You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: copilot/microsoft-365-copilot-setup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ Audit logging is essential for tracking and monitoring activities within your Mi
84
84
85
85
#### Steps to implement audit logging
86
86
87
-
-**Enable unified audit logging** Turn on unified audit logging in the Microsoft Purview compliance portal to capture all user and admin activities.
87
+
-**Enable unified audit logging** Turn on unified audit logging in the Microsoft Purview portal to capture all user and admin activities.
88
88
-**Configure audit log retention** Set up retention policies to ensure that audit logs are retained for the required period based on your organization's compliance needs.
89
89
-**Monitor and review logs** Regularly monitor and review audit logs to identify any suspicious activities or potential security threats.
Copy file name to clipboardExpand all lines: microsoft-365/admin/activity-reports/activity-reports.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -203,7 +203,7 @@ Two methods have been approved for this API:
203
203
204
204
The report will only contain a Privacy Setting property. For more information on Graph API, see [Use the Microsoft Graph API](/graph/use-the-api). You can use the Software Development Kit (SDK) or directly call the API using any program language with network ability. We recommend using [Graph Explorer](/graph/graph-explorer/graph-explorer-overview).
205
205
206
-
It will take a few minutes for these changes to take effect on the reports in the reports dashboard. This setting also applies to the Microsoft 365 usage reports in [Microsoft Graph](/graph/api/resources/report) and [Power BI](/microsoft-365/admin/usage-analytics/usage-analytics) and [the usage reports in Microsoft Teams Admin center](/microsoftteams/teams-analytics-and-reports/teams-reporting-reference). Showing identifiable user information is a logged event in the Microsoft Purview compliance portal audit log.
206
+
It will take a few minutes for these changes to take effect on the reports in the reports dashboard. This setting also applies to the Microsoft 365 usage reports in [Microsoft Graph](/graph/api/resources/report) and [Power BI](/microsoft-365/admin/usage-analytics/usage-analytics) and [the usage reports in Microsoft Teams Admin center](/microsoftteams/teams-analytics-and-reports/teams-reporting-reference). Showing identifiable user information is a logged event in the Microsoft Purview portal audit log.
207
207
208
208
## What happens to usage data when a user account is deleted?
Copy file name to clipboardExpand all lines: microsoft-365/admin/basic-mobility-security/capabilities.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,7 +237,7 @@ You can set these additional policy settings by using PowerShell cmdlets:
237
237
238
238
## Remotely wipe a mobile device
239
239
240
-
If a device is lost or stolen, you can remove sensitive organizational data and help prevent access to your Microsoft 365 organization resources by doing a wipe from **Microsoft Purview compliance portal** > **Data loss prevention** > **Device management**. You can do a selective wipe to remove only organizational data or a full wipe to delete all information from a device and restore it to its factory settings.
240
+
If a device is lost or stolen, you can remove sensitive organizational data and help prevent access to your Microsoft 365 organization resources by doing a wipe from **Microsoft Purview portal** > **Data loss prevention** > **Device management**. You can do a selective wipe to remove only organizational data or a full wipe to delete all information from a device and restore it to its factory settings.
241
241
242
242
For more information, see [Wipe a mobile device in Basic Mobility and Security](wipe-mobile-device.md).
Copy file name to clipboardExpand all lines: microsoft-365/admin/basic-mobility-security/create-device-security-policies.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ You can use Basic Mobility and Security to create device policies that help prot
46
46
47
47
Before you can start, make sure you have activated and set up Basic Mobility and Security. For instructions, see [Overview of Basic Mobility and Security](overview.md).
48
48
49
-
1. From your browser, go to <https://compliance.microsoft.com/basicmobilityandsecurity>.
49
+
1. From your browser, go to <https://purview.microsoft.com/basicmobilityandsecurity>.
50
50
51
51
2. On the **Policies** tab, select **Create**.
52
52
@@ -66,7 +66,7 @@ The policy is pushed to the device of each user the policy applies to the next t
66
66
67
67
After you’ve created a device policy, check that the policy works as you expect before you deploy it to your organization.
