Microsoft Defender for Identity: Public API for Defender for Identity settings through MS Graph
Microsoft Defender for Identity will expose data and actions for its settings through a set of programmatic APIs as part of Microsoft Graph.

Microsoft Defender for Identity will expose data and actions for its settings through a set of programmatic APIs as part of Microsoft Graph.

Viva Home is the home for the Viva suite on the web.
Accessible via microsoft365.com app launcher and app explorer, it provides a single landing destination on the web for Viva users with the goal to help with education, discovery and navigation to licensed Viva modules.

Users can now view, edit, and create collaborative notes including agenda, notes, and follow-up tasks on Teams for iOS and Android, similarly with what users can do on Teams for desktop.
This message is associated with Microsoft 365 Roadmap ID 128652

You can now paste as plain text, removing all formatting with ease.

We will make some minor experience changes for when a user has been detected as a potential high impact user whose activities may lead to potential data security incidents. These changes will include improving accessibility and providing more prominent highlighting of the reasons for being detected as a potential high impact user. Additionally, we will provide additional descriptors regarding how the risk score booster is applied to the user.
Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies based on their own internal policies, governance, and organizational requirements. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.

Communication Compliance message details report will support additional user filter to create and download the report for specific users in the policy. The items per policy report will provide item counts and actions on the items matched in the specified date range.

Admins can now select multiple Insider Risk Management policies in the “Risk levels for Adaptive Protection” settings to assign risk levels in Adaptive Protection. Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies to manage security and compliance. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.

Admins can configure policies and leverage sequence detection to detect file archiving actions taken by users that potentially obfuscate their data exfiltration activities. This can provide greater visibility into a series of connected activities that might be performed to evade detection of data exfiltration that could lead to a security incident.
Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies to manage security and compliance. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.

Admins can now select the HR resignation date as a condition to assign a minor, moderate, or elevated risk level. For example, an admin can configure the minor risk level to be assigned when an HR resignation date is sent via the HR connector. Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies to manage security and compliance. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.

Administrative units allow admins with appropriate permissions to subdivide the organization into smaller units, and then assign specific admins or role groups that can manage only the members of those units. For example, German administrators can only create/manage policies for only German users, and German investigators can only investigate alerts and activities from only German users.
Microsoft Purview Insider Risk Management correlates various signals to identify potential malicious or inadvertent insider risks, such as IP theft, data leakage, and security violations. Insider Risk Management enables customers to create policies based on their own internal policies, governance, and organizational requirements. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
