Sie sind auf Seite 1von 1824

Contents

Get started
Office 365 security roadmap
Configure your Office 365 tenant for increased security
Go to the Security & Compliance Center
Secure Score for Office 365
Permissions in the Security & Compliance Center
Give users access to the Security & Compliance Center
Security Dashboard overview
Install the Supervision add-in for Outlook desktop
Use your free Azure Active Directory subscription
Plan for security and compliance in Office 365
Protect access to data and services
Protect access to data and services in Office 365
Choose between MDM and Intune
Protect information
Sensitivity labels
Restrict access to content by using encryption in sensitivity labels
Prevent data loss (DLP)
Watch an extended overview of DLP
Set up DLP
Get started with DLP policy recommendations
Get started with the default DLP policy
Create a DLP policy from a template
Create, test, and tune a DLP policy
Use notifications and policy tips in DLP policies
What the DLP policy templates include
Create a DLP policy to protect documents with FCI or other properties
View the DLP reports
Form a query to find sensitive data stored on sites
How DLP works between the Security & Compliance Center and Exchange Admin
Center
Use the sensitive information types
What the sensitive information types look for
What the DLP functions look for
Watch an extended overview of customizing DLP
Customize a built-in sensitive information type
Create a custom sensitive information type
Create a custom sensitive information type in Office 365 Security & Compliance
Center PowerShell
Create a keyword dictionary
Document Fingerprinting
Manage data governance
Import data
Use network upload to import PST files
Use drive shipping to import PST files
Use the PST Collection tool to find, copy, and delete PST files
Filter data when importing PST files
Use network upload to import RMS-encrypted PST files
FAQ about importing PST files
Archiving third-party data in Office 365
Store data
Enable archive mailboxes
Overview of unlimited archiving
Enable unlimited archiving
Set up an archive and deletion policy for mailboxes
Retain data
Retention policies
Retention labels
Bulk create and publish retention labels by using PowerShell
Disposition reviews
Event-driven retention
File plan manager
Manage inactive mailboxes
Create and manage inactive mailboxes
Change the hold duration for an inactive mailbox
Recover an inactive mailbox
Restore an inactive mailbox
Delete an inactive mailbox
Monitor data governance
View the data governance reports
View label activity for documents
Configure supervision policies for your organization
Install the Supervision add-in for Outlook desktop
Supervision reports
More information about data governance
Watch videos from the Microsoft Data Governance team
Protect against threats
Anti-spam and anti-malware protection
Anti-phishing protection in Office 365
ATP anti-phishing capabilities in Office 365
Set up anti-phishing and ATP anti-phishing policies
How Office 365 validates the From: address to prevent phishing
Anti-spoofing protection in Office 365
Learn more about spoof intelligence
Office 365 email anti-spam protection
How to prevent real email from being marked as spam in Office 365
How to reduce spam email in Office 365
Prevent email from being marked as spam in EOP and Office 365
Controlling outbound spam in Office 365
Block email spam with the Office 365 spam filter to prevent false negative issues
Zero-hour auto purge - protection against spam and malware
Encryption in Office 365
Email encryption in Office 365
Manage Office 365 Message Encryption
Set up new Office 365 Message Encryption capabilities
How Exchange Online secures your email secrets
Office 365 Message Encryption (OME)
Revoke email encrypted by Office 365 Message Encryption
Service encryption with Customer Key for Office 365 FAQ
Set up encryption in Office 365 Enterprise
Add your organization's brand to your encrypted messages
Controlling your data in Office 365 using Customer Key
Technical reference details about encryption in Office 365
How Exchange Online uses TLS to secure email connections in Office 365
Office 365 Message Encryption FAQ
Legacy information for Office 365 Message Encryption
Office 365 Protected Message Viewer Portal privacy statement
Create conditions for a supervisory review policy
Set up Azure Rights Management for Office 365 Message Encryption
Office 365 Advanced Threat Protection
ATP Safe Links
Set up ATP Safe Links policies
Set up a custom "do not rewrite" URLs list
Set up a custom blocked URLs list
ATP Safe Links warning pages
ATP Safe Attachments
Set up ATP Safe Attachments policies
Dynamic Delivery and previewing
ATP for SharePoint, OneDrive, and Microsoft Teams
Turn on ATP for SharePoint, OneDrive, and Microsoft Teams
View information about malicious files
View ATP reports
Office 365 Threat Intelligence
Get started with Office 365 Threat Intelligence
Integrate Office 365 Threat Intelligence with Windows Defender Advanced Threat
Protection
Attack Simulator in Office 365
SIEM integration with Office 365 Threat Intelligence
Keep your Office 365 users safe with Office 365 Threat Intelligence
Threat Trackers - New and Noteworthy
Use Explorer in the Security & Compliance Center
Overview of Office 365 Cloud App Security
What's new in Office 365 Cloud App Security
Updates during 2017
Get ready for Office 365 Cloud App Security
Set up Office 365 Cloud App Security
Activity policies and alerts in Office 365 Cloud App Security
Anomaly detection policies in Office 365 Cloud App Security
Integrate your SIEM server with Office 365 Cloud App Security
Group your IP addresses to simplify management in Office 365 Cloud App
Security
Utilization activities after rolling out Office 365 Cloud App Security
Review and take action on alerts in Office 365 Cloud App Security
Investigate an activity in Office 365 Cloud App Security
Manage OAuth apps using Office 365 Cloud App Security
Web traffic logs and data sources for Office 365 Cloud App Security
Suspend or restore a user account in Office 365 Cloud App Security
Create app discovery reports using Office 365 Cloud App Security
Review app discovery findings in Office 365 Cloud App Security
Quarantine email messages in Office 365
Manage quarantined messages and files as an administrator
Find and release quarantined messages as a user
Quarantine FAQ for Office 365
Use user spam notifications to release and report quarantined messages in Office
365
Privileged access management
Configure privileged access management
Search for content
Use Content Search
Keyword queries and search conditions for Content Search
View keyword statistics for Content Search results
Export Content Search results
Export a Content Search report
Search for and delete email messages
Search the cloud-based mailboxes of on-premises users in Office 365
Bulk edit multiple Content Searches
Prepare a CSV file for an ID list Content Search
Use Content Search to search third-party data
Use Content Search in your eDiscovery workflow
Check your Content Search query for errors
Preserve Bcc recipients for Content Search
Understand Content Search
Limits for Content Search
Partially indexed items in Content Search
Investigating partially indexed items
De-duplication in eDiscovery search results
Differences between estimated and actual Content Search results
Configure Content Search
Configure permissions filtering for Content Search
Increase the download speed when exporting Content Search results
Change the size of PST files when exporting Content Search results
Disable reports when you export Content Search results
Use Content Search PowerShell scripts
Use Content Search for targeted collections
Use Content Search to search the mailbox and OneDrive for Business site for a list of
users
Create, report on, and delete multiple Content Searches
Clone a Content Search
Manage legal investigations
Create and manage eDiscovery cases
Assign eDiscovery permissions
Set up compliance boundaries for eDiscovery investigations in Office 365
eDiscovery solution series - Data spillage scenario - Search and purge
Prepare search results for Advanced eDiscovery
Assign eDiscovery permissions to OneDrive for Business sites
Use a script to add users to a hold in an eDiscovery case
Create a report on holds in eDiscovery cases
Manage holds
Create an eDiscovery hold
Create a Litigation Hold
Delete items in the Recoverable Items folder of cloud-based mailboxes on hold
Increase the Recoverable Items quota for mailboxes on hold
How to identify the type of hold placed on an Exchange Online mailbox
Office 365 Advanced eDiscovery
Quick setup for Office 365 Advanced eDiscovery
Import non-Office 365 content for Advanced eDiscovery analysis
Set up users and cases in Office 365 Advanced eDiscovery
Export results in Office 365 Advanced eDiscovery
Run the Process module in Office 365 Advanced eDiscovery
Analyze case data with Office 365 Advanced eDiscovery
Export case data in Office 365 Advanced eDiscovery
Use Office 365 Advanced eDiscovery utilities
User roles and access in Office 365 Advanced eDiscovery
Manage Relevance setup in Office 365 Advanced eDiscovery
Use the Relevance module in Office 365 Advanced eDiscovery
Tagging and Relevance training in Office 365 Advanced eDiscovery
Run the Process module and load data in Office 365 Advanced eDiscovery
Define case and tenant settings in Office 365 Advanced eDiscovery
Run reports in Office 365 Advanced eDiscovery
View Analyze results in Office 365 Advanced eDiscovery
Use Express Analysis in Office 365 Advanced eDiscovery
Prepare data for Office 365 Advanced eDiscovery
Export report fields in Office 365 Advanced eDiscovery
Tagging and Assessment in Office 365 Advanced eDiscovery
Understand document similarity in Office 365 Advanced eDiscovery
Define highlighted keywords and advanced options in Office 365 Advanced
eDiscovery
Set Ignore Text option for Analyze in Office 365 Advanced eDiscovery
View batch history and export past results in Office 365 Advanced eDiscovery
Set Analyze options in Office 365 Advanced eDiscovery
View Process module results in Office 365 Advanced eDiscovery
Track Relevance analysis in Office 365 Advanced eDiscovery
Decision based on the results in Office 365 Advanced eDiscovery
Test Relevance analysis in Office 365 Advanced eDiscovery
Set up loads to add imported files in Office 365 Advanced eDiscovery
Define issues and assign users in Office 365 Advanced eDiscovery
Set Analyze advanced settings in Office 365 Advanced eDiscovery
Understand Assessment in Relevance in Office 365 Advanced eDiscovery
Tagging and Search
Search the audit log
Turn audit log search on or off
Enable mailbox auditing
Detailed properties in the audit log
Use the audit log to troubleshoot common scenarios
Use sharing auditing in the audit log
Search for eDiscovery activities in the audit log
Monitor security and compliance
Alert policies
Smart reports and insights in the Security & Compliance Center
View email security reports in the Security & Compliance Center
Walkthrough - From a detailed report to an insight
Walkthrough - From an insight to a detailed report
Walkthrough - From a dashboard to an insight
Create a schedule for a report
Manage schedules for multiple reports
Set up and download a custom report
Download existing reports
Enable or disable safety tips in Office 365
Enable the Report Message add-in
Security solutions
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile
Organizations
Configure groups and users for a political campaign dev/test environment
Create team sites in a political campaign dev/test environment
Secure SharePoint Online sites and files
Deploy SharePoint Online sites for three tiers of protection
Protect SharePoint Online files with Office 365 labels and DLP
Protect SharePoint Online files with Azure Information Protection
Secure SharePoint Online sites in a dev/test environment
Isolated SharePoint Online team sites
Design an isolated SharePoint Online team site
Deploy an isolated SharePoint Online team site
Manage an isolated SharePoint Online team site
Isolated SharePoint Online team site dev/test environment
SIEM server integration
Compliance solutions
Get started with the Microsoft Service Trust Portal
Use Compliance Manager to help meet data protection and regulatory requirements
when using Microsoft cloud services
Manage GDPR data subject requests with the DSR case tool
Office 365 Information Protection for GDPR
Overview: Office 365 Protection for GDPR
Search for and find personal data
Customize or create new sensitive information types for GDPR
Architect a classification schema for personal plan
Apply labels to personal data in Office 365
Apply protection to personal data in Office 365
Monitor for leaks of personal data
Office 365 GDPR dev/test environment
GDPR for on-premises Office servers
GDPR for SharePoint Server
GDPR for Exchange Server
GDPR for Skype for Business Server and Lync Server
GDPR for Project Server
GDPR for Office Web Apps Server and Office Online Server
GDPR for on-premises Windows Server file shares
Security incident management
Office 365 Security Incident Response
Detect and Remediate Illicit Consent Grants in Office 365
Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office
365
Responding to a Compromised Email Account in Office 365
Service assurance
Service assurance in the Office 365 Security & Compliance Center
Tenant isolation in Office 365
Isolation and Access Control in Azure Active Directory
Monitoring and Testing Tenant Boundaries
Resource Limits
Isolation and Access Control in Office 365
Tenant Isolation in Office 365 Search
Tenant Isolation in Office 365 Video
Tenant Isolation in the Office Graph and Delve
Encryption in Office 365
Office 365 Service Encryption
Encryption for Data in Transit
Customer-Managed Encryption Features
Encryption Risks and Protections
Encryption for Skype for Business, OneDrive for Business, SharePoint Online, and
Exchange Online
BitLocker and Distributed Key Manager (DKM) for Encryption
Encryption in Microsoft Dynamics 365
Encryption in Azure
Data Resiliency in Office 365
Dealing with Data Corruption
Exchange Online Data Resilience
Malware and Ransomware Protection
Monitoring and Self-Healing
SharePoint Online Data Resilience
Data Retention, Deletion, and Destruction in Office 365
Data Destruction
Immutability in Office 365
Exchange Online Data Deletion
SharePoint Online Data Deletion
Skype for Business Data Deletion
Administrative Access Controls in Office 365
Monitoring and Auditing Access Controls
Office 365 Isolation Controls
Office 365 Personnel Controls
Office 365 Technology Controls
Yammer Enterprise Access Controls
Defending against denial-of-service attacks in Office 365
Microsoft's Denial-of-Services Defense Strategy
Core Principles of Defense Against Denial-of-Service Attacks
Auditing and Reporting in Office 365
Office 365 Reporting Features
eDiscovery and Search Features
Internal Logging for Office 365 Engineering
Office 365 Mailbox Migrations
Office 365 Management Activity API
Exchange Online Protection
EOP features
Feature permissions in EOP
Exchange admin center in Exchange Online Protection
Set up your EOP service
Videos for getting started with EOP
Best practices for configuring EOP
Sample script for applying EOP settings to multiple tenants
Move domains and settings from one EOP organization to another EOP
organization
Switch to EOP from Google Postini, the Barracuda Spam and Virus Firewall, or Cisco
IronPort
Anti-spam and anti-malware protection
Videos for getting started with protecting your email
How to help ensure that a message isn't marked as spam
Ensure that spam is routed to each user's Junk Email folder
Report junk email messages to Microsoft
Manage safe sender lists for bulk mailers
Configure anti-malware policies
Configure the anti-spam policies
Create organization-wide safe sender or blocked sender lists in Office 365
Configure your spam filter policies
Configure the connection filter policy
Configure the outbound spam policy
Remove a user, domain, or IP address from a block list
Spam confidence levels
Use mail flow rules to set the spam confidence level (SCL) in messages
Submit spam, non-spam, and phishing scam messages to Microsoft for analysis
Submitting malware and non-malware to Microsoft for analysis
Use the delist portal to remove yourself from the Office 365 blocked senders list
Cyberthreat protection
How Office 365 uses SPF to prevent spoofing
Set up SPF in Office 365 to help prevent spoofing
Use DKIM to validate outbound email
Support for validation of DKIM signed messages
Support for anonymous inbound email messages over IPv6
Use DMARC to validate email
Backscatter messages and EOP
Anti-spam message headers
Information Rights Management
Information Rights Management in Exchange Online
Configure IRM to use an on-premises AD RMS server
Messaging policy and compliance in EOP
Auditing reports in EOP
Run an administrator role group report in EOP
Manage recipients and admin role groups in EOP
Manage recipients in EOP
Manage mail users in EOP
Manage groups in EOP
Manage admin role group permissions in EOP
Mail flow in EOP
Mail flow rules (transport rules)
Use transport rules to configure bulk email filtering
Use mail flow rules to see what your users are reporting to Microsoft
Reducing malware threats through file attachment blocking
Reporting and message trace
Search for and delete messages
Mail flow intelligence in Office 365
Mailbox holds
Place a mailbox on Litigation Hold
Preserve Bcc and expanded distribution group recipients for eDiscovery
Put an In-Place Hold on a soft-deleted mailbox
Quarantine
Find and release quarantined messages as an administrator
S/MIME
S/MIME for message signing and encryption
Configure S/MIME settings for Outlook Web App
Send and receive S/MIME signed and encrypted email
Sync user certificates to Office 365 for S/MIME
Set up virtual certificate collection to validate S/MIME
Troubleshooting and support information
Troubleshooting mail sent to Office 365
Help and support for EOP
EOP general FAQ
EOP queued, deferred, and bounced messages FAQ
Delegated administration FAQ
Reference: Policies, practices, and guidelines
Accessibility for people with disabilities
Sending mail to Office 365
Services for non-customers
Office 365 Enterprise
Office 365 for Business
Office 365 security roadmap - Top priorities for the
first 30 days, 90 days, and beyond
10/8/2018 • 4 minutes to read • Edit Online

This article includes top recommendations from Microsoft's cybersecurity team for implementing security
capabilities to protect your Office 365 environment. This article is adapted from a Microsoft Ignite session —
Secure Office 365 like a cybersecurity pro: Top priorities for the first 30 days, 90 days, and beyond. This session
was developed and presented by Mark Simos and Matt Kemelhar, Enterprise Cybersecurity Architects.
In this article:
Roadmap outcomes
30 days — powerful quick wins
90 days — enhanced protections
Beyond

Roadmap outcomes
These roadmap recommendations are staged across three phases in a logical order with the following goals.