68
68
69
-
1. From your browser, go to [https://compliance.microsoft.com/basicmobilityandsecurity](https://compliance.microsoft.com/basicmobilityandsecurity).
69
+
1. From your browser, go to [https://purview.microsoft.com/basicmobilityandsecurity](https://purview.microsoft.com/basicmobilityandsecurity).
70
70
2. Select **View the list of managed devices**.
71
71
3. Check the status of user devices that have the policy applied. You want the **State** of devices to be **Managed.**
72
72
4. You can also do a full or selective wipe on a device by clicking on **Factory reset** or **Remove company data** from **Manage** button after selecting a device. For instructions, see [Wipe a mobile device in Basic Mobility and Security](wipe-mobile-device.md).
@@ -75,7 +75,7 @@ After you’ve created a device policy, check that the policy works as you expec
75
75
76
76
After you’ve created a device policy and verified that it works as expected, deploy it to your organization.
77
77
78
-
1. From your browser type: [https://compliance.microsoft.com/basicmobilityandsecurity](https://compliance.microsoft.com/basicmobilityandsecurity).
78
+
1. From your browser type: [https://purview.microsoft.com/basicmobilityandsecurity](https://purview.microsoft.com/basicmobilityandsecurity).
79
79
2. Select the policy you want to deploy, and choose **Edit** next to **Groups applied to.**
80
80
3. Search for a group to add and click on **Select**.
81
81
4. Select **Close** and **Change setting.**
@@ -89,7 +89,7 @@ To help secure your organization information, you should block app access to Mic
89
89
90
90
**To block app access:**
91
91
92
-
1. From your browser, type [https://compliance.microsoft.com/basicmobilityandsecurity](https://compliance.microsoft.com/basicmobilityandsecurity).
92
+
1. From your browser, type [https://purview.microsoft.com/basicmobilityandsecurity](https://purview.microsoft.com/basicmobilityandsecurity).
93
93
1. Select **Organization Setting** tab.
94
94
95
95
3. To block unsupported devices, choose **Access** under **If a device isn't supported by Basic Mobility and Security for Microsoft 365**, and then select **Save**.
@@ -100,7 +100,7 @@ To help secure your organization information, you should block app access to Mic
100
100
101
101
If you want to exclude some people from conditional access checks on their mobile devices and you've created one or more security groups for those people, add the security groups here. The people in these groups won't have any policies enforced for their supported mobile devices. This is the recommended option if you no longer want to use Basic Mobility and Security in your organization.
102
102
103
-
1. From your browser, type [https://compliance.microsoft.com/basicmobilityandsecurity](https://compliance.microsoft.com/basicmobilityandsecurity).
103
+
1. From your browser, type [https://purview.microsoft.com/basicmobilityandsecurity](https://purview.microsoft.com/basicmobilityandsecurity).
Copy file name to clipboardExpand all lines: microsoft-365/admin/basic-mobility-security/frequently-asked-questions.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,14 @@ sections:
35
35
- question: |
36
36
How can I get Basic Mobility and Security? I don't see it in the Microsoft 365 admin center.
37
37
answer: |
38
-
1. Activate Basic Mobility and Security by going to the [home page](https://compliance.microsoft.com/basicmobilityandsecurity/).
38
+
1. Activate Basic Mobility and Security by going to the [home page](https://purview.microsoft.com/basicmobilityandsecurity/).
39
39
40
40
- question: |
41
41
How can I get started with device management in Basic Mobility and Security?
42
42
answer: |
43
43
There are four steps to getting started with Basic Mobility and Security:
44
44
45
-
1. Activate Basic Mobility and Security by going to the [home page](https://compliance.microsoft.com/basicmobilityandsecurity/).
45
+
1. Activate Basic Mobility and Security by going to the [home page](https://purview.microsoft.com/basicmobilityandsecurity/).
