Skip to content

Commit

Permalink
Merge pull request #27018 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Published main to live, Monday 05:00 PM IST, 11/18
  • Loading branch information
padmagit77 authored Nov 18, 2024
2 parents 8cbb4a0 + fca820b commit 39ab315
Show file tree
Hide file tree
Showing 33 changed files with 132 additions and 128 deletions.
2 changes: 1 addition & 1 deletion microsoft-365/admin/usage-analytics/customize-reports.md
Original file line number Diff line number Diff line change
Expand Up @@ -107,7 +107,7 @@ You can start by connecting directly to the ODATA reporting APIs from Microsoft

1. Go to **get data** \> **Other** \> **ODATA Feed** \> **Connect**.

2. In the URL window enter "https://<i></i>reports.office.com/pbi/v1.0/\<tenantid\>"
2. In the URL window, enter `https://reports.office.com/pbi/v1.0/<tenantid>`.

**NOTE:**
The reporting APIs are in preview and are subject to change until they go into production.
Expand Down
10 changes: 5 additions & 5 deletions microsoft-365/business-premium/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
- name: Trial user guide - Microsoft 365 Business Premium
href: m365bp-trial-playbook-microsoft-business-premium.md
- name: Resources for partners
href: ../security/defender-business/mdb-partners.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
href: /defender-business/mdb-partners?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
- name: Step 1- Sign in and set up
items:
- name: Microsoft 365 Business Premium
Expand Down Expand Up @@ -89,23 +89,23 @@
- name: Overview
href: m365bp-security-incident-management.md
- name: Review security recommendations
href: ../security/defender-business/mdb-view-tvm-dashboard.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
href: /defender-business/mdb-view-tvm-dashboard?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
- name: Review threats detected on devices
href: m365bp-review-threats-take-action.md
- name: Review remediation actions on devices
href: m365bp-review-remediation-actions-devices.md
- name: Respond to a compromised email account
href: ../security/office-365-security/responding-to-a-compromised-email-account.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
href: /defender-office-365/responding-to-a-compromised-email-account?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
- name: Streaming API (preview)
href: ../security/defender-business/mdb-streaming-api.md?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
href: /defender-business/mdb-streaming-api?toc=/microsoft-365/business-premium/toc.json&bc=/microsoft-365/business-premium/breadcrumb/toc.json
- name: Maintain your environment
href: m365bp-mdb-maintain-environment.md
- name: Reference
items:
- name: Microsoft 365 Business Premium FAQ
href: microsoft-365-business-faqs.yml
- name: Microsoft Defender for Business
href: ../security/defender-business/index.yml
href: /defender-business/index.yml
- name: Microsoft Defender for Office 365
href: /defender-office-365/defender-for-office-365
- name: Microsoft 365 admin content
Expand Down
2 changes: 1 addition & 1 deletion microsoft-365/business-premium/index.yml
Original file line number Diff line number Diff line change
Expand Up @@ -154,7 +154,7 @@ conceptualContent:
# Card
- title: Protect email content and Microsoft 365 files
links:
- url: ../security/office-365-security/index.yml
- url: /defender-office-365/
itemType: overview
text: Get started with Microsoft Defender for Office 365
- url: ../business-premium/m365bp-protect-against-malware-cyberthreats.md
Expand Down
4 changes: 3 additions & 1 deletion microsoft-365/business-premium/m365-campaigns-setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,8 @@ After you have subscribed to Microsoft 365 for Campaigns, your next step is to g

## Before you begin your setup process

[Sign in and set up Microsoft 365 Business Premium](m365-business-premium-setup.md)

Make sure that you meet the following requirements before you begin your setup process:

|Requirement|Description|
Expand All @@ -85,7 +87,7 @@ Make sure that you meet the following requirements before you begin your setup p
|Permissions|To complete the initial setup process, you must have an appropriate role assigned. [Learn more about admin roles](../admin/add-users/about-admin-roles.md).|
|Browser requirements|Microsoft Edge, Safari, Chrome or Firefox. [Learn more about browser requirements](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources#coreui-heading-uyetipy).|
|Operating systems (client)|**Windows**: Windows 10 or 11 Pro <br/> **macOS**: One of the three most recent versions of macOS|
|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](../security/defender-business/get-defender-business.md#how-to-get-microsoft-defender-for-business-servers).)|
|Operating systems (servers)|Windows Server or Linux Server <br/> (Requires an additional license, such as [Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).)|

> [!TIP]
> For more detailed information about Microsoft 365, Office, and system requirements, see [Microsoft 365 and Office Resources](https://www.microsoft.com/microsoft-365/microsoft-365-and-office-resources).
Expand Down
2 changes: 1 addition & 1 deletion microsoft-365/business-premium/m365bp-device-groups-mdb.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ You can create a new device group while you are in the process of creating or ed

8. On the **Device groups** step, review the list of device groups for the policy. If needed, remove a group from the list. Then choose **Next**.