Outcomes

30 days Rapid configuration:


• Basic admin protections
• Logging and analytics
• Basic identity protections
Tenant configuration
Prepare stakeholders

90 days Advanced protections:


• Admin accounts
• Data & user accounts
Visibility into compliance, threat, and user needs
Adapt and implement default policies and protections

Beyond Adjust and refine key policies and controls


Extend protections to on-premises dependencies
Integrate with business and security processes (legal, insider
threat, etc.)

30 days — powerful quick wins


These tasks can be accomplished quickly and have low impact to users.

Area Tasks
Security management • Check Secure Score and take note of your current score (
https://securescore.office.com).
• Turn on audit logging for Office 365. See Search the audit
log in the Office 365 Security & Compliance Center.
• Configure your Office 365 tenant for increased security .
• Regularly review dashboards and reports in the Office 365
Security and Compliance Center and Cloud App Security.

Threat protection Connect Office 365 to Microsoft Cloud App Security to start
monitoring using the default threat detection policies for
anomalous behaviors. It takes seven days to build a baseline
for anomaly detection.

Implement protection for admin accounts:


• Use dedicated admin accounts for admin activity.
• Enforce multi-factor authentication (MFA) for admin
accounts.
• Use a highly secure Windows 10 device for admin activity.

Identity and access management • Enable Azure Active Directory Identity Protection.
• For federated identity environments, enforce account
security (password length, age, complexity, etc.).

Information protection Review example information protection recommendations.


Information protection requires coordination across your
organization. Get started with these resources:
• Office 365 Information Protection for GDPR
• Secure SharePoint Online sites and files (includes sharing,
classification, data loss prevention, and Azure Information
Protection)

90 days — enhanced protections


These tasks take a bit more time to plan and implement but greatly increase your security posture.

Area Task

Security management • Check Secure Score for recommended actions for your
environment ( https://securescore.office.com).
• Continue to regularly review dashboards and reports in the
Office 365 Security and Compliance Center, Cloud App
Security, and SIEM tools.
• Look for and implement software updates.
• Conduct attack simulations for spear-phishing, password-
spray, and brute-force password attacks using Attack
Simulator (included with Office 365 Threat Intelligence).
• Look for sharing risk by reviewing the built-in reports in
Cloud App Security (on the Investigate tab).
• Check Compliance Manager to review status for regulations
that apply to your organization (such as GDPR, NIST 800-
171).
Threat protection Implement enhanced protections for admin accounts:
• Configure Privileged Access Workstations (PAWs) for admin
activity.
• Configure Azure AD Privileged Identity Management.
• Configure a security information and event management
(SIEM) tool to collect logging data from Office 365, Cloud App
Security, and other services, including AD FS. The Office 365
Audit Log stores data for only 90 days. Capturing this data in
SIEM tool allows you to store data for a longer period.

Identity and access management • Enable and enforce MFA for all users.
• Implement a set of conditional access and related policies.

Information protection Adapt and implement information protection policies. These


resources include examples:
• Office 365 Information Protection for GDPR
• Secure SharePoint Online sites and files

Use data loss prevention policies and monitoring tools in


Office 365 for data stored in Office 365 (instead of Cloud App
Security).

Use Cloud App Security with Office 365 for advanced alerting
features (other than data loss prevention).

Beyond
These are important security measures that build on previous work.

Area Task

Security management • Continue planning next actions by using Secure Score (


https://securescore.office.com).
• Continue to regularly review dashboards and reports in the
Office 365 Security and Compliance Center, Cloud App
Security, and SIEM tools.
• Continue to look for and implement software updates.
• Integrate eDiscovery into your legal and threat response
processes.

Threat protection • Implement Secure Privileged Access (SPA) for identity


components on premises (AD, AD FS).
• Use Cloud App Security to monitor for insider threats.
• Discover shadow IT SaaS usage by using Cloud App Security.

Identity and access management • Refine information protection policies:


• Azure Information Protection and Office 365 data loss
prevention (DLP).
• Cloud App Security policies and alerts.

Information protection • Refine policies and operational processes.


• Use Azure AD Identity Protection to identify insider threats.

Also see: How to mitigate rapid cyberattacks such as Petya and WannaCrypt.
Configure your Office 365 tenant for increased
security
11/30/2018 • 8 minutes to read • Edit Online

This topic walks you through recommended configuration for tenant-wide settings that affect the security of your
Office 365 environment. Your security needs might require more or less security. Use these recommendations as a
starting point.

Check Office 365 Secure Score


Office 365 Secure Score analyzes your Office 365 organization's security based on your regular activities and
security settings and assigns a score. Begin by taking note of your current score. Adjusting some tenant-wide
settings will increase your score. The goal is not to achieve the max score, but to be aware of opportunities to
protect your environment that do not negatively affect productivity for your users. See Introducing the Office 365
Secure Score.

Tune threat management policies in the Office 365 Security &


Compliance Center
The Office 365 Security & Compliance Center includes capabilities that protect your environment. It also includes
reports and dashboards you can use to monitor and take action. Some areas come with default policy
configurations. Some areas do not include default policies or rules. Visit these policies under threat management
to tune threat management settings for a more secure environment.

AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

Anti-phishing Yes If you have a custom domain, create an


anti-phishing policy to protect the email
accounts of your most valuable users,
such as your CEO, and to protect your
domain. Review Set up an anti-phishing
policy and create a policy using the
example as a guide: "Example: Anti-
phishing policy to protect a user and a
domain."

Anti-Malware Engine Yes Edit the default policy:


• Common Attachment Types Filter —
Select On

You can also create custom malware


filter policies and apply them to
specified users, groups, or domains in
your organization.

More information:
• Anti-malware protection
• Configure anti-malware policies
AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

ATP Safe Attachments No On the main page for safe attachments,


protect files in SharePoint, OneDrive,
and Microsoft Teams by checking this
box:
• Turn on ATP for SharePoint, OneDrive,
and Microsoft Teams

Add a new safe attachment policy with


these settings:
• Block — Block the current and future
emails and attachments with detected
malware (choose this option)
• Enable redirect — (Check this box and
enter an email address, such as an
admin or quarantine account)
• Apply the above selection if malware
scanning for attachments times out or
error occurs (check this box)
• Applied To — The recipient domain is
(select your domain)

More information: Set up Office 365


ATP safe attachments policies

ATP Safe Links Yes Add this setting to the default policy for
the entire organization:
• Use safe links in: Office 365 ProPlus,
Office for iOS and Android (select this
option).

Recommended policy for specific


recipients:
• URLs will be rewritten and checked
against a list of known malicious links
when user clicks on the link (select this
option).
• Use Safe Attachments to scan
downloadable content (check this box).
• Applied To — The recipient domain is
(select your domain).

More information: Office 365 ATP safe


links.

Anti-Spam (Mail filtering) Yes What to watch for:


• Too much spam — Choose the
Custom settings and edit the Default
spam filter policy.
• Spoof intelligence — Review senders
that are spoofing your domain. Block or
allow these senders.

More information: Office 365 Email


Anti-Spam Protection.
AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

DKIM (DomainKeys Identified Mail) Yes DKIM is an authentication process that


can help protect both senders and
recipients from forged (spoofed) and
phishing email. Your tenant includes a
default signature for your domain.
Create an additional DKIM signature if
you add custom domains to your
tenant.

Use the instructions in this article to


configure a new DKIM signature,
including CNAME, SPF, and DMARC
records: Use DKIM to validate
outbound email sent from your custom
domain in Office 365.

View dashboards and reports in the Security & Compliance Center


Visit these reports and dashboards to learn more about the health of your environment. The data in these reports
will become richer as your organization uses Office 365 services. For now, be familiar with what you can monitor
and take action on. For more information, see : Reports in the Office 365 Security & Compliance Center.

DASHBOARD DESCRIPTION

Threat management dashboard In the Threat management section of Security & Compliance
center, use this dashboard to see threats that have already
been handled, and as a handy tool for reporting out to
business decision makers on what Threat Intelligence has
already done to secure your business.

Threat explorer This is also in the Threat management section of Security &
Compliance center. If you are investigating or experiencing an
attack against your Office 365 tenant, use the threat explorer
to analyze threats. Threat explorer shows you the volume of
attacks over time, and you can analyze this data by threat
families, attacker infrastructure, and more. You can also mark
any suspicious email for the Incidents list.

Reports — Dashboard In the Reports section of Security & Compliance center, view
audit reports for your SharePoint Online and Exchange Online
organizations. You can also access Azure Active Directory (AD)
user sign-in reports, user activity reports, and the Azure AD
audit log from the View reports page.
Configure additional Exchange Online tenant-wide settings
Many of the controls for security and protection in the Exchange admin center are also included in the Security and
Compliance Center. You do not need to configure these in both places. Here are a couple of additional settings that
are recommended.

AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

Mail Flow (Transport rules) No Add a mail flow rule to help protect
against ransomware. See "How to use
Exchange Transport Rules to track or
block emails with file extensions used by
ransomware" in this blog article: How to
deal with ransomware.

Create a transport rule to prevent auto-


forwarding of email to external
domains. For more information, see
Mitigating Client External Forwarding
Rules with Secure Score.

More information: Mail flow rules


(transport rules) in Exchange Online
AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

Enable modern authentication No Modern authentication in Office 365 is


a prerequisite for using multi-factor
authentication (MFA). MFA is
recommended for securing access to
cloud resources, including email.

See these topics:


• Enable or disable modern
authentication in Exchange Online
• Skype for Business Online: Enable your
tenant for modern authentication

Modern authentication is enabled by


default for Office 2016 clients,
SharePoint Online, and OneDrive for
Business.

More information: Using Office 365


modern authentication with Office
clients

Configure tenant-wide sharing policies in SharePoint admin center


Microsoft recommendations for configuring SharePoint team sites at increasing levels of protection, starting with
baseline protection. For more information, see Secure SharePoint Online sites and files
SharePoint team sites configured at the baseline level allow sharing files with external users by using anonymous
access links. This approach is recommended instead of sending files in email.
To support the goals for baseline protection, configure tenant-wide sharing policies as recommended here. Sharing
settings for individual sites can be more restrictive than this tenant-wide policy, but not more permissive.

AREA INCLUDES A DEFAULT POLICY RECOMMENDATION

Sharing (SharePoint Online and Yes External sharing is enabled by default.


OneDrive for Business) These settings are recommended:
• Allow sharing to authenticated
external users and using anonymous
access links (default setting).
• Anonymous access links expire in this
many days. Enter a number, if desired,
such as 30 days.
• Default link type — select Internal
(people in the organization only). Users
who wish to share using anonymous
links must choose this option from the
sharing menu.

More information: External sharing


overview

SharePoint admin center and OneDrive for Business admin center include the same settings. The settings in either
admin center apply to both.

Configure settings in Azure Active Directory


Be sure to visit these two areas in Azure Active Directory to complete tenant-wide setup for more secure
environments.
Configure named locations (under conditional access)
If your organization includes offices with secure network access, add the trusted IP address ranges to Azure Active
Directory as named locations. This feature helps reduce the number of reported false positives for sign-in risk
events.
See: Named locations in Azure Active Directory
Block apps that don't support modern authentication
Multi-factor authentication requires apps that support modern authentication. Apps that do not support modern
authentication cannot be blocked by using conditional access rules.
For secure environments, be sure to disable authentication for apps that do not support modern authentication.
You can do this in Azure Active Directory with a control that is coming soon.
In the meantime, use one of the following methods to accomplish this for SharePoint Online and OneDrive for
Business:
Use PowerShell, see Block apps that do not use modern authentication.
Configure this in the SharePoint admin center on the "device access' page — "Control access from apps that
don't use modern authentication." Choose Block.

Get started with Cloud App Security or Office 365 Cloud App Security
Use Office 365 Cloud App Security to evaluate risk, to alert on suspicious activity, and to automatically take action.
Requires Office 365 E5 plan.
Or, use Microsoft Cloud App Security to obtain deeper visibility even after access is granted, comprehensive
controls, and improved protection for all your cloud applications, including Office 365.
Because this solution recommends the EMS E5 plan, we recommend you start with Cloud App Security so you can
use this with other SaaS applications in your environment. Start with default policies and settings.
More information:
Deploy Cloud App Security
More information about Microsoft Cloud App Security
Overview of Office 365 Cloud App Security
Additional resources
These articles and guides provide additional prescriptive information for securing your Office 365 environment:
Microsoft security guidance for political campaigns, nonprofits, and other agile organizations (you can use
these recommendation in any environment, especially cloud-only environments)
Recommended security policies and configurations for identities and devices (these recommendations
include help for AD FS environments)
Go to the Office 365 Security & Compliance Center
8/21/2018 • 2 minutes to read • Edit Online

The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Use
the Office 365 Security & Compliance Center to manage compliance for all of your organization's data across
Office 365.

Go to the Office 365 Security & Compliance Center


Before you can use the Security & Compliance Center, you need the right permissions. Your work or school
account must either be assigned the Office 365 global administrator role or have been assigned to one or more
Security & Compliance Center role groups by a global administrator:
For more information about the Office 365 global administrator role, see About Office 365 admin roles.
For information on assigning Security & Compliance Center roles to other users, see Give users access to
the Security & Compliance Center.
Here's the most direct way to get to the Security & Compliance Center:
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
Office 365 Secure Score
11/28/2018 • 5 minutes to read • Edit Online

Summary Ever wonder how secure your organization really is in Office 365? Secure Score is here to help. Secure
Score analyzes your organization's security based on your regular activities and security settings in Office 365, and
assigns a score. Read this article to get an overview of Secure Score and how you can use it.

How to get to Secure Score


If your organization has a subscription that includes Office 365 Enterprise, Microsoft 365 Business, or Office 365
Business Premium, and you have the necessary permissions, you can view your organization's secure score by
visiting https://securescore.office.com.
Alternatively, you can visit the Security & Compliance Center (https://security.microsoft.com), where you'll find a
Secure Score widget that provides you with your current score.

The widget includes a link to Microsoft Secure Score, which takes you to your Secure Score dashboard for Office
365.

NOTE
You must be an Office 365 administrator, such as a global admin or security admin, to access Secure Score.

How it works
Secure Score figures out what Office 365 services you're using (such as OneDrive, SharePoint, and Exchange) then
looks at your settings and activities and compares them to a baseline established by Microsoft. You'll get a score
based on how aligned you are with best security practices.
You'll also get recommendations on steps you can take to improve your organization's score.