46
46
47
47
2. Select Policies and then select Create. Create device management policies, and apply them to groups of users that are set up in security groups. We recommend that you start by deploying the policies to a small test group. For more info, see [Create device security policies in Basic Mobility and Security](create-device-security-policies.md).
48
48
@@ -129,7 +129,7 @@ sections:
129
129
- question: |
130
130
How do policies work for Basic Mobility and Security? How do I set them up? Disable them?
131
131
answer: |
132
-
After you complete initial setup for Basic Mobility and Security, you create policies and apply them to groups of users in the Security & Compliance Center. Policies require users of the policies to enroll their devices in Basic Mobility and Security before the device can be used to access Microsoft 365 data. The policies that you set up determine settings for mobile devices, for example, how often passwords must be reset or whether data encryption is required. For more information, see [Create device security policies in Basic Mobility and Security](create-device-security-policies.md) and [Microsoft Purview compliance portal](../../compliance/microsoft-365-compliance-center.md).
132
+
After you complete initial setup for Basic Mobility and Security, you create policies and apply them to groups of users in the Security & Compliance Center. Policies require users of the policies to enroll their devices in Basic Mobility and Security before the device can be used to access Microsoft 365 data. The policies that you set up determine settings for mobile devices, for example, how often passwords must be reset or whether data encryption is required. For more information, see [Create device security policies in Basic Mobility and Security](create-device-security-policies.md) and [Microsoft Purview portal](../../compliance/microsoft-365-compliance-center.md).
133
133
134
134
For step-by-step instructions for creating and deploying device policies, see [Create device security policies in Basic Mobility and Security](create-device-security-policies.md).
Copy file name to clipboardExpand all lines: microsoft-365/admin/basic-mobility-security/manage-device-access-settings.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Use these steps:
35
35
36
36
1. Sign in to Microsoft 365 with a [Compliance administrator](/entra/identity/role-based-access-control/permissions-reference) account.
37
37
38
-
2. In your browser, type: <https://compliance.microsoft.com/basicmobilityandsecurity>.
38
+
2. In your browser, type: <https://purview.microsoft.com/basicmobilityandsecurity>.
39
39
40
40
3. Go to **Organization Setting** tab.
41
41
@@ -57,7 +57,7 @@ Here's a breakdown for the device details available to you.
57
57
:::image type="content" source="../../media/basic-mobility-security/bms-7-powershell-parameters.png" alt-text="Basic Mobility and Security PowerShell parameters.":::
58
58
59
59
> [!NOTE]
60
-
> The commands and scripts that follow also return details about any devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune).
60
+
> The commands and scripts that follow also return details about any devices managed by [Microsoft Intune](https://www.microsoft.com/security/business/Microsoft-Intune).
61
61
62
62
Here are a few things you need to set up to run the commands and scripts that follow:
Copy file name to clipboardExpand all lines: microsoft-365/admin/basic-mobility-security/manage-enrolled-devices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ description: "Sign in to Microsoft 365 and set up Basic Mobility and Security to
30
30
31
31
The built-in mobile device management for Microsoft 365 helps you secure and manage your users' mobile devices like iPhones, iPads, Androids, and Windows phones. The first step is to sign in to Microsoft 365 and set up Basic Mobility and Security. For more info, see [Set up Basic Mobility and Security](set-up.md).
32
32
33
-
After you've set it up, the people in your organization must enroll their devices in the service. For more info, see [Enroll your mobile device using Basic Mobility and Security](enroll-your-mobile-device.md). Then you can use Basic Mobility and Security to help manage devices in your organization. For example, you can use device security policies to help limit email access or other services, view devices reports, and remotely wipe a device. You'll typically go to the Security & Compliance Center to do these tasks. For more info, see [Microsoft Purview compliance portal](../../compliance/microsoft-365-compliance-center.md).
33
+
After you've set it up, the people in your organization must enroll their devices in the service. For more info, see [Enroll your mobile device using Basic Mobility and Security](enroll-your-mobile-device.md). Then you can use Basic Mobility and Security to help manage devices in your organization. For example, you can use device security policies to help limit email access or other services, view devices reports, and remotely wipe a device. You'll typically go to the Security & Compliance Center to do these tasks. For more info, see [Microsoft Purview portal](../../compliance/microsoft-365-compliance-center.md).
