **tenantCustomizedInformation** | Tenants | Create, update, or delete a customer website or contact information | Lighthouse |
67+
| **unassignTag** | Tenants | Remove a tag from a customer | Lighthouse |
68+
| **blockUserSignin** | Users | Block sign-in | Azure AD |
69+
| **confirmUsersCompromised** | Users | Confirm a user is compromised | Azure AD |
70+
| **dismissUsersRisk** | Users | Dismiss user risk | Azure AD |
71+
| **resetUserPassword** | Users | Reset password | Azure AD |
72+
| **setCustomerSecurityDefaultsEnabledStatus** | Users | Enable multifactor authentication (MFA) with security defaults | Azure AD |
73+
| **restartDevice** | Devices | Restart | MEM |
74+
| **syncDevice** | Devices | Sync | MEM |
75+
| **rebootNow** | Threat management | Reboot | MEM |
76+
| **reprovision** | Windows 365 | Retry provisioning | Windows 365 |
77+
| **windowsDefenderScanFull** | Threat management | Full scan | MEM |
78+
| **windowsDefenderScan** | Threat management | Quick scan | MEM |
79+
| **windowsDefenderUpdateSignatures** | Threat management | Update antivirus | MEM |
8080

8181
## Next steps
8282

83-
If you need more information, you can use Microsoft Graph API to access more audit events. For more information, see [Overview for multi-tenant management using the Microsoft 365 Lighthouse API](/graph/managedtenants-concept-overview).
83+
If you need more information, use Microsoft Graph API to access more audit events. For more information, see [Overview for multi-tenant management using the Microsoft 365 Lighthouse API](/graph/managedtenants-concept-overview).
8484

8585
## Related content
8686

550 Bytes
Loading

microsoft-365/security/defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ ms.technology: m365d
2222

2323
# Run the client analyzer on macOS and Linux
2424

25+
2526
**Applies to:**
2627
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
2728

@@ -30,7 +31,7 @@ ms.technology: m365d
3031
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
3132

3233
> [!NOTE]
33-
> The current SHA256 hash of 'XMDEClientAnalyzer.zip' that is downloaded from the above link is: '34C0DA20A6B38A16951394958991CD74EF7E07EB1DE06923547B351665A32DF6'.
34+
> The current SHA256 hash of 'XMDEClientAnalyzer.zip' that is downloaded from the above link is: 'AA6E73A5F451C3B78B066C9D55EE6499CE3C2F1A6E05CCE691A6055F36F93A3B'.
3435
3536
2. Extract the contents of XMDEClientAnalyzer.zip on the machine.
3637

0 commit comments

Comments
 (0)