Expand an action to learn about what steps to take, the threats it'll help protect you from, and how many points
your score will increase once you follow the recommendation.

To see the impact of your actions on your organization's security, select the Score Analyzer tab and review your
history.
Below the chart, you'll see a list of scores and actions by category.

How Secure Score helps


Using Secure Score helps increase your organization's security by encouraging you to use the built-in security
features in Office 365 (many of which you already purchased but might not be aware of). Learning more about
these features as you use the tool will help give you piece of mind that you're taking the right steps to protect your
organization from threats.
But don't just take our word for it. Customers who are using Secure Score have seen their score increase five times
more than customers who aren't using it. (The increase in their score corresponds with the security features being
used in their organizations.)
NOTE
Secure Score does not express an absolute measure of how likely you are to get breached. It expresses the extent to which
you have adopted controls which can offset the risk of being breached. No service can guarantee that you will not be
breached, and Secure Score should not be interpreted as a guarantee in any way.

FAQs
Who can use Secure Score?
Anyone who has admin permissions (global admin or a custom admin role) for an Office 365 Enterprise, Microsoft
365 Business, or Office 365 Business Premium subscription can access Secure Score at
https://securescore.office.com. Users who aren't assigned an admin role won't be able to access Secure Score .
However, admins can use the tool to share their results with other people in their organization. We're looking at
including other, non-admin roles in the permissions list in the future. If there are specific roles you'd like us to
consider, let us know by posting in the Office Security, Privacy & Compliance community.
What does [Not Scored] mean?
Actions labeled as [Not Scored] are ones you can perform in your organization but won't be scored because they
aren't hooked up in the tool (yet!). So, you can still improve your security, but you won't get credit for those actions
right now.
How often is my score updated?
The score is calculated once per day (around 1:00 AM PST). If you make a change to a measured action, the score
will automatically update the next day. It takes up to 48 hours for a change to be reflected in your score.
Who can see my results?
Results are filtered to show scores only to people in your organization who are assigned an admin role (global
admin or a custom admin role).
My score changed. How do I figure out why?
On the Score Analyzer page, click a data point for a specific day, then scroll down to see the completed and
incomplete actions for that day to find out what changed.
Does the Secure Score measure my risk of getting breached?
In short, no. Secure Score does not express an absolute measure of how likely you are to get breached. It
expresses the extent to which you have adopted features that can offset the risk of being breached. No service can
guarantee that you will not be breached, and the Secure Score should not be interpreted as a guarantee in any
way.
How should I interpret my score?
You're given points for configuring recommended security features or performing security-related tasks (such as
viewing reports). Some actions are scored for partial completion, like enabling multi-factor authentication (MFA)
for your users. Your Secure Score is directly representative of the Microsoft security services you use. Remember
that security should always be balanced with usability. All security controls have a user impact component.
Controls with low user impact should have little to no effect on your users' day-to-day operations.
To see your score history, go to the Score Analyzer page. Choose a specific date to see which controls were
enabled for that day and what points you earned for each one.
I have an idea for another control. How do I let you know what it is?
We'd love to hear from you. Please post your ideas on the Office Security, Privacy & Compliance community.
We're listening and want the Secure Score to include all options that are important to you.
Something isn't working right. Who should I contact?
If you have any issues, please let us know by posting in the Office Security, Privacy & Compliance community.
We're monitoring the community and will provide help.
My organization only has certain security features. Does this affect my score?
Secure Score calculates your score based on the services you purchased. For example, if you only purchased an
Exchange Online plan, you won't be scored for SharePoint Online security features. The denominator of the score
is the sum of all the baselines for the controls that apply to the products you purchased. The numerator is the sum
of all the controls for which you completed, or partially completed, the actions to fulfill that control.

Related topics
Security dashboard overview
What subscription do I have?
Permissions in the Office 365 Security &
Compliance Center
10/29/2018 • 6 minutes to read • Edit Online

The Office 365 Security & Compliance Center lets you grant permissions to people who perform compliance
tasks like device management, data loss prevention, eDiscovery, retention, and so on. These people can
perform only the tasks that you explicitly grant them access to. To access the Security & Compliance Center,
users need to be an Office 365 global administrator or a member of one or more Security & Compliance
Center role groups.
Permissions in the Security & Compliance Center are based on the Role Based Access Control (RBAC )
permissions model. This is the same permissions model that's used by Exchange, so if you're familiar with
Exchange, granting permissions in the Security & Compliance Center will be very similar. It's important to
remember, however, that Exchange role groups and Security & Compliance Center role groups don't share
membership or permissions. While both have an Organization Management role group, they aren't the same.
The permissions they grant, and the members of the role groups, are different. There's a list of Security &
Compliance Center role groups below.

Relationship of members, roles, and role groups


A role grants permissions to do a set of tasks; for example, the Case Management role lets people work with
eDiscovery cases.
A role group is a set of roles that lets people perform their job across the Security & Compliance Center; for
example, the Compliance Administrator role group includes the roles for Case Management, Content Search,
and Organization Configuration (plus others) because someone who's a compliance admin will need the
permissions for those tasks to do their job.
The Security & Compliance Center includes default role groups for the most common tasks and functions
that you'll need to assign people to. We recommend simply adding individual users as members to the
default role groups.

You can edit or delete the existing role groups, but we don't recommend this. Instead of editing a default role
group, you can copy it, modify it, and then save it with a different name.

Permissions needed to use features in the Security & Compliance


Center
The following table lists the default role groups that are available in the Security & Compliance Center. To
grant permissions to a user to perform a compliance task, add them to the appropriate Security &
Compliance Center role group.
Managing permissions in the Security & Compliance Center only gives users access to the compliance
features that are available within the Security & Compliance Center itself. If you want to grant permissions to
other compliance features that aren't in the Security & Compliance Center, such as Exchange transport rules,
you need to use the Exchange Admin Center.
To see how to grant access to the Security & Compliance Center, check out Give users access to Office 365
Compliance admin center.

ROLE GROUP DESCRIPTION

Compliance Administrator1 Members can manage settings for device management,


data loss prevention, reports, and preservation.
ROLE GROUP DESCRIPTION

eDiscovery Manager Members can perform searches and place holds on


mailboxes, SharePoint Online sites, and OneDrive for
Business locations. Members can also create and manage
eDiscovery cases, add and remove members to a case,
create and edit Content Searches associated with a case,
and access case data in Office 365 Advanced eDiscovery.

An eDiscovery Administrator is a member of the eDiscovery


Manager role group who has been assigned additional
permissions. In addition to the tasks that an eDiscovery
Manager can perform, an eDiscovery Administrator can:

• View all eDiscovery cases in the organization.


• Manage any eDiscovery case after they add themself as a
member of the case.

The primary difference between an eDiscovery Manager


and an eDiscovery Administrator is that an eDiscovery
Admininstrator can access all cases that are listed on the
eDiscovery cases page in the Security & Compliance
Center. An eDiscovery manager can only access the cases
they created or cases they are a member of. For more
information about making a user an eDiscovery
Administrator, see Assign eDiscovery permissions in the
Office 365 Security & Compliance Center.

Organization Management1 Members can control permissions for accessing features in


the Security & Compliance Center, and also manage
settings for device management, data loss prevention,
reports, and preservation.
Note that in order for a user who is not a global
administrator to see the list of devices managed by MDM
for Office 365 and perform actions on these devices, such
as retiring a device from MDM for Office 365, the user
must be an Exchange administrator.
Office 365 global admins are automatically added as
members of this role group.

Records Management Members can manage and dispose record content.

Reviewer Members can only view the list of cases on the eDiscovery
cases page in the Security & Compliance Center. They can't
create, open, or manage an eDiscovery case. The primary
purpose of this role group is to allow members to view and
access case data in Advanced eDiscovery.
This role group has the most restrictive eDiscovery-related
permissions.
ROLE GROUP DESCRIPTION

Security Administrator Membership in this role group is synchronized across


services and managed centrally. This role group is not
manageable through the administrator portals. Members
of this role group may include cross-service administrators,
as well as external partner groups and Microsoft Support.
By default, this group may not be assigned any roles.
However, it will be a member of the Security Administrators
role groups and will inherit the capabilities of that role
group.
All of the read-only permissions of the Security reader role,
plus a number of additional administrative permissions for
the same services: Azure Information Protection, Identity
Protection Center, Privileged Identity Management,
Monitor Office 365 Service Health, and Office 365 Security
& Compliance Center.

Security Reader Members have read-only access to a number of security


features of Identity Protection Center, Privileged Identity
Management, Monitor Office 365 Service Health, and
Office 365 Security & Compliance Center.
Membership in this role group is synchronized across
services and managed centrally. This role group is not
manageable through the administrator portals. Members
of this role group may include cross-service administrators,
as well as external partner groups and Microsoft Support.
By default, this group may not be assigned any roles.
However, it will be a member of the Security Reader role
groups and will inherit the capabilities of that role group.

Service Assurance User Members can access the Service assurance section in the
Office 365 Security & Compliance Center. Service assurance
provides reports and documents that describe Microsoft's
security practices for customer data that's stored in Office
365. It also provides independent third-party audit reports
on Office 365. For more information, see Service assurance
in the Office 365 Security & Compliance Center.

Supervisory Review Members can create and manage the policies that define
which communications are subject to review in an
organization. For more information, see Configure
supervisory review policies for your organization.

NOTE
1 This role group doesn't assign members the permissions necessary to search the Office 365 audit log or to use any
reports that might include Exchange data, such as the DLP or ATP reports. To search the audit log or to view all
reports, a user has to be assigned permissions in Exchange Online. This is because the underlying cmdlet used to
search the audit log is an Exchange Online cmdlet. Office 365 global admins can search the audit log and view all
reports because they're automatically added as members of the Organization Management role group in Exchange
Online. For more information, see Search the audit log in the Office 365 Security & Compliance Center.
Give users access to the Office 365 Security &
Compliance Center
12/11/2018 • 2 minutes to read • Edit Online

Users need to be assigned permissions in the Office 365 Security & Compliance Center before they can manage
any of its security or compliance features. As an Office 365 global admin or member of the
OrganizationManagement role group in the Security & Compliance Center, you can give these permissions to
users. Users will only be able to manage the security or compliance features that you give them access to.
For more information about the different permissions you can give to users in the Security & Compliance Center,
check out Permissions in the Office 365 Security & Compliance Center.

What do you need to know before you begin?


You need to be an Office 365 global admin, or a member of the OrganizationManagement role group in
the Security & Compliance Center, to complete the steps in this article.
Role groups for the Security & Compliance Center might have similar names to the role groups in
Exchange Online, but they're not the same.
Role group memberships aren't shared between Exchange Online and the Security & Compliance Center.

Use the Office 365 admin center to give another user access to the
Security & Compliance Center
1. Sign in to Office 365 and go to the Admin center.
2. In the Office 365 admin center, open Admin centers and then click Security & Compliance.
3. In the Security & Compliance Center, go to Permissions.
4. From the list, choose the role group that you want to add the user to and click Edit .
5. In the role group's properties page under Members, click Add and select the name of the user (or users)
you want to add.
6. When you've selected all of the users you want to add to the role group, click add-> and then OK.
7. Click Save to save the changes to the role group.
How do you know this worked?
1. In the Security & Compliance Center, go to Permissions.
2. From the list, select the role group to view the members.
3. On the right, in the role group details, you can view the members of the role group.

Use PowerShell to give another user access to the Security &


Compliance Center
1. Connect to Office 365 Security & Compliance Center PowerShell.
2. Use the Add-RoleGroupMember command to add a user to the Organization Management Role, as
shown in the following example.

Add-RoleGroupMember -Identity "OrganizationManagement" -Member MatildaS

Parameters
-Identity is the role group to add a member to.
Member is the mailbox, universal security group (USG ), or computer to add to the role group. You can
specify only one member at a time.
For detailed information on syntax and parameters, see Add-RoleGroupMember.
How do you know this worked?
To verify that you've given users access to the Security & Compliance Center, use the Get-RoleGroupMember
cmdlet to view the members in the Organization Management role group, as shown in the following example.

Get-RoleGroupMember -Identity "OrganizationManagement"

For detailed information on syntax and parameters, see Get-RoleGroupMember.


Security dashboard overview
11/27/2018 • 2 minutes to read • Edit Online

The Security & Compliance Center enables your organization to manage data protection and compliance.
Beginning in March 2018, the Security & Compliance Center features a new Security Dashboard you can use to
review your Threat Protection Status, and view and act on security alerts.
Watch the video to get an overview, and then read this article to learn more.

Depending on what your organization's Office 365 subscription includes, the Security Dashboard includes the
following sections:
Threat Protection Status
Insights
Threat intelligence
Trends
To view the Security Dashboard, in the Office 365 Security & Compliance Center, go to Threat management >
Dashboard.

NOTE
You must be an Office 365 global administrator, a security administrator, or a security reader to view the Security
Dashboard. See Permissions in the Office 365 Security & Compliance Center.

Threat Protection Status


In the upper left corner of the Security Dashboard is a Threat Protection Status widget that shows threat
protection effectiveness. This widget tells you at a glance how many threats were blocked by Office 365 Exchange
Online Protection and Office 365 Advanced Threat Protection (if configured) over the last seven days. This widget
also shows the number of email messages detected as misclassified and reported by using the Use the Report
Message add-in. Review your anti-spam, anti-malware, and anti-phishing policies to improve your configuration.

In addition, Malware reports can be used to track recent trends in malicious content targeted at your organization.
Click a tile to view more information in the report.

Insights
Insights not only surface key issues you should review, they also include recommendations and actions to
consider. For example, you might see that phishing email messages are being delivered because some users have
disabled their junk mail options. To learn more about how insights work, see Reports and insights in the Office
365 Security & Compliance Center.
Threat intelligence
If your organization has Office 365 Threat Intelligence, your Security Dashboard has a Threat Intelligence
section that includes advanced tools. Your organization's security team can use the information in this section to
understand emerging campaigns, investigate threats and manage incidents.

TIP
Office 365 Threat Intelligence is included with Office 365 Enterprise E5; however, if your organization is using another Office
365 Enterprise subscription, Office 365 Threat Intelligence can be purchased as an add-on. For more information, see Office
365 Threat Intelligence.

Trends
Near the bottom of the Security Dashboard is a Trends section, which summarizes email flow trends for your
organization. Reports provide information about email categorized as spam, malware, phishing attempts, and
good email. Click a tile to view more detailed information in the report.

And, if your organization's Office 365 subscription includes Office 365 Threat Intelligence, you will also have a
Recent threat management alerts report in this section that enables your security team to view and take action
on high-priority security alerts.

Related topics
View email security reports in the Security & Compliance Center
View reports for Office 365 Advanced Threat Protection
Office 365 Advanced Threat Protection
Office 365 Threat Intelligence
Install the Supervision add-in for Outlook desktop
12/5/2018 • 2 minutes to read • Edit Online

To review communications identified by a supervision policy, reviewers use the Supervision add-in for Outlook and
Outlook web app. The add-in is installed automatically in Outlook web app for all reviewers you specified in the
policy. However, reviewers must run through some steps to install it in the desktop version of Outlook.

NOTE
Users monitored by supervision policies must have either an Office 365 Enterprise E3 license with the Advanced Compliance
add-on or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want
to try supervision, you can sign up for a trial of Office 365 Enterprise E5.

Step 1: Copy the address for the supervision mailbox


To install the add-in for Outlook desktop, you'll need the address for the supervision mailbox that was created as
part of the supervision policy setup.

NOTE
If someone else created the policy, you'll need to get this address from them to install the add-in.

To find the supervision mailbox address


1. Sign into the Security & Compliance Center using credentials for an admin account in your Office 365
organization.
2. Go to Data governance > Supervision.
3. Click the supervision policy that's gathering the communications you want to review.
4. In the policy details flyout, under ** Supervision mailbox **, copy the address.