9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](../security/defender-business/mdb-next-gen-configuration-settings.md).
9. On the **Configuration settings** page, review and edit settings as needed, and then choose **Next**. For more information about these settings, see [Understand next-generation configuration settings in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection).

10. On the **Review your policy** step, review all the settings, make any needed edits, and then choose **Create policy** or **Update policy**.

Expand Down
4 changes: 2 additions & 2 deletions microsoft-365/business-premium/m365bp-device-states.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ description: "View device health with Defender for Business in Microsoft 365 Bus

# View device status in Microsoft Defender for Business

Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](../security/defender-business/mdb-overview.md).
Microsoft Defender for Business is included with Microsoft 365 Business Premium, as of March 1, 2022. This offering provides additional security features for devices. [Learn more about Defender for Business](/defender-business/mdb-overview).

You can view and monitor device health state by using Defender for Business capabilities.

Expand All @@ -40,5 +40,5 @@ You can view and monitor device health state by using Defender for Business capa
## See also

- [View and edit device protection policies](m365bp-view-edit-create-mdb-policies.md)
- [What is Microsoft Defender for Business?](../security/defender-business/mdb-overview.md)
- [What is Microsoft Defender for Business?](/defender-business/mdb-overview)
- [Best practices for securing Microsoft 365 for business plans](secure-your-business-data.md)
Original file line number Diff line number Diff line change
Expand Up @@ -108,4 +108,4 @@ Before the partner can assign these roles to users, you must add the partner as

## See also

[Resources for Microsoft partners working with small and medium-sized businesses](../security/defender-business/mdb-partners.md)
[Resources for Microsoft partners working with small and medium-sized businesses](/defender-business/mdb-partners)
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ To protect managed devices, your organization's IT or security team can:

- **Use Windows Autopilot to get a user's Windows device ready for first use**. With Autopilot you can install business critical apps, apply policies, and enable features like BitLocker before the device is given to a user. You can also use Autopilot to reset, repurpose, and recover Windows devices. To learn more, see [Windows Autopilot](/mem/autopilot/windows-autopilot).
- **Upgrade Windows devices from previous versions of Windows to Windows 10 Pro or Windows 11 Pro**. Before onboarding, Windows client devices should be running Windows 10 Pro or Enterprise, or Windows 11 Pro or Enterprise. If your organization has Windows devices running Windows 7 Pro, Windows 8 Pro, or Windows 8.1 Pro, your Microsoft 365 Business Premium subscription entitles you to upgrade those devices at no additional cost. To learn more, see [Upgrade Windows devices to Windows 10 or 11 Pro](m365bp-upgrade-windows-pro.md).
- **Onboard devices and protect them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
- **Onboard devices and protect them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Microsoft Defender for Business is included with Microsoft 365 Business Premium. It includes advanced protection from ransomware, malware, phishing, and other threats. If you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) instead, you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
- **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). You can view details, such as health state and exposure level for all onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md).

For their part in protecting managed devices, users can:
Expand All @@ -48,8 +48,8 @@ To learn more about protecting managed devices, see [Set up and secure managed d

To protect unmanaged devices, such as BYOD devices, your organization's IT or security team can:

- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](../security/defender-endpoint/microsoft-defender-antivirus-updates.md).
- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](../security/defender-business/mdb-mtd.md) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
- **Encourage users to keep their antivirus protection turned on and up to date**. Devices should have the latest technology and features needed to protect against new malware and attack techniques. Microsoft regularly releases security intelligence updates and product updates. To learn more, see [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates).
- **Consider onboarding unmanaged devices and protecting them with [mobile threat defense](/defender-business/mdb-mtd) capabilities**. Or, if you prefer to use [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), you can use Intune to enroll and manage devices. To learn more, see [Onboard devices to Microsoft Defender for Business](m365bp-onboard-devices-mdb.md).
- **View and monitor device health in the Microsoft Defender portal** (<https://security.microsoft.com>). After devices are onboarded to Defender for Business (or Intune), you can view details, such as health state and exposure level for onboarded devices. You can also take actions, such as running an antivirus scan or starting an automated investigation on a device that has detected threats or vulnerabilities. To learn more, see [Monitor onboarded devices](m365bp-device-states.md) and [Review detected threats](m365bp-review-threats-take-action.md).

For their part in protecting unmanaged devices, users can:
Expand Down
Loading

0 comments on commit 39ab315

Please sign in to comment.