Sync logs in the Viva Learning admin tab with information about assignment and completion-related ingestion errors.
To improve ease of use, we are updating Edge settings page into two sections: ‘Privacy and Security’ and ‘Search and Services.’ This streamlined approach should enable users to find the settings they are interested in more easily.
Enables one instance of Viva Glint to be used by employees in multiple M365 tenants
This update implements a new contact editor experience, replacing the use of the native device experience. This gives users the ability to create and edit their contacts with a 1st Party form in Outlook mobile.
Thai Language sentences do not have spaces in between them. And for classification purpose, we relied on right keywords to be added while creating Sensitive Information Type for ensuring accurate match. However, with this feature, spaces will be added automatically in keywords which will ensure higher match accuracy in EndPoint.
Users can filter results by content source in the All vertical in Microsoft Search in microsoft365.com, SharePoint Home, and Bing @ Work. This feature will be available for all tenants with multiple sources configured in Microsoft Search (such as Power BI, Viva Learning, and third-party sources indexed via Microsoft Graph Connectors).
With this update, we are introducing more granular trigger throttling limits to isolate the impact of a surge in noisy trigger volumes and prevent other policies from being affected. This ensures that organizations can receive critical alerts without being throttled by these limits. By default, the throttling limits will be applied as follows: All sensitive triggers, including HR signals, Azure AD leavers, and custom triggers, will be limited to 15,000 per day per trigger. All other triggers will be limited to 5,000 per day per trigger.
Additionally, the policy health warning messages will be enhanced to assist admins with appropriate permissions in identifying and addressing noisy triggers effectively. Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies based on their own internal policies, governance, and organizational requirements. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
If a conference room has multiple panels deployed, admins can now enable check-in and room release for this room. The devices will stay in sync on the check-in status to ensure that the room is released or not released correctly.