Step 2: Configure the supervision mailbox for Outlook desktop access


Next, reviewers will need to run a couple Exchange Online PowerShell commands so they can connect Outlook to
the supervision mailbox.
1. Connect to Exchange Online PowerShell. How do I do this?
2. Run the following commands, where *SupervisoryReview {GUID }@domain.onmicrosoft.com* is the address
you copied in Step 1 above, and User is the name of the reviewer who will be connecting to the supervision
mailbox in Step 3.
Add-MailboxPermission "SupervisoryReview{GUID}@domain.onmicrosoft.com" -User <alias or email address
of the account that has reviewer permissions to the supervision mailbox> -AccessRights FullAccess
Set-Mailbox "<SupervisoryReview{GUID}@domain.onmicrosoft.com>" -HiddenFromAddressListsEnabled: $false

3. Wait at least an hour before moving on to Step 3 below.

Step 3: Create an Outlook profile to connect to the supervision mailbox


For the final step, reviewers will need to create an Outlook profile to connect to the supervision mailbox.

NOTE
To create a new Outlook profile, you'll use the Mail settings in the Windows Control Panel. The path you take to get to these
settings might depend on which Windows operating system (Windows 7, Windows 8, or Windows 10) you're using and which
version of Outlook is installed.

1. Open the Control Panel, and in the Search box at the top of the window, type Mail.
(Not sure how to get to the Control Panel? See Where is Control Panel?)
2. Open the Mail app.
3. In Mail Setup - Outlook, click Show Profiles.

4. In Mail, click Add. Then, in New Profile, enter a name for the supervision mailbox (such as Supervision).

5. In Connect Outlook to Office 365, click Connect to a different account.


6. In Auto Account Setup, choose Manual setup or additional server types, and then click Next.
7. In Choose Your Account Type, choose Office 365. Then, in the Email Address box, enter the address of
the supervision mailbox you copied previously.

8. When prompted, enter your Office 365 credentials.


9. If successful, you'll see the Supervision - <policy name> folder listed in the Folder List view in Outlook.
Use your free Azure Active Directory subscription in
Office 365
8/21/2018 • 2 minutes to read • Edit Online

If your organization has a paid subscription to Office 365, Microsoft Dynamics CRM Online, Enterprise Mobility
Suite, or other Microsoft services, you have a free subscription to Microsoft Azure Active Directory. You and other
admins can use Azure AD to create and manage user and group accounts. To use Azure AD, just go to the Azure
portal and sign in using your Office 365 account.

Before you begin


Use a private browsing session (not a regular session) to access the Azure portal (in step 1 below ) because this will
prevent the credential that you are currently logged on with from being passed to Azure. To open an InPrivate
Browsing session in Internet Explorer or a Private Browsing session in Mozilla FireFox, just press CTRL+SHIFT+P.
To open a private browsing session in Google Chrome (called an incognito window ), press CTRL+SHIFT+N.

Access Azure Active Directory


1. Go to portal.azure.com and sign in with your Office 365 work or student account.
2. In the left navigation pane in the Azure portal, click Azure Active Directory.

The Azure Active Directory admin center is displayed.

More information
You can also access the Azure Active Directory admin center from the Office 365 admin center. In the left
navigation pane of the Office 365 admin center , click Admin centers > Azure Active Directory.
For information about managing users and groups and performing other directory management tasks, see
Manage your Azure AD directory.
Plan for security & compliance in Office 365
8/21/2018 • 2 minutes to read • Edit Online

Managing security and compliance is a partnership. You are responsible for protecting your data, identities, and
devices, while Microsoft vigorously protects Office 365 services. You can use Office 365 and Enterprise Mobility +
Security (EMS ) together to help you achieve the appropriate level of protection for your organization.

Step 1: Review capabilities


Orient yourself to the information protection capabilities in the Information Protection for Office 365 poster.
PDF | Visio

Step 2: Check your Secure Score


After setting up your Office 365 subscription, take note of your starting score. Secure Score provides Office 365
configuration suggestions that you can take to increase your score. The goal is to be aware of opportunities that
you can take to protect your environment which won't negatively affect the productivity of your users.
Introducing the Office 365 Secure Score

Step 3: Plan access protection for identity and devices


Protecting access to your Office 365 data and services is crucial to defending against cyber-attacks and guarding
against data loss.
Protect access to data and services in Office 365
Secure email policies and configurations
PDF | Visio | More languages

Step 4: Plan data protection based on data sensitivity


Review and plan for file protection capabilities organized by three levels of protection.
PDF | Visio

Step 5: Leverage the Office 365 Security & Compliance Center


The Security & Compliance Center gives you a single view into the controls you will use to manage the spectrum
of Office 365 security, including threat management, data governance, and search and investigation.
Go to the Office 365 Security & Compliance Center
Permissions in the Office 365 Security & Compliance Center
Give users access to the Office 365 Security & Compliance Center

Step 6: Use end-to-end security scenarios as starting points


Use these recommended configurations as a starting point for enterprise scale or sophisticated access security
scenarios.
Secure email policies and configurations
Contoso in the Microsoft Cloud

Office 365 admin centers and dashboards


Configure your security and compliance settings in these admin centers and dashboards to protect your Office 365
environment

SUBSCRIPTION MANAGEMENT URL DASHBOARDS AND ADMIN CENTERS

Office 365 https://portal.office.com Office 365 admin center


Security & Compliance Center
Exchange admin center
SharePoint admin center and OneDrive
for Business admin center

Enterprise Mobility + Security https://portal.azure.com Azure Active Directory


Microsoft Mobile Application
Management
Microsoft Intune

Enterprise Mobility + Security https://portal.cloudappsecurity.com Cloud App Security


Protect access to data and services in Office 365
9/19/2018 • 2 minutes to read • Edit Online

Protecting access to your Office 365 data and services is crucial to defending against cyber-attacks and guarding
against data loss. The same protections can be applied to other SaaS applications in your environment and even to
on-premises applications published with Azure Active Directory Application Proxy.

Step 1: Review recommendations


Recommended capabilities for protecting identities and devices that access Office 365, other SaaS services, and
on-premises applications published with Azure AD Application Proxy.
PDF | Visio | More languages

Step 2: Configure MFA


Use these resources to orient yourself to MFA, decide which version is right for you, and then plan and deploy
MFA for your environment.
What is Azure multi-factor authentication?
Choose the Azure multi-factor authentication solution for you
How to get Azure multi-factor authentication
Plan for multi-factor authentication for Office 365 deployments
Set up multi-factor authentication for Office 365 users
Plan where to deploy MFA, Cloud or on-premises
Configure Azure multi-factor authentication settings

Step 3: Enforce MFA with Azure AD conditional access rules


If you are using Azure AD MFA, create a conditional access rule to require MFA for access to Office 365 and other
SaaS apps in your environment.
Conditional access in Azure Active Directory

Step 4: Configure privileged access management


Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help
protect your organization from breaches that may use existing privileged admin accounts with standing access to
sensitive data or access to critical configuration settings.
Overview of privileged access management
Configure privileged access management

Step 5: Configure SharePoint device access policies


Device access policies for SharePoint Online and OneDrive for Business are recommended for protecting sensitive,
classified, and regulated data. Coming soon is the ability to apply device access policies to individual team sites.
Control access from unmanaged devices

Step 6: Configure app and data protection for devices


You can manage applications on mobile devices regardless of whether the devices are enrolled for mobile device
management. This protects against accidental leakage of data in Office 365, including mail and files.
For iOS and Android: Protect app data using app protection policies with Microsoft Intune
For Windows 10, configure Windows Information Protection (WIP ) to prevent accidental data leaks.
For managed devices: Create a Windows Information Protection (WIP ) with enrollment policy using the
Azure portal for Microsoft Intune
For un-managed devices: Create and deploy Windows Information Protection (WIP ) app protection policy
with Intune

Step 7: Manage devices with Intune


Managing devices allows you to ensure that they are healthy and compliant before allowing them access to
resources in your environment. Device based conditional access rules help ensure attackers can't gain access to
your resources from unmanaged devices.
Enroll devices for management in Intune

Step 8: Configure additional Intune policies and conditional access


rules for your environment
Use these recommended configurations as a starting point for enterprise scale or sophisticated access security
scenarios.
Secure email policies and configurations
Choose between MDM for Office 365 and Microsoft
Intune
11/27/2018 • 2 minutes to read • Edit Online

Microsoft Intune and built-in Mobile Device Management for Office 365 both give you the ability to manage
mobile devices in your organization. But there are key differences, described in the following table.

NOTE
You can manage users and their mobile devices using both Intune and Office 365 in the same Office 365 tenant. Setting up
both Intune and MDM lets you decide which solution is best for specific users and their devices. If you have both options
available, you can choose whether you manage a user's devices with MDM for Office 365 or the more feature-rich Intune
solution.

Feature area MDM for Office 365 Microsoft Intune

Cost Included with many Office 365 Requires a paid subscription for
commercial subscriptions. Microsoft Intune or can be purchased
with Enterprise Mobility Suite.

How you manage devices Manage devices using the Office 365 If you use Intune by itself, you manage
Security & Compliance Center Office devices using the Intune admin console.
365. If you integrate Intune with System
Center 2012 Configuration Manager,
you use the Configuration Manager
console to manage devices on-premises
and in the cloud.

Devices you can manage Cloud-based management for iOS, Cloud-based management for iOS, Mac
Android, and Windows devices OS X, Android, Windows 8.1 (Phone and
PC) and later to include Windows 10.
Key capabilities Help ensure that Office 365 corporate MDM for Office 365 capabilities, plus:
email and documents can be accessed Help users securely access corporate
only on phones and tablets that are resource with certificates, Wi-Fi, VPN,
managed by your company and that and email profiles.
are compliant with your IT policies. Enroll and manage collections of
Set and manage security policies, like corporate-owned devices, simplifying
device level pin lock and jailbreak policy and app deployment.
detection, to help prevent unauthorized Deploy your internal line-of-business
users from accessing corporate email apps and apps in stores to users.
and data on a device when it is lost or Enable your users to more securely
stolen. access corporate information using the
Remove Office 365 company data from Office mobile and line-of business apps
an employee's device while leaving their they know, while ensuring security of
personal data in place. data by helping to restrict actions like
Details are included in capabilities of copy, cut, paste, and save as, to only
Built-in Mobile Device Management for those apps managed by Intune.
Office 365. Enable more secure web browsing using
the Intune Managed Browser app.
Manage PCs from the cloud with no
infrastructure required using Intune, or
connect Intune to Configuration
Manager to manage all of your devices
including PCs, Macs, Linux and UNIX
servers, and mobile devices from a
single management console.
An Intune subscription also allows you
to set up MAM (mobile app
management) policies by using the
Azure portal, even if people's devices
aren't enrolled in Intune. See Protect
app data using MAM policies.

Related topics
Learn more about Microsoft Intune with the video training course Microsoft Cloud Services: Administer Office 365
and Intune, brought to you by LinkedIn Learning.
Overview of sensitivity labels
11/16/2018 • 14 minutes to read • Edit Online

To get their work done, people in your organization need to collaborate with others both inside and outside the
organization. This means that content no longer stays behind a firewall – it roams everywhere, across devices,
apps, and services. And when it roams, you want it to do so in a secure, protected way that meets your
organization’s business and compliance policies.
With sensitivity labels in Office 365, you can classify and help protect your sensitive content, while making sure
that your people’s productivity and ability to collaborate isn’t hindered.

You can use sensitivity labels to:


Enforce protection settings such as encryption or watermarks on labeled content. For example, your
users can apply a Confidential label to a document or email, and that label can encrypt the content and
apply a Confidential watermark.
Protect content in Office apps across different platforms and devices. Sensitivity labels work in Office
apps on Windows, Mac, iOS, and Android. Support for Office web apps is coming soon.
Prevent sensitive content from leaving your organization on devices running Windows, by using
endpoint protection in Microsoft Intune. After a sensitivity label has been applied to content that resides on
a Windows device, endpoint protection can prevent that content from being copied to a third-party app,
such as Twitter or Gmail, or being copied to removable storage, such as a USB drive.
Extend sensitivity labels to third-party apps and services. With the Microsoft Information Protection
SDK, third-party apps on Windows, Mac, and Linux can read sensitivity labels and apply protection settings.
Support for apps on iOS and Android is coming soon.
Classify content without using any protection settings. You can also simply assign a classification to
content (like a sticker) that persists and roams with the content as it's used and shared. You can use this
classification to generate usage reports and see activity data for your sensitive content. Based on this
information, you can always choose at a later time to apply protection settings.
In all of these cases, sensitivity labels in Office 365 can help you take the right actions on the right content. With
sensitivity labels, you can classify data across your organization and enforce protection settings based on that
classification.
You create sensitivity labels in the Office 365 Security & Compliance Center. The Security & Compliance Center is
now the single place to configure sensitivity labels and policies across Azure Information Protection and Office
365. These sensitivity labels can be used by Azure Information Protection, Office apps, and Office 365 services.
For Azure Information Protection customers, you can use your Azure Information Protection labels in the Security
& Compliance center, and your labels will be synced with the Azure portal in case you choose to perform additional
or advanced configuration. Azure Information Protection labels and Office 365 sensitivity labels are fully
compatible with each other. This means, for example, if you have content labeled by Azure Information
Protection, you won’t need to reclassify or relabel your content.

What a sensitivity label is


When you assign a sensitivity label to a document or email, it’s simply like a tag that is:
Customizable. You can create categories for different levels of sensitive content in your organization, such
as Personal, Public, General, Confidential, and Highly Confidential.
Clear text. Because the label is in clear text, it’s available for third-party apps and services to apply
protective actions to labeled content.
Persistent. After a sensitivity label is applied to content, it persists in the metadata of that email or
document. This means the label roams with the content, including the protection settings, and becomes the
basis for applying and enforcing policies.
In the Office apps, a sensitivity label simply appears as a tag on an email or document.
Each item of content can have a single sensitivity label applied to it. But note that an item can have both a single
sensitivity label and a single retention label applied to it.
What sensitivity labels can do
After a sensitivity label is applied to an email or document, the protection settings for that label are enforced on the
content. With a sensitivity label, you can:
Encrypt email only or both email and documents. You can choose which users or group have permissions
to perform which actions and for how long. For example, you can choose to allow users in a specific domain
outside your organization to have permissions to review the content for only 7 days after the content is
labeled. For more information, see Restrict access to content by using encryption in sensitivity labels.
Mark the content by adding custom watermarks, headers, or footers to email or documents that have the
label applied. Note that watermarks are applied only to documents, not email, and they're limited to 255
characters. Also, headers and footers are limited to 1024 characters (except in Excel, where they're limited to
255 characters or fewer, depending on whether the document contains other headers or footers and other
factors.)
Prevent data loss by turning on endpoint protection in Intune. If sensitive content gets downloaded, you
can help prevent the loss of data from Windows devices. For example, you can’t copy labeled content into
Dropbox, Gmail, or USB drive. Before your sensitivity labels can use Windows Information Protection
(WIP ), you first need to create an app protection policy in the Azure portal. For more information, see How
Windows Information Protection protects files with a sensitivity label.
All of these options are available when you create a label in the Security & Compliance Center.

Label priority (order matters)


When you create your sensitivity labels in the Security & Compliance Center, they appear in a list on the
Sensitivity tab on the Labels page. In this list, the order of the labels is important because it reflects their priority.
You want your most restrictive sensitivity label, such as Highly Confidential, to appear at the bottom of the list, and
your least restrictive sensitivity label, such as Public, to appear at the top.
A document or email can have only a single sensitivity label applied to it. If you require your users to provide a
justification for changing the label to a lower classification, the order of this list determines what's a lower
classification.