34
34
35
35
## Device management tasks
36
36
@@ -50,7 +50,7 @@ After you've got Basic Mobility and Security set up, here are some ways you can
50
50
|Block unsupported devices from accessing Exchange email using Exchange ActiveSync|In the Device Management panel, select **Block**.|
51
51
|Set up device policies like password requirements and security settings|In the Device Management panel, select **Device security policies** > **Add +**. For more info, see [Create device security policies in Basic Mobility and Security](create-device-security-policies.md).|
52
52
|View list of blocked devices|In the Device Management panel, under **Select a view** select **Blocked**.|
53
-
|Unblock noncompliant or unsupported device for a user or group of users|Pick one of the following to unblock devices:<br/>- Remove the user or users from the security group the policy has been applied to. Go to Microsoft 365 admin center > **<a href="https://go.microsoft.com/fwlink/p/?linkid=2052855" target="_blank">Groups</a>**, and then select group name. Select **Edit members and admins**.<br/>- Remove the security group the users are a member of from the device policy. Go to [Basic Mobility and Security ](https://compliance.microsoft.com/basicmobilityandsecurity)and select the **Policies** tab. Select device policy name, and then select **Edit** **Deployment**.<br/>- Unblock all noncompliant devices for a device policy. Go to [Basic Mobility and Security](https://compliance.microsoft.com/basicmobilityandsecurity) and select the **Policies** tab. Select device policy name and then select **Edit** > **Access requirements**. Select **Allow access**.<br/>- To unblock a noncompliant or unsupported device for a user or a group of users, go to [Basic Mobility and Security](https://compliance.microsoft.com/basicmobilityandsecurity) and select the **Organization Setting** tab. and select the **Security groups excluded from access control** section. Add a security group with the members you want to exclude from being blocked access to Microsoft 365. For more info, see [Create, edit, or delete a security group in the Microsoft 365 admin center](../../admin/email/create-edit-or-delete-a-security-group.md).|
53
+
|Unblock noncompliant or unsupported device for a user or group of users|Pick one of the following to unblock devices:<br/>- Remove the user or users from the security group the policy has been applied to. Go to Microsoft 365 admin center > **<a href="https://go.microsoft.com/fwlink/p/?linkid=2052855" target="_blank">Groups</a>**, and then select group name. Select **Edit members and admins**.<br/>- Remove the security group the users are a member of from the device policy. Go to [Basic Mobility and Security ](https://purview.microsoft.com/basicmobilityandsecurity)and select the **Policies** tab. Select device policy name, and then select **Edit** **Deployment**.<br/>- Unblock all noncompliant devices for a device policy. Go to [Basic Mobility and Security](https://purview.microsoft.com/basicmobilityandsecurity) and select the **Policies** tab. Select device policy name and then select **Edit** > **Access requirements**. Select **Allow access**.<br/>- To unblock a noncompliant or unsupported device for a user or a group of users, go to [Basic Mobility and Security](https://purview.microsoft.com/basicmobilityandsecurity) and select the **Organization Setting** tab. and select the **Security groups excluded from access control** section. Add a security group with the members you want to exclude from being blocked access to Microsoft 365. For more info, see [Create, edit, or delete a security group in the Microsoft 365 admin center](../../admin/email/create-edit-or-delete-a-security-group.md).|
54
54
|Remove users so their devices are no longer managed by Basic Mobility and Security|To remove the user, edit the security group that has device management policies for Basic Mobility and Security. For more info, see [Create, edit, or delete a security group in the Microsoft 365 admin center](../../admin/email/create-edit-or-delete-a-security-group.md).<br/>To remove Basic Mobility and Security from all your Microsoft 365 users, see [Turn off Basic Mobility and Security](turn-off.md).|
0 commit comments