Microsoft 365 compliance center: Communication Compliance – Reduce detection to investigation time from 24 hours to 1 hour

This feature will reduce the detection to investigation time to under an hour, allowing your organization to respond to communication compliance alerts promptly.

(more…)

Microsoft 365 compliance center: Communication Compliance – Gain context around ML model policy matches

Make more informed remediation actions with machine learning (ML) model highlighting. This feature gives investigators greater context around which word or key phrase triggered an ML model policy match and caused a classifier to catch a message.

(more…)

Microsoft 365 compliance center: Communication Compliance – Accelerate onboarding with step-by-step guidance

This feature will provide step-by-step guidance on how to properly configure, triage, and remediate policies, highlighting tasks that are heavily leveraged by a user’s role group.

(more…)

Microsoft Information Protection: Advanced Message Encryption – Office 365 Message Encryption portal access logs

This feature will enable logging of external user activities accessing the Office 365 Message Encryption Portal to retrieve encrypted mail. The logs can be retrieved using the Audit Logs functionality in the Microsoft 365 compliance center.

(more…)

Microsoft Office default change – Blocking VBA macros in files from the internet

VBA macros are a common way for malicious actors to gain access to deploy malware and ransomware. To help improve security, we are changing the behavior of Office applications to now block macros in files from the internet. Learn more in this blog post.

(more…)

Microsoft 365 compliance center: Insider risk management – Microsoft Information Protection (MIP) ML Classifier support

Leverage trainable classifiers from Microsoft Information Protection (MIP) to recognize various content types specific to your organization. Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to ensure user-level privacy.

(more…)

Office app: Support for add-in metrics on Microsoft 365 Apps health dashboard

A new view about add-in health is being added to the Microsoft 365 Apps health dashboard in the Microsoft 365 Apps admin center. The view will provide information about the reliability and performance of COM and VSTO add-ins used by Office apps in your organization.

(more…)

Microsoft Stream: Add or Edit captions and transcript for a video in SharePoint or OneDrive in DoD

You can upload, download, and delete captions in the Web VTT file format for a video in SharePoint or OneDrive. This will enable you to edit transcript files generated by Teams live transcript or Stream via downloading the file, editing in a text or VTT editor, and re-uploading it. The VTT file will be displayed as captions inside the video player and as a transcript in the transcript pane next to the video.

(more…)

Microsoft 365 compliance center: Insider risk management – Anomaly-as-a-Policy-Trigger

Customize a policy to trigger on an anomalous activity (e.g., anomalous quantity of sensitive document downloads). Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to ensure user-level privacy.

(more…)

Microsoft 365 compliance center: Insider risk management – Enhancements to Analytics

Enhancements to Analytics including ability to leverage Analytics to recommend thresholds for data leak and departing employee data theft policies and inclusions of Sequence detection within Analytics. Insider Risk Management in Microsoft 365 correlates various signals from the chip to the cloud to identify potential malicious or inadvertent insider risks, such as IP theft, security and policy violations, and more. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to ensure user-level privacy.

(more…)


I've been working with Microsoft Technologies over the last ten years, mainly focused on creating collaboration and productivity solutions that drive the adoption of Microsoft Modern Workplace.

Trending Posts