Sublabels (grouping labels)


With sublabels, you can group one or more labels below a header that a user sees in an Office app. For example,
under Confidential, your organization might use several different labels for specific types of that classification. In
this example, the label Confidential is simply a text label with no protection settings, and because it has sublabels, it
can’t be applied to content. Instead, users must choose Confidential to view the sublabels, and then they can
choose a sublabel to apply to content.
Sublabels are simply a way to present labels to users in logical groups. Sublabels don’t inherit any settings from
the label they’re under.

Editing or deleting a sensitivity label


If you delete a sensitivity label in the Security & Compliance Center, note that the label is not removed from
content, and any protection settings continue to be enforced on the content.
If you edit a sensitivity label in the Security & Compliance Center, the version of the label that was applied to
content is what’s enforced on that content.
What label policies can do
After you create your sensitivity labels, you need to publish them, to make them available to people in your
organization, who can then apply the labels to content. Unlike retention labels, which are published to locations,
such as all Exchange mailboxes, sensitivity labels are published to users or groups. Sensitivity labels then appear in
Office apps for those users and groups.
With a label policy, you can:
Choose which users and groups see the labels. Labels can be published to any email-enabled security
group, distribution group, Office 365 group, or dynamic distribution group.
Apply a default label to all new documents and email created by the users and groups included in the
label policy. This default label can set a base level of protection settings that you want applied to all your
content.
Require a justification for changing a label. If content is marked Confidential and a user wants to
remove that label or replace it with a lower classification, such as a label named Public, you can require that
the user provide a justification when performing this action. These justifications will be available for the
admin to review. We’re currently working on a report where admins can view the user justifications.

Provide help link to a custom help page. If your users aren’t sure what your sensitivity labels mean or
how they should be used, you can provide a Learn More URL that appears at the bottom of the Sensitivity
label menu in the Office apps.
After you create a label policy and assign sensitivity labels to users and groups, those people will see those labels
available in the Office apps in an hour or less.

How to get started


Getting started with sensitivity labels is a quick process:
1. Define the labels. First, you want to establish your taxonomy for defining different levels of sensitive
content. You should use common names or terms that make sense to your users. For example, you can start
with labels such as Personal, Public, General, Confidential, and Highly Confidential. You can use sublabels to
group similar labels by category. Also, when you create a label, a tool tip is required, which appears in the
Office apps when a user hovers over a label option on the Ribbon.
2. Define what each label can do. Then, configure the protection settings you want associated with each
label. For example, lower sensitivity content (a “General” label) might simply have a header or footer applied
to it, while higher sensitivity content (a “Confidential” label) may have a watermark, encryption, and WIP
applied to it, to help ensure that only privileged users can access it.
3. Define who gets the labels. After you define your organization’s labels, you publish them in a label policy
that controls which users and groups see those labels. A single label is reusable – you define it once, and
then you can include it in several label policies assigned to different users. But in order for a label to be
assigned to content, you must first publish that label so that it’s available in Office apps and other services.
When just starting out, you can pilot your sensitivity labels by assigning them to just a few people.
Here’s the basic flow of what the admin, user, and Office app do to make sensitivity labels work.
Where sensitivity labels can appear
Sensitivity labels appear in the UI of Office apps. To view the current availability for specific apps and platforms,
see Where is the feature available today?
Office apps on Windows
In Office apps on devices running Windows, sensitivity labels appear on the Sensitivity button, on the Home tab
on the Ribbon. The label applied also appears in the Status bar at the bottom of the window.
Coming soon is native support for sensitivity labels in Office apps on Windows.
If you're an existing Azure Information Protection customer, you can deploy the Azure Information Protection
unified labeling client, which supports sensitivity labels. For more information about downloading the client, see
Azure Information Protection unified labeling client: Version release information. We’re currently working on
native support for sensitivity labels in Office apps on Windows, so that the Azure Information Protection unified
labeling client will no longer be required.
Office apps on Mac
In Office apps on Mac devices, sensitivity labels appear on the Sensitivity button, on the Home tab on the
Ribbon. The label applied also appears in the Status bar at the bottom of the window.
Office apps on iOS
In Office apps on iOS devices, sensitivity labels appear on the Sensitivity button, on the Home tab on the Ribbon.
The label applied also appears in the Status bar at the bottom of the window.

Office apps on Android


In Office apps on Android devices, sensitivity labels appear on the Sensitivity button, on the Home tab on the
Ribbon. The label applied also appears in the Status bar at the bottom of the window.
More information on sensitivity labels in Office apps
Apply sensitivity labels to your documents and email within Office
Known issues when you apply sensitivity labels to your Office files

How sensitivity labels work with existing Azure Information Protection


labels
Azure Information Protection users are currently able to classify and label content on Windows by using the Azure
Information Protection unified labeling client. Existing Azure Information Protection labels work seamlessly with
new sensitivity labels. This means you can:
Keep your existing Azure Information Protection labels on documents and email.
Keep your existing Azure Information Protection label configuration.
If you are using Azure Information Protection labels, for now we recommend that you avoid creating new labels in
Security & Compliance Center until after you’ve completed your migration. The Azure Information Protection
migration topic has important information and some specific caveats. If you are not yet ready to migrate your
production tenants to sensitivity labels, there is no cause for concern: for the moment, your users can continue
using the Azure Information Protection client, and admins can continue using the Azure portal for management.

Protect content on Windows devices by using endpoint protection in


Microsoft Intune
When you create a sensitivity label, you have the option to tell Windows that files with this label are sensitive and
need to be protected against data leakage when stored on Windows devices. This option can help ensure that
content with this label can be shared or copied only to sanctioned locations, even when it’s stored on an endpoint.
In essence, turning on this option for a sensitivity label tells Windows that this is extra critical data that warrants
additional usage constraints.
When you turn on this option, Windows can read, understand, and act on sensitivity labels in documents and
automatically apply Windows Information Protection (WIP ) on content, no matter how it reaches a managed
Windows device. This helps protect labeled files from accidental leakage, with or without applying encryption.
For example, Windows can understand that a Word document residing on a user’s machine has a Confidential
label applied to it, and WIP can apply an app protection policy to prevent the copying or sharing of the data to any
non-work location from that device (such as a personal OneDrive, personal email accounts, social media, or USB
drives).
If a user attempts to upload labeled content to a personal Gmail account, they see this message.

And if a user attempts to save labeled content to a USB drive, they see this message.
Important prerequisites
Before your sensitivity labels can use WIP, you first need to do the prerequisites described here: How Windows
Information Protection protects files with a sensitivity label. This topic describes the following prerequisites:
Make sure you're running Windows 10, version 1809 or later.
Set up Windows Defender Advanced Threat Protection (WDATP ), which scans content for a label and applies
the corresponding WIP protection. ATP performs some actions independently from WIP, such as reporting
anomalies.
Create a Windows Information Protection (WIP ) policy that applies to endpoint devices. You can do this in
either of these locations:
Create a Windows Information Protection (WIP ) policy with MDM using the Azure portal for Microsoft
Intune
Create and deploy a Windows Information Protection (WIP ) policy using System Center Configuration
Manager

Extend sensitivity labels to third-party apps and services by using the


Microsoft Information Protection SDK
Because a sensitivity label is persisted as clear text in the metadata of a document, third-party apps and services
can choose to support identifying and protecting content that contains such a label. Support in other apps and
services is always expanding.
With the Microsoft Information Protection SDK, third-party apps and services can read and apply sensitivity labels
and protection to documents. The SDK supports apps on Windows, Mac, and Linux. Coming soon is support for
apps on iOS and Android.
Using the SDK, you can label and protect content in a way that works with other Microsoft Information Protection
apps and services, such as Office apps, Office 365 services, the Azure Information Protection scanner, Microsoft
Cloud App Security, and several other partner solutions. For example, learn more about support for sensitivity
labels in Adobe Acrobat.
To learn more about the Microsoft Information Protection SDK, see the announcement on the Tech Community
blog. You can also learn about partner solutions that are integrated with Microsoft Information Protection.

Permissions
Members of your compliance team who will create sensitivity labels need permissions to the Security &
Compliance Center. By default, your tenant admin will have access to this location and can give compliance officers
and other people access to the Security & Compliance Center, without giving them all of the permissions of a
tenant admin. To do this, we recommend that you go to the Permissions page of the Security & Compliance
Center, edit the Compliance Administrator role group, and add members to that role group.
For more information, see Give users access to the Office 365 Security & Compliance Center.
These permissions are required only to create and apply labels and a label policy. Policy enforcement does not
require access to the content.
Restrict access to content by using encryption in
sensitivity labels
11/16/2018 • 6 minutes to read • Edit Online

When you create a sensitivity label, you can restrict access to content that the label will be applied to. For example,
with the encryption settings for a sensitivity label, you can protect content so that:
Only users within your organization can open a confidential document or email.
Only users in the marketing department can edit and print the promotion announcement document or email,
while all other users in your organization can only read it.
Users cannot forward an email or copy information from it that contains news about an internal reorganization.
The current price list that is sent to business partners cannot be opened after a specified date.
When a document or email is encrypted, access to the content is restricted, so that it:
Can be decrypted only by users authorized by the label’s encryption settings.
Remains encrypted no matter where it resides, inside or outside your organization, even if the file’s renamed.
Is encrypted both at rest (for example, in a OneDrive account) and in transit (for example, a sent email).
The encryption settings are available in the Office 365 Security & Compliance Center > Labels page >
Sensitivity tab > Create a label.

How encryption works


Encryption uses Azure Rights Management (Azure RMS ). Azure RMS uses encryption, identity, and authorization
policies. To learn more, see What is Azure Rights Management?

How to turn on encryption for a sensitivity label


To begin, simply toggle Encryption to On, and then use the options below to control who can access email or
documents to which this label is applied. You can:
1. Apply encryption to both email and documents, or just email. If you choose just email, messages with
this label will be encrypted in Outlook, but documents with this label won't be encrypted in other apps, such as
Word or PowerPoint.
2. Allow access to labeled content to expire, either on a specific date or after a specific number of days after
the label is applied. After this time, users won’t be able to open the labeled item. If you specify a date, it is
effective midnight on that date in your current time zone.
3. Allow offline access never, always, or for a specific number of days after the label is applied. If you restrict
offline access to never or a number of days, when that threshold is reached, users must be reauthenticated and
their access is logged. For more information, see the next section on the Rights Management use license.
Rights Management use license for offline access
When a user opens a document or email offline that’s been protected by a sensitivity label, an Azure Rights
Management use license for that content is granted to the user. This use license is a certificate that contains the
user's usage rights for the document or email, and the encryption key that was used to encrypt the content. The
use license also contains an expiration date if this has been set, and how long the use license is valid.
If no expiration date has been set, the default use license validity period for a tenant is 30 days. For the duration of
the use license, the user is not reauthenticated or reauthorized for the content. This lets the user continue to open
the protected document or email without an Internet connection. When the use license validity period expires, the
next time the user accesses the protected document or email, the user must be reauthenticated and reauthorized.
In addition to reauthentication, the policy and user group membership is reevaluated. This means that users could
experience different access results for the same document or email if there are changes in the policy or group
membership from when they last accessed the content.
To learn how to change the default 30-day setting, see Rights Management use license.

Assign permissions to specific users or groups


You can grant permissions to specific people so that only they can interact with the labeled content.
Doing so is a straightforward two-step process:
1. First you add users or groups that will be assigned permissions to the labeled content.
2. Then you choose which permissions those users have for the labeled content.

Add users or groups


When you assign permissions, you can choose:
Everyone in your organization (all tenant members). This setting excludes guest accounts.
Any specific user or email-enabled security group, distribution group, Office 365 group, or dynamic distribution
group.
Any email address or domain outside your organization, such as gmail.com, hotmail.com, or outlook.com.
When you choose all tenant members or browse the directory, the users or groups must have an email address.
As a best practice, use groups rather than users. This strategy keeps your configuration simpler.
Choose permissions
When you choose which permissions to allow for those users or groups, you can select either:
A predefined permissions level with a preset group of rights, such as Co-Author or Reviewer.
A Custom group of rights, where you choose whichever permissions you want.
For more information on each specific permission, see Usage rights and descriptions.
Note that the same label can grant different permissions to different users. For example, a single label can assign
some users as Reviewer and a different user as Co-author, as shown below.
To do this, add users or groups, assign them permissions, and save those settings. Then repeat these steps, adding
users and assigning them permissions, saving the settings each time. You can do this as often as necessary, to
define different permissions for different users.

Rights Management issuer (user applying the sensitivity label) always has Full Control
Encryption for a sensitivity label uses Azure RMS. When a user applies a sensitivity label to protect a document or
email by using Azure RMS, that user becomes the Rights Management issuers for that content.
The Rights Management issuer is always granted Full Control permissions for the document or email, and in
addition:
If the protection settings include an expiration date, the Rights Management issuer can still open and edit the
document or email after that date.
The Rights Management issuer can always access the document or email offline.
The Rights Management issuer can still open a document after it is revoked.
For more information, see Rights Management issuer and Rights Management owner.

Storing encrypted content in OneDrive and SharePoint


Be aware that when encryption is applied to files stored in OneDrive and SharePoint, the service cannot process
the contents of these files. This means that features such as co-authoring, eDiscovery, search, Delve, and other
collaborative features do not work. Also, data loss prevention (DLP ) policies can work only with the metadata
(including Office 365 labels) but not the contents of encrypted files (such as credit card numbers within files).
This applies only to content stored in OneDrive and SharePoint. In Exchange Online, transport rules use the super
user account so that they can scan encrypted content and enforce DLP policies.

Important prerequisites
Before you can use encryption, you might need to perform these tasks.
Activating Azure Rights Management
To use encryption in sensitivity labels, the Azure Rights Management service needs to be activated in your tenant.
In newer tenants, the service is on by default, but you might need to manually activate the service. For more
information, see Activating Azure Rights Management.
Configure Exchange for Azure Information Protection
Exchange does not have to be configured for Azure Information Protection before users can apply labels in
Outlook to protect their emails. However, until Exchange is configured for Azure Information Protection, you do
not get the full functionality of using Azure Rights Management protection with Exchange.
For example, users cannot view protected emails on mobile phones or with Outlook on the web, protected emails
cannot be indexed for search, and you cannot configure Exchange Online DLP for Rights Management protection.
To ensure that Exchange can support these additional scenarios, see the following:
For Exchange Online, see the instructions for Exchange Online: IRM Configuration.
For Exchange on-premises, you must deploy the RMS connector and configure your Exchange servers.
Overview of data loss prevention policies
10/26/2018 • 27 minutes to read • Edit Online

To comply with business standards and industry regulations, organizations need to protect sensitive information
and prevent its inadvertent disclosure. Examples of sensitive information that you might want to prevent from
leaking outside your organization include financial data or personally identifiable information (PII) such as credit
card numbers, social security numbers, or health records. With a data loss prevention (DLP ) policy in the Office
365 Security & Compliance Center, you can identify, monitor, and automatically protect sensitive information
across Office 365.
With a DLP policy, you can:
Identify sensitive information across many locations, such as Exchange Online, SharePoint
Online, and OneDrive for Business.
For example, you can identify any document containing a credit card number that's stored in any OneDrive
for Business site, or you can monitor just the OneDrive sites of specific people.
Prevent the accidental sharing of sensitive information.
For example, you can identify any document or email containing a health record that's shared with people
outside your organization, and then automatically block access to that document or block the email from
being sent.
Monitor and protect sensitive information in the desktop versions of Excel 2016, PowerPoint
2016, and Word 2016.
Just like in Exchange Online, SharePoint Online, and OneDrive for Business, these Office 2016 desktop
programs include the same capabilities to identify sensitive information and apply DLP policies. DLP
provides continuous monitoring when people share content in these Office 2016 programs.
Help users learn how to stay compliant without interrupting their workflow.
You can educate your users about DLP policies and help them remain compliant without blocking their
work. For example, if a user tries to share a document containing sensitive information, a DLP policy can
both send them an email notification and show them a policy tip in the context of the document library
that allows them to override the policy if they have a business justification. The same policy tips also
appear in Outlook on the web, Outlook 2013 and later, Excel 2016, PowerPoint 2016, and Word 2016.
View DLP reports showing content that matches your organization's DLP policies.
To assess how your organization is complying with a DLP policy, you can see how many matches each
policy and rule has over time. If a DLP policy allows users to override a policy tip and report a false
positive, you can also view what users have reported.
You create and manage DLP policies on the Data loss prevention page in the Office 365 Security & Compliance
Center.
What a DLP policy contains
A DLP policy contains a few basic things:
Where to protect the content - locations such as Exchange Online, SharePoint Online, and OneDrive for
Business sites.
When and how to protect the content by enforcing rules comprised of:
Conditions the content must match before the rule is enforced -- for example, look only for content
containing Social Security numbers that's been shared with people outside your organization.
Actions that you want the rule to take automatically when content matching the conditions is found
-- for example, block access to the document and send both the user and compliance officer an
email notification.
You can use a rule to meet a specific protection requirement, and then use a DLP policy to group together
common protection requirements, such as all of the rules needed to comply with a specific regulation.
For example, you might have a DLP policy that helps you detect the presence of information subject to the Health
Insurance Portability and Accountability Act (HIPAA). This DLP policy could help protect HIPAA data (the what)
across all SharePoint Online sites and all OneDrive for Business sites (the where) by finding any document
containing this sensitive information that's shared with people outside your organization (the conditions) and
then blocking access to the document and sending a notification (the actions). These requirements are stored as
individual rules and grouped together as a DLP policy to simplify management and reporting.
Locations
A DLP policy can find and protect sensitive information across Office 365, whether that information is located in
Exchange Online, SharePoint Online, or OneDrive for Business. You can easily choose to protect all SharePoint
sites or OneDrive accounts, just specific sites or accounts, or all mailboxes. Note that it's not yet possible to select
just the mailboxes of specific users.

Note that if you choose to include or exclude specific SharePoint sites or OneDrive accounts, a DLP policy can
contain no more than 100 such inclusions and exclusions. Although this limit exists, understand that you can
exceed this limit by applying either an org-wide policy or a policy that applies to entire locations.
Rules
Rules are what enforce your business requirements on your organization's content. A policy contains one or more
rules, and each rule consists of conditions and actions. For each rule, when the conditions are met, the actions are
taken automatically. Rules are executed sequentially, starting with the highest-priority rule in each policy.
A rule also provides options to notify users (with policy tips and email notifications) and admins (with email
incident reports) that content has matched the rule.
Here are the components of a rule, each explained below.
Conditions
Conditions are important because they determine what types of information you're looking for, and when to take
an action. For example, you might choose to ignore content containing passport numbers unless the content
contains more than ten such numbers and is shared with people outside your organization.
Conditions focus on the content, such as what types of sensitive information you're looking for, and also on the
context, such as who the document is shared with. You can use conditions to assign different actions to different
risk levels -- for example, sensitive content shared internally might be lower risk and require fewer actions than
sensitive content shared with people outside the organization.

The conditions now available can determine if:


Content contains a type of sensitive information.
Content contains a label. For more information, see the below section Using a label as a condition in a DLP
policy.
Content is shared with people outside or inside your organization.
Types of sensitive information
A DLP policy can help protect sensitive information, which is defined as a sensitive information type. Office
365 includes definitions for many common sensitive information types across many different regions that are
ready for you to use, such as a credit card number, bank account numbers, national ID numbers, and passport
numbers.
When a DLP policy looks for a sensitive information type such as a credit card number, it doesn't simply look for
a 16-digit number. Each sensitive information type is defined and detected by using a combination of:
Keywords
Internal functions to validate checksums or composition
Evaluation of regular expressions to find pattern matches
Other content examination
This helps DLP detection achieve a high degree of accuracy while reducing the number of false positives that can
interrupt peoples' work.
Actions
When content matches a condition in a rule, you can apply actions to automatically protect the content.

With the actions now available, you can:


Restrict access to the content For site content, this means that permissions for the document are
restricted for everyone except the primary site collection administrator, document owner, and person who
last modified the document. These people can remove the sensitive information from the document or
take other remedial action. When the document is in compliance, the original permissions will be
automatically restored. When access to a document is blocked, the document appears with a special policy
tip icon in the library on the site.
For email content, this action blocks the message from being sent. Depending on how the DLP rule is
configured, the sender will see an NDR or (if the rule uses a notification) a policy tip and/or email
notification.

User notifications and user overrides


You can use notifications and overrides to educate your users about DLP policies and help them remain
compliant without blocking their work. For example, if a user tries to share a document containing sensitive
information, a DLP policy can both send them an email notification and show them a policy tip in the context of
the document library that allows them to override the policy if they have a business justification.

The email can notify the person who sent, shared, or last modified the content and, for site content, the primary
site collection administrator and document owner. In addition, you can add or remove whomever you choose
from the email notification.
In addition to sending an email notification, a user notification displays a policy tip:
In Outlook 2013 and later and Outlook on the web.
For the document on a SharePoint Online or OneDrive for Business site.
In Excel 2016, PowerPoint 2016, and Word 2016, when the document is stored on a site included in a DLP
policy.
The email notification and policy tip explain why content conflicts with a DLP policy. If you choose, the email
notification and policy tip can allow users to override a rule by reporting a false positive or providing a business
justification. This can help you educate users about your DLP policies and enforce them without preventing
people from doing their work. Information about overrides and false positives is also logged for reporting (see
below about the DLP reports) and included in the incident reports (next section), so that the compliance officer
can regularly review this information.
Here's what a policy tip looks like in a OneDrive for Business account.

Incident reports
When a rule is matched, you can send an incident report to your compliance officer (or any people you choose)
with details of the event. This report includes information about the item that was matched, the actual content
that matched the rule, and the name of the person who last modified the content. For email messages, the report
also includes as an attachment the original message that matches a DLP policy.
Grouping and logical operators
Often your DLP policy has a straightforward requirement, such as to identify all content that contains a U.S.
Social Security Number. However, in other scenarios, your DLP policy might need to identify more loosely
defined data.
For example, to identify content subject to the U.S. Health Insurance Act (HIPAA), you need to look for:
Content that contains specific types of sensitive information, such as a U.S. Social Security Number or
Drug Enforcement Agency (DEA) Number.
AND
Content that's more difficult to identify, such as communications about a patient's care or descriptions of
medical services provided. Identifying this content requires matching keywords from very large keyword
lists, such as the International Classification of Diseases (ICD -9-CM or ICD -10-CM ).
You can easily identify such loosely defined data by using grouping and logical operators (AND, OR ). When you
create a DLP policy, you can:
Group sensitive information types.
Choose the logical operator between the sensitive information types within a group and between the
groups themselves.
Choosing the operator within a group
Within a group, you can choose whether any or all of the conditions in that group must be satisfied for the
content to match the rule.
Adding a group
You can quickly add a group, which can have its own conditions and operator within that group.

Choosing the operator between groups


Between groups, you can choose whether the conditions in just one group or all of the groups must be satisfied
for the content to match the rule.
For example, the built-in U.S. HIPAA policy has a rule that uses an AND operator between the groups so that it
identifies content that contains:
from the group PII Identifiers (at least one SSN number OR DEA number)
AND
from the group Medical Terms (at least one ICD -9-CM keyword OR ICD -10-CM keyword)
The priority by which rules are processed
When you create rules in a policy, each rule is assigned a priority in the order in which it's created - meaning, the
rule created first has first priority, the rule created second has second priority, and so on. After you create a rule,
its priority can't be changed, except by deleting and re-creating it.

When content is evaluated against rules, the rules are processed in priority order. If content matches multiple
rules, the rules are processed in priority order and the most restrictive action is enforced. For example, if content
matches all of the following rules, Rule 3 is enforced because it's the highest priority, most restrictive rule:
Rule 1: only notifies users
Rule 2: notifies users, restricts access, and allows user overrides
Rule 3: notifies users, restricts access, and does not allow user overrides
Rule 4: only notifies users
Rule 5: restricts access
Rule 6: notifies users, restricts access, and does not allow user overrides
In this example, note that matches for all of the rules are recorded in the audit logs and shown in the DLP reports,
even though only the most restrictive rule is enforced.
With respect to policy tips, note that:
Only the policy tip from the highest priority, most restrictive rule will be shown. For example, a policy tip
from a rule that blocks access to content will be shown over a policy tip from a rule that simply sends a
notification. This prevents people from seeing a cascade of policy tips.
If the policy tips in the most restrictive rule allow people to override the rule, then overriding this rule also
overrides any other rules that the content matched.

Tuning rules to make them easier or harder to match


After people create and turn on their DLP policies, they sometimes run into these issues:
Too much content that is not sensitive information matches the rules - in other words, too many false
positives.
Too little content that is sensitive information matches the rules - in other words, the protective actions
aren't being enforced on the sensitive information.
To address these issues, you can tune your rules by adjusting the instance count and match accuracy to make it
harder or easier for content to match the rules. Each sensitive information type used in a rule has both an
instance count and match accuracy.
Instance count
Instance count means simply how many occurrences of a specific type of sensitive information must be present
for content to match the rule. For example, content will match the rule shown below if between 1 and 9 unique
U.S. or U.K. passport numbers are identified.
Note that the instance count includes only unique matches for sensitive information types and keywords. For
example, if an email contains 10 occurrences of the same credit card number, those 10 occurrences count as a
single instance of a credit card number.
To use instance count to tune rules, the guidance is straightforward:
To make the rule easier to match, decrease the min count and/or increase the max count. You can also set
max to any by deleting the numerical value.
To make the rule harder to match, increase the min count.
Typically, you use less restrictive actions, such as sending user notifications, in a rule with a lower instance count
(for example, 1-9). And you use more restrictive actions, such as restricting access to content without allowing
user overrides, in a rule with a higher instance count (for example, 10-any).

Match accuracy
As described above, a sensitive information type is defined and detected by using a combination of different
types of evidence. Commonly, a sensitive information type is defined by multiple such combinations, called
patterns. A pattern that requires less evidence has a lower match accuracy (or confidence level), while a pattern
that requires more evidence has a higher match accuracy (or confidence level). To learn more about the actual
patterns and confidence levels used by every sensitive information type, see What the sensitive information types
look for.
For example, the sensitive information type named Credit Card Number is defined by two patterns:
A pattern with 65% confidence that requires:
A number in the format of a credit card number.
A number that passes the checksum.
A pattern with 85% confidence that requires:
A number in the format of a credit card number.
A number that passes the checksum.
A keyword or an expiration date in the right format.
You can use these confidence levels (or match accuracy) in your rules. Typically, you use less restrictive actions,
such as sending user notifications, in a rule with lower match accuracy. And you use more restrictive actions, such
as restricting access to content without allowing user overrides, in a rule with higher match accuracy.
It's important to understand that when a specific type of sensitive information, such as a credit card number, is
identified in content, only a single confidence level is returned:
If all of the matches are for a single pattern, the confidence level for that pattern is returned.
If there are matches for more than one pattern (i.e., there are matches with two different confidence levels),
a confidence level higher than any of the single patterns alone is returned. This is the tricky part. For
example, for a credit card, if both the 65% and 85% patterns are matched, the confidence level returned for
that sensitive information type is greater than 90% because more evidence means more confidence.
So if you want to create two mutually exclusive rules for credit cards, one for the 65% match accuracy and one for
the 85% match accuracy, the ranges for match accuracy would look like this. The first rule picks up only matches
of the 65% pattern. The second rule picks up matches with at least one 85% match and can potentially have
other lower-confidence matches.

For these reasons, the guidance for creating rules with different match accuracies is:
The lowest confidence level typically uses the same value for min and max (not a range).
The highest confidence level is typically a range from just above the lower confidence level to 100.
Any in-between confidence levels typically range from just above the lower confidence level to just below
the higher confidence level.
Using a label as a condition in a DLP policy
You can create a label and then:
Publish it, so that end users can see and manually apply the label to content.
Auto-apply it to content that matches the conditions that you choose.
For more information about labels, see Overview of retention labels.
After you create a label, you can then use that label as a condition in your DLP policies. For example, you might
want to do this because:
You published a label named Confidential, so that people in your organization can manually apply the
label to confidential email and documents. By using this label as a condition in your DLP policy, you can
restrict content labeled Confidential from being shared with people outside your organization.
You created a label named Alpine House for a project of that name, and then applied that label
automatically to content containing the keywords "Alpine House". By using this label as a condition in your
DLP policy, you can show a policy tip to end users when they're about to share this content with someone
outside your organization.
You published a label named Tax record, so that your records manager can manually apply the label to
content that needs to be classified as a record. By using this label as a condition in your DLP policy, you
can look for content with this label in conjunction with other types of sensitive information such as ITINs
or SSNs; apply protection actions to content labeled Tax record; and get detailed activity reports about
the DLP policy from the DLP reports and audit log data.
You published a label named Executive Leadership Team - Sensitive to the Exchange mailboxes and
OneDrive accounts of a group of executives. By using this label as a condition in your DLP policy, you can
enforce both retention and protection actions on the same subset of content and users.
By using labels as a condition in your DLP rules, can you selectively enforce protection actions on a specific set of
content, locations, or users.

Support for sensitivity labels is coming


Note that you can currently use only a retention label as a condition, not a sensitivity label. We're currently
working on support for using a sensitivity label in this condition.
How this feature relates to other features
Several features can be applied to content containing sensitive information:
A retention label and a retention policy can both enforce retention actions on this content.
A DLP policy can enforce protection actions on this content. And before enforcing these actions, a DLP
policy can require other conditions to be met in addition to the content containing a label.

Note that a DLP policy has a richer detection capability than a label or retention policy applied to sensitive
information. A DLP policy can enforce protective actions on content containing sensitive information, and if the
sensitive information is removed from the content, those protective actions are undone the next time the
content's scanned. But if a retention policy or label is applied to content containing sensitive information, that's a
one-time action that won't be undone even if the sensitive information's removed.
By using a label as a condition in a DLP policy, you can enforce both retention and protection actions on content
with that label. You can think of content containing a label exactly like content containing sensitive information -
both a label and a sensitive information type are properties used to classify content, so that you can enforce
actions on that content.

Simple settings vs. advanced settings


When you create a DLP policy, you'll choose between simple or advanced settings:
Simple settings make it easy to create the most common type of DLP policy without using the rule editor
to create or modify rules.
Advanced settings use the rule editor to give you complete control over every setting for your DLP
policy.
Don't worry, under the covers, simple settings and advanced settings work exactly the same, by enforcing rules
comprised of conditions and actions -- only with simple settings, you don't see the rule editor. It's a quick way to
create a DLP policy.
Simple settings
By far, the most common DLP scenario is creating a policy to help protect content containing sensitive
information from being shared with people outside your organization, and taking an automatic remedial action
such as restricting who can access the content, sending end-user or admin notifications, and auditing the event
for later investigation. People use DLP to help prevent the inadvertent disclosure of sensitive information.
To simplify achieving this goal, when you create a DLP policy, you can choose Use simple settings. These
settings provide everything you need to implement the most common DLP policy, without having to go into the
rule editor.

Advanced settings
If you need to create more customized DLP policies, you can choose Use advanced settings.
The advanced settings present you with the rule editor, where you have full control over every possible option,
including the instance count and match accuracy (confidence level) for each rule.
To jump to a section quickly, click an item in the top navigation of the rule editor to go to that section below.
DLP policy templates
The first step in creating a DLP policy is choosing what information to protect. By starting with a DLP template,
you save the work of building a new set of rules from scratch, and figuring out which types of information should
be included by default. You can then add to or modify these requirements to fine tune the rule to meet your
organization's specific requirements.
A preconfigured DLP policy template can help you detect specific types of sensitive information, such as HIPAA
data, PCI-DSS data, Gramm-Leach-Bliley Act data, or even locale-specific personally identifiable information
(P.I.). To make it easy for you to find and protect common types of sensitive information, the policy templates
included in Office 365 already contain the most common sensitive information types necessary for you to get
started.
Your organization may also have its own specific requirements, in which case you can create a DLP policy from
scratch by choosing the Custom policy option. A custom policy is empty and contains no premade rules.

Roll out DLP policies gradually with test mode


When you create your DLP policies, you should consider rolling them out gradually to assess their impact and
test their effectiveness before fully enforcing them. For example, you don't want a new DLP policy to
unintentionally block access to thousands of documents that people require access to in order to get their work
done.
If you're creating DLP policies with a large potential impact, we recommend following this sequence:
1. Start in test mode without Policy Tips and then use the DLP reports and any incident reports to assess
the impact. You can use DLP reports to view the number, location, type, and severity of policy matches.
Based on the results, you can fine tune the rules as needed. In test mode, DLP policies will not impact the
productivity of people working in your organization.
2. Move to Test mode with notifications and Policy Tips so that you can begin to teach users about your
compliance policies and prepare them for the rules that are going to be applied. At this stage, you can also
ask users to report false positives so that you can further refine the rules.
3. Start full enforcement on the policies so that the actions in the rules are applied and the content's
protected. Continue to monitor the DLP reports and any incident reports or notifications to make sure that
the results are what you intend.

You can turn off a DLP policy at any time, which affects all rules in the policy. However, each rule can also be
turned off individually by toggling its status in the rule editor.
DLP reports
After you create and turn on your DLP policies, you'll want to verify that they're working as you intended and
helping you stay compliant. With DLP reports, you can quickly view the number of DLP policy and rule matches
over time, and the number of false positives and overrides. For each report, you can filter those matches by
location, time frame, and even narrow it down to a specific policy, rule, or action.
With the DLP reports, you can get business insights and:
Focus on specific time periods and understand the reasons for spikes and trends.
Discover business processes that violate your organization's compliance policies.
Understand any business impact of the DLP policies.
In addition, you can use the DLP reports to fine tune your DLP policies as you run them.

How DLP policies work


DLP detects sensitive information by using deep content analysis (not just a simple text scan). This deep content
analysis uses keyword matches, dictionary matches, the evaluation of regular expressions, internal functions, and
other methods to detect content that matches your DLP policies. Potentially only a small percentage of your data
is considered sensitive. A DLP policy can identify, monitor, and automatically protect just that data, without
impeding or affecting people who work with the rest of your content.
Policies are synced
After you create a DLP policy in the Security & Compliance Center, it's stored in a central policy store, and then
synced to the various content sources, including:
Exchange Online, and from there to Outlook on the web and Outlook 2013 and later
OneDrive for Business sites
SharePoint Online sites
Office 2016 desktop programs (Excel 2016, PowerPoint 2016, and Word 2016)
After the policy's synced to the right locations, it starts to evaluate content and enforce actions.
Policy evaluation in OneDrive for Business and SharePoint Online sites
Across all of your SharePoint Online sites and OneDrive for Business sites, documents are constantly changing
— they're continually being created, edited, shared, and so on. This means documents can conflict or become
compliant with a DLP policy at any time. For example, a person can upload a document that contains no sensitive
information to their team site, but later, a different person can edit the same document and add sensitive
information to it.
For this reason, DLP policies check documents for policy matches frequently in the background. You can think of
this as asynchronous policy evaluation.
Here's how it works. As people add or change documents in their sites, the search engine scans the content, so
that you can search for it later. While this is happening, the content's also scanned for sensitive information and to
check if it's shared. Any sensitive information that's found is stored securely in the search index, so that only the
compliance team can access it, but not typical users. Each DLP policy that you've turned on runs in the
background (asynchronously), checking search frequently for any content that matches a policy, and applying
actions to protect it from inadvertent leaks.

Finally, documents can conflict with a DLP policy, but they can also become compliant with a DLP policy. For
example, if a person adds credit card numbers to a document, it might cause a DLP policy to block access to the
document automatically. But if the person later removes the sensitive information, the action (in this case,
blocking) is automatically undone the next time the document is evaluated against the policy.
DLP evaluates any content that can be indexed. For more information on what file types are crawled by default,
see Default crawled file name extensions and parsed file types in SharePoint Server 2013.
Policy evaluation in Exchange Online, Outlook 2013 and later, and Outlook on the web
When you create a DLP policy that includes Exchange Online as a location, the policy's synced from the Office
365 Security & Compliance Center to Exchange Online, and then from Exchange Online to Outlook on the web
and Outlook 2013 and later.
When a message is being composed in Outlook, the user can see policy tips as the content being created is
evaluated against DLP policies. And after a message is sent, it's evaluated against DLP policies as a normal part
of mail flow, along with Exchange transport rules and DLP policies created in the Exchange Admin Center (see
the next section for more info). DLP policies scan both the message and any attachments.
Policy evaluation in the Office 2016 desktop programs
Excel 2016, PowerPoint 2016, and Word 2016 include the same capability to identify sensitive information and
apply DLP policies as SharePoint Online and OneDrive for Business. These Office 2016 programs sync their DLP
policies directly from the central policy store, and then continuously evaluate the content against the DLP policies
when people work with documents opened from a site that's included in a DLP policy.
DLP policy evaluation in Office 2016 is designed not to affect the performance of the programs or the
productivity of people working on content. If they're working on a large document, or the user's computer is busy,
it might take a few seconds for a policy tip to appear.

Permissions
Members of your compliance team who will create DLP policies need permissions to the Security & Compliance
Center. By default, your tenant admin will have access to this location and can give compliance officers and other
people access to the Security & Compliance Center, without giving them all of the permissions of a tenant admin.
To do this, we recommend that you:
1. Create a group in Office 365 and add compliance officers to it.
2. Create a role group on the Permissions page of the Security & Compliance Center.
3. Add the Office 365 group to the role group.
For more information, see Give users access to the Office 365 Compliance Center.
These permissions are required only to create and apply a DLP policy. Policy enforcement does not require access
to the content.

Find the DLP cmdlets


To use most of the cmdlets for the Security & Compliance Center, you need to:
1. Connect to the Office 365 Security & Compliance Center using remote PowerShell
2. Use any of these Office 365 Security & Compliance Center cmdlets
However, DLP reports need pull data from across Office 365, including Exchange Online. For this reason, the
cmdlets for the DLP reports are available in Exchange Online Powershell -- not in Security & Compliance Center
Powershell. Therefore, to use the cmdlets for the DLP reports, you need to:
1. Connect to Exchange Online using remote PowerShell
2. Use any of these cmdlets for the DLP reports:
Get-DlpDetectionsReport
Get-DlpDetailReport

More information
Create a DLP policy from a template
Send notifications and show policy tips for DLP policies
Create a DLP policy to protect documents with FCI or other properties
What the DLP policy templates include
What the sensitive information types look for
What the DLP functions look for
Create a custom sensitive information type
Get started with DLP policy recommendations
9/24/2018 • 2 minutes to read • Edit Online

This insight-driven recommendation helps your organization keep sensitive content secure when it's stored and
shared in Office 365 by informing you when there's a possible gap in your DLP policy coverage. You'll see this
recommendation on the Home page of the Security & Compliance Center, if your documents contain any of the
top-five most common types of sensitive information but aren't protected by a data loss prevention (DLP ) policy.
You can use this widget to quickly create a customized DLP policy in just a click or two, and after you create this
DLP policy, it's fully customizable. Note that if you don't see the recommendation at first, try clicking +More at the
bottom of the Recommended for you section.

Create the recommended DLP policy


When the widget shows you unprotected sensitive information, choose Get started at the bottom to quickly create
a DLP policy.
To help protect the sensitive information, this DLP policy:
Detects when content in Exchange, SharePoint, and OneDrive that contains one of the unprotected types of
sensitive information is shared with people outside your organization.
Generates detailed activity reports so that you can track things like who shared the content with people
outside your organization and when they did it. You can use the DLP reports and audit log data (where
Activity = DLP ) to see this information.
You can also choose to have the DLP policy:
Send you an incident report email when users share a lot of this sensitive information with people outside
your organization.
Add other users to the email incident report.
Show a policy tip and send an email notification to users when they attempt to share this sensitive
information with people outside your organization. For more information on these options, see Send email
notifications and show policy tips for DLP policies.
If you want to change these options later, you can edit the DLP policy after it's created. For example, you can make
the policy more restrictive by even blocking people from sharing content that contains sensitive information in the
first place - see the next section.

Edit the recommended DLP policy


After you use the widget to create a DLP policy, the policy appears under Data loss prevention on the Policy
page of the Security & Compliance Center.
By default, the policy is named System Recommended Policy for Sharing Sensitive Information. This policy is
fully customizable, the same as any DLP policy that you create yourself from scratch. For example, if you decided
not to turn on incident reports and policy tips when you used the widget, you can always edit the policy and turn
on those options at any time.

When the widget does and does not appear


The widget named Unprotected Sensitive Information appears in the Recommended for you section of the
Home page of the Security & Compliance Center.
This widget appears only when:
New documents containing any of the five most common types of sensitive information are detected in
SharePoint or OneDrive over the past 30 days.
That sensitive information is not already protected by an existing DLP policy.
Unlike DLP policies that are constantly scanning your data, this recommendation scans for gaps in your DLP policy
coverage roughly every 48 hours, so after new content is uploaded, it may take up to two days for the
recommendation to appear.
Finally, after you use the widget to create a recommended DLP policy, the widget disappears from the Home page.
Get started with the default DLP policy
8/21/2018 • 3 minutes to read • Edit Online

Before you even create your first data loss prevention (DLP ) policy, DLP is helping to protect your sensitive
information with a default policy. This default policy and its recommendation (shown below ) help keep your
sensitive content secure by notifying you when email or documents containing a credit card number were shared
with someone outside your organization. You'll see this recommendation on the Home page of the Security &
Compliance Center.
You can use this widget to quickly view when and how much sensitive information was shared, and then refine the
default DLP policy in just a click or two. You can also edit the default DLP policy at any time because it's fully
customizable. Note that if you don't see the recommendation at first, try clicking +More at the bottom of the
Recommended for you section.

View the report and refine the default DLP policy


When the widget shows you that users have shared sensitive information with people outside your organization,
choose Refine DLP policy at the bottom.
The detailed report shows you when and how much content containing credit card numbers was shared in the past
30 days. Note that rule matches can take up to 48 hours to show up in the widget.
To help protect the sensitive information, the default DLP policy:
Detects when content in Exchange, SharePoint, and OneDrive that contains at least one credit card number
is shared with people outside your organization.
Shows a policy tip and sends an email notification to users when they attempt to share this sensitive
information with people outside your organization. For more information on these options, see Send email
notifications and show policy tips for DLP policies.
Generates detailed activity reports so that you can track things like who shared the content with people
outside your organization and when they did it. You can use the DLP reports and audit log data (where
Activity = DLP ) to see this information.
To quickly refine the default DLP policy, you can choose to have it:
Send you an incident report email when users share this sensitive information with people outside your
organization.
Add other users to the email incident report.
Block access to the content containing the sensitive information, but allow the user to override and share or
send if they need to.
For more information on incident reports or restricting access, see Overview of data loss prevention policies.
If you want to change these options later, you can edit the default DLP policy at any time - see the next section.
Edit the default DLP policy
This policy is named Default Office 365 DLP policy and appears under Data loss prevention on the Policy
page of the Security & Compliance Center.
This policy is fully customizable, the same as any DLP policy that you create yourself from scratch. You can also
turn off or delete the policy, so that your users no longer receive policy tips or email notifications.

When the widget does and does not appear


The widget named Further protect shared content appears in the Recommended for you section of the Home
page of the Security & Compliance Center.
This widget appears only when:
There are no data loss prevention policies in the Security & Compliance Center or Exchange Admin Center.
This widget is intended to help you get started with DLP, so it doesn't appear if you already have DLP
policies.
Content containing least one credit card has been shared with someone outside your organization in the
past 30 days.
Note that rule matches can take up to 48 hours to be available to the widget, so after sensitive information shared
externally is detected, it may take up to two days for the recommendation to appear.
Finally, after you use the widget to refine the default DLP policy, the widget disappears from the Home page.
Create a DLP policy from a template
8/21/2018 • 10 minutes to read • Edit Online

The easiest, most common way to get started with DLP policies is to use one of the templates included in Office
365. You can use one of these templates as is, or customize the rules to meet your organization's specific
compliance requirements.
Office 365 includes over 40 ready-to-use templates that can help you meet a wide range of common regulatory
and business policy needs. For example, there are DLP policy templates for:
Gramm-Leach-Bliley Act (GLBA)
Payment Card Industry Data Security Standard (PCI-DSS )
United States Personally Identifiable Information (U.S. PII)
United States Health Insurance Act (HIPAA)
You can fine tune a template by modifying any of the existing rules or adding new ones. For example, you can add
new types of sensitive information to a rule, modify the counts in a rule to make it harder or easier to trigger, allow
people to override the actions in a rule by providing a business justification, or change who notifications and
incident reports are sent to. A DLP policy template is a flexible starting point for many common compliance
scenarios.
You can also choose the Custom template, which has no default rules, and configure your DLP policy from scratch,
to meet the specific compliance requirements for your organization.

Example: Identify sensitive information across all OneDrive for Business


sites and restrict access for people outside your organization
OneDrive for Business accounts make it easy for people across your organization to collaborate and share
documents. But a common concern for compliance officers is that sensitive information stored in OneDrive for
Business accounts may be inadvertently shared with people outside your organization. A DLP policy can help
mitigate this risk.
In this example, you'll create a DLP policy that identifies U.S. PII data, which includes Individual Taxpayer
Identification Numbers (ITIN ), Social Security Numbers, and U.S. passport numbers. You'll get started by using a
template, and then you'll modify the template to meet your organization's compliance requirements—specifically,
you'll:
Add a couple of types of sensitive information—U.S. bank account numbers and U.S. driver's license
numbers—so that the DLP policy protects even more of your sensitive data.
Make the policy more sensitive, so that a single occurrence of sensitive information is enough to restrict
access for external users.
Allow users to override the actions by providing a business justification or reporting a false positive. This
way, your DLP policy won't prevent people in your organization from getting their work done, provided
they have a valid business reason for sharing the sensitive information.
Create a DLP policy from a template
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account. You're now in the Office 365 Security &
Compliance Center.
3. In the Security & Compliance Center > left navigation > Data loss prevention > Policy > + Create a
policy.

4. Choose the DLP policy template that protects the types of sensitive information that you need > Next.
In this example, you'll select Privacy > U.S. Personally Identifiable Information (PII ) Data because it
already includes most of the types of sensitive information that you want to protect—you'll add a couple
later.
When you select a template, you can read the description on the right to learn what types of sensitive
information the template protects.
5. Name the policy > Next.
6. To choose the locations that you want the DLP policy to protect, do one of the following:
Choose All locations in Office 365 > Next.
Choose Let me choose specific locations > Next. For this example, choose this.
To include or exclude an entire location such as all Exchange email or all OneDrive accounts, switch the
Status of that location on or off.
To include only specific SharePoint sites or OneDrive for Business accounts, switch the Status to on, and
then click the links under Include to choose specific sites or accounts. When you apply a policy to a site, the
rules configured in that policy are automatically applied to all subsites of that site.

In this example, to protect sensitive information stored in all OneDrive for Business accounts, turn off the
Status for both Exchange email and SharePoint sites, and leave the Status on for OneDrive accounts.
7. Choose Use advanced settings > Next.
8. A DLP policy template contains predefined rules with conditions and actions that detect and act upon
specific types of sensitive information. You can edit, delete, or turn off any of the existing rules, or add new
ones. When done, click Next.

In this example, the U.S. PII Data template includes two predefined rules:
Low volume of content detected U.S. PII This rule looks for files containing between 1 and 10
occurrences of each of three types of sensitive information (ITIN, SSN, and U.S. passport numbers), where
the files are shared with people outside the organization. If found, the rule sends an email notification to the
primary site collection administrator, document owner, and person who last modified the document.
High volume of content detected U.S. PII This rule looks for files containing 10 or more occurrences of
each of the same three sensitive information types, where the files are shared with people outside the
organization. If found, this action also sends an email notification, plus it restricts access to the file. For
content in a OneDrive for Business account, this means that permissions for the document are restricted for
everyone except the primary site collection administrator, document owner, and person who last modified
the document.
To meet your organization's specific requirements, you may want to make the rules easier to trigger, so that
a single occurrence of sensitive information is enough to block access for external users. After looking at
these rules, you understand that you don't need low and high count rules—you need only a single rule that
blocks access if any occurrence of sensitive information is found.
So you expand the rule named Low volume of content detected U.S. PII > Delete rule.

9. Now, in this example, you need to add two sensitive information types (U.S. bank account numbers and
U.S. driver's license numbers), allow people to override a rule, and change the count to any occurrence. You
can do all of this by editing one rule, so select High volume of content detected U.S. PII > Edit rule.

10. To add a sensitive information type, in the Conditions section > Add or change types. Then, under Add
or change types > choose Add > select U.S. Bank Account Number and U.S. Driver's License
Number > Add > Done.
11. To change the count (the number of instances of sensitive information required to trigger the rule), under
Instance count > choose the min value for each type > enter 1. The minimum count cannot be empty. The
maximum count can be empty; an empty max value convert to any.
When finished, the min count for all of the sensitive information types should be 1 and the max count
should be any. In other words, any occurrence of this type of sensitive information will satisfy this
condition.

12. For the final customization, you don't want your DLP policies to block people from doing their work when
they have a valid business justification or encounter a false positive, so you want the user notification to
include options to override the blocking action.
In the User notifications section, you can see that email notifications and policy tips are turned on by
default for this rule in the template.
In the User overrides section, you can see that overrides for a business justification are turned on, but
overrides to report false positives are not. Choose Override the rule automatically if they report it as a
false positive.
13. At the top of the rule editor, change the name of this rule from the default High volume of content
detected U.S. PII to Any content detected with U.S. PII because it's now triggered by any occurrence
of its sensitive information types.
14. At the bottom of the rule editor > Save.
15. Review the conditions and actions for this rule > Next.
On the right, notice the Status switch for the rule. If you turn off an entire policy, all rules contained in the
policy are also turned off. However, here you can turn off a specific rule without turning off the entire policy.
This can be useful when you need to investigate a rule that is generating a large number of false positives.
16. On the next page, read and understand the following, and then choose whether to turn on the rule or test it
out first > Next.
Before you create your DLP policies, you should consider rolling them out gradually to assess their impact
and test their effectiveness before you fully enforce them. For example, you don't want a new DLP policy to
unintentionally block access to thousands of documents that people require to get their work done.
If you're creating DLP policies with a large potential impact, we recommend following this sequence:
17. Start in test mode without Policy Tips and then use the DLP reports to assess the impact. You can use DLP
reports to view the number, location, type, and severity of policy matches. Based on the results, you can fine
tune the rules as needed. In test mode, DLP policies will not impact the productivity of people working in
your organization.
18. Move to Test mode with notifications and Policy Tips so that you can begin to teach users about your
compliance policies and prepare them for the rules that are going to be applied. At this stage, you can also
ask users to report false positives so that you can further refine the rules.
19. Turn on the policies so that the rules are enforced and the content's protected. Continue to monitor the DLP
reports and any incident reports or notifications to make sure that the results are what you intend.

20. Review your settings for this policy > choose Create.
After you create and turn on a DLP policy, it's deployed to any content sources that it includes, such as SharePoint
Online sites or OneDrive for Business accounts, where the policy begins automatically enforcing its rules on that
content.

View the status of a DLP policy


At any time, you can view the status of your DLP policies on the Policy page in the Data loss prevention section
of the Security & Compliance Center. Here you can find important information, such as whether a policy was
successfully enabled or disabled, or whether the policy is in test mode.
Here are the different statuses and what they mean.

STATUS EXPLANATION

Turning on… The policy is being deployed to the content sources that it
includes. The policy is not yet enforced on all sources.

Testing, with notifications The policy is in test mode. The actions in a rule are not
applied, but policy matches are collected and can be viewed
by using the DLP reports. Notifications about policy matches
are sent to the specified recipients.

Testing, without notifications The policy is in test mode. The actions in a rule are not
applied, but policy matches are collected and can be viewed
by using the DLP reports. Notifications about policy matches
are not sent to the specified recipients.

On The policy is active and enforced. The policy was successfully


deployed to all its content sources.

Turning off… The policy is being removed from the content sources that it
includes. The policy may still be active and enforced on some
sources. Turning off a policy may take up to 45 minutes.

Off The policy is not active and not enforced. The settings for the
policy (sources, keywords, duration, etc) are saved.

Deleting… The policy is in the process of being deleted. The policy is not
active and not enforced.

Turn off a DLP policy


You can edit or turn off a DLP policy at any time. Turning off a policy disables all of the rules in the policy.
To edit or turn off a DLP policy, on the Policy page > select the policy > Edit policy.

In addition, you can turn off each rule individually by editing the policy and then toggling off the Status of that
rule, as described above.
More information
Overview of data loss prevention policies
Send notifications and show policy tips for DLP policies
Create a DLP policy to protect documents with FCI or other properties
What the DLP policy templates include
Sensitive information types inventory
Create, test, and tune a DLP policy
11/14/2018 • 13 minutes to read • Edit Online

Principal author
Paul Cunningham, Microsoft MVP
Practical 365
@Practical365

Data loss prevention is a compliance feature of Office 365 that is designed to help your organization prevent the
intentional or accidental exposure of sensitive information to unwanted parties. DLP has its roots in Exchange
Server and Exchange Online, and is also applicable in SharePoint Online and OneDrive for Business.
DLP uses a content analysis engine to examine the contents of email messages and files, looking for sensitive
information such as credit card numbers and personally identifiable information (PII). Sensitive information should
typically not be sent in email, or included in documents, without taking additional steps such as encrypting the
email message or files. Using DLP you can detect sensitive information, and take action such as:
Log the event for auditing purposes
Display a warning to the end user who is sending the email or sharing the file
Actively block the email or file sharing from taking place
Sometimes customers dismiss DLP because they don't consider themselves to have the type of data that needs
protecting. The assumption is that sensitive data, such as medical records or financial information, only exists for
industries like health care or for companies that run online stores. But any business can handle sensitive
information on a regular basis, even if they don't realize it. A spreadsheet of employee names and dates of birth is
just as sensitive as a spreadsheet of customer names and credit card details. And this type of information tends to
float around more than you might expect, as employees quietly go about their day to day tasks, thinking nothing of
export a CSV file from a system and emailing it to someone. You might also be surprised how often employees
send emails containing credit card or banking details without considering the consequences.

How sensitive information is detected by DLP


Sensitive information is identified by regular expression (RegEx) pattern matching, in combination with with other
indicators such as the proximity of certain keywords to the matching patterns. An example of this is credit card
numbers. A VISA credit card number has 16 digits. However, those digits can be written in different ways, such as
1111-1111-1111-1111, 1111 1111 1111 1111, or 1111111111111111.
Any 16 digit string is not necessarily a credit card number, it could be a ticket number from a help desk system, or a
serial number of a piece of hardware. To tell the difference between a credit card number and a harmless 16-digit
string, a calculation is performed (checksum) to confirm that the numbers match a known pattern from the various
credit card brands.
Furthermore, the proximity of keywords such as “VISA” or “AMEX”, along with the proximity to date values that
might be the credit card expiry date, is also considered to make a decision about whether the data is a credit card
number or not.
In other words, DLP is usually smart enough to recognize the difference between these two texts in an email:
“Can you order me a new laptop. Use my VISA number 1111-1111-1111-1111, expiry 11/22, and send me the
estimated delivery date when you have it.”
“My laptop serial number is 2222-2222-2222-2222 and it was purchased on 11/2010. By the way, is my travel
visa approved yet?”
A good reference to keep bookmarked is this topic on sensitive information types that explains how each
information type is detected.

Where to start with data loss prevention


When the risks of data leakage aren't entirely obvious, it's difficult to work out where exactly you should start with
implementing DLP. Fortunately, DLP policies can be run in “test mode”, allowing you to gauge their effectiveness
and accuracy before you turn them on.
DLP policies for Exchange Online can be managed through the Exchange admin center. But you can configure DLP
policies for all workloads through the Security & Compliance Center, so that's what I'll use for demonstrations in
this article. In the Security & Compliance Center you'll find the DLP policies under Data loss prevention >
Policy. Click on Create a policy to start.
Office 365 provides a range of DLP policy templates you can use to create DLP policies. Let's say that you're an
Australian business. You can filter the policy templates to display only those that are relevant to Australia, which fall
into the general categories of Financial, Medical and Health, and Privacy.

For this demonstration I'll choose Australian Personally Identifiable Information (PII) Data, which includes the
information types of Australian Tax File Number (TFN ) and Driver's License Number.

Give your new DLP policy a name. The default name will match the DLP policy template, but you should choose a
more descriptive name of your own, because multiple policies can be created from the same template.
Choose the locations that the policy will apply to. DLP policies can apply to Exchange Online, SharePoint Online,
and OneDrive for Business. I am going to leave this policy configured to apply to all locations.

At the first Policy Settings step just accept the defaults for now. There is quite a lot of customization you can do in
DLP policies, but the defaults are a fine place to start.

After clicking Next you'll be presented with an additional Policy Settings page with more customization options.
For a policy that you are just testing, here's where you can start to make some adjustments.
I've turned off policy tips for now, which is a reasonable step to take if you're just testing things out and don't
want to display anything to users yet. Policy tips display warnings to users that they're about to violate a DLP
policy. For example, an Outlook user will see a warning that the file they've attached contains credit card
numbers and will cause their email to be rejected. The goal of policy tips is to stop the non-compliant behaviour
before it happens.
I've also decreased the number of instances from 10 to 1, so that this policy will detect any sharing of Australian
PII data, not just bulk sharing of the data.
I've also added another recipient to the incident report email.

Finally, I've configured this policy to run in test mode initially. Notice there's also an option here to disable policy
tips while in test mode. This gives you the flexibility to have policy tips enabled in the policy, but then decide
whether to show or suppress them during your testing.

On the final review screen click Create to finish creating the policy.

Test a DLP policy


Your new DLP policy will begin to take effect within about 1 hour. You can sit and wait for it to be triggered by
normal user activity, or you can try to trigger it yourself. Earlier I linked to this topic on sensitive information types,
which provides you with information about how to trigger DLP matches.
As an example, the DLP policy I created for this article will detect Australian tax file numbers (TFN ). According to
the documentation, the match is based on the following criteria.

To demonstrate TFN detection in a rather blunt manner, an email with the words “Tax file number” and a 9 digit
string in close proximity will sail through without any issues. The reason it does not trigger the DLP policy is that
the 9-digit string must pass the checksum that indicates it is a valid TFN and not just a harmless string of numbers.
In comparison, an email with the words “Tax file number” and a valid TFN that passes the checksum will trigger the
policy. For the record here, the TFN I'm using was taken from a website that generates valid, but not genuine,
TFNs. There are similar sites that generate valid but fake credit card numbers. Such sites are very useful because
one of the most common mistakes when testing a DLP policy is using a fake number that's not valid and won't
pass the checksum (and therefore won't trigger the policy).

The incident report email includes the type of sensitive information that was detected, how many instances were
detected, and the confidence level of the detection.
If you leave your DLP policy in test mode and analyze the incident report emails, you can start to get a feel for the
accuracy of the DLP policy and how effective it will be when it is enforced. In addition to the incident reports, you
can use the DLP reports to see an aggregated view of policy matches across your tenant.

Tune a DLP policy


As you analyze your policy hits you might want to make some adjustments to how the policies behave. As a simple
example, you might determine that one TFN in email is not a problem (I think it still is, but let's go with it for the
sake of demonstration), but two or more instances is a problem. Multiple instances could be a risky scenario such
as an employee emailing a CSV export from the HR database to an external party, for example an external
accounting service. Definitely something you would prefer to detect and block.
In the Security & Compliance Center you can edit an existing policy to adjust the behaviour.

You can adjust the location settings so that the policy is applied only to specific workloads, or to specific sites and
accounts.
You can also adjust the policy settings and edit the rules to better suit your needs.

When editing a rule within a DLP policy you can change:


The conditions, including the type and number of instances of sensitive data that will trigger the rule.
The actions that are taken, such as restricting access to the content.
User notifications, which are policy tips that are displayed to the user in their email client or web browser.
User overrides, which determines whether users can choose to proceed with their email or file sharing anyway.
Incident reports, to notify administrators.
For this demonstration I've added user notifications to the policy (be careful of doing this without adequate user
awareness training), and allowed users to override the policy with a business justification or by flagging it as a false
positive. Note that you can also customize the email and policy tip text if you want to include any additional
information about your organization's policies, or prompt users to contact support if they have questions.

The policy contains two rules for handling of high volume and low volume, so be sure to edit both with the actions
that you want. This is an opportunity to treat cases differently depending on their characteristics. For example, you
might allow overrides for low volume violations, but not allow overrides for high volume violations.
Also, if you want to actually block or restrict access to content that is in violation of policy, you need to configure an
action on the rule to do so.

After saving those changes to the policy settings, I also need to return to the main settings page for the policy and
enable the option to show policy tips to users while the policy is in test mode. This is an effective way to introduce
DLP policies to your end users, and do user awareness training, without risking too many false positives that
impact their productivity.
On the server side (or cloud side if you prefer), the change may not take effect immediately, due to various
processing intervals. If you're making a DLP policy change that will display new policy tips to a user, the user may
not see the changes take effect immediately in their Outlook client, which checks for policy changes every 24 hours.
If you want to speed things up for testing, you can use this registry fix to clear the last download time stamp from
the PolicyNudges key. Outlook will download the latest policy information the next time you restart it and begin
composing an email message.
If you have policy tips enabled, the user will begin to see the tips in Outlook, and can report false positives to you
when they occur.

Investigate false positives


DLP policy templates are not perfect straight out of the box. It's likely that you'll find some false positives occurring
in your environment, which is why it's so important to ease your way into a DLP deployment, taking the time to
adequately test and tune your policies.
Here's an example of a false positive. This email is quite harmless. The user is providing their mobile phone
number to someone, and including their email signature.
But the user sees a policy tip warning them that the email contains sensitive information, specifically, an Australian
driver's license number.

The user can report the false positive, and the administrator can look into why it has occurred. In the incident
report email, the email is flagged as a false positive.

This driver's license case is a good example to dig into. The reason this false positive has occurred is that the
“Australian Driver's License” type will be triggered by any 9-digit string (even one that is part of a 10-digit string),
within 300 characters proximity to the keywords “sydney nsw” (not case sensitive). So it's triggered by the phone
number and email signature, only because the user happens to be in Sydney.
Interestingly, if “Sydney, NSW” has a comma, the DLP policy is not triggered. I have no idea why a comma makes
any difference here, nor why other cities and states in Australia aren't included in the keywords for the Australian
driver's license information type, but there you go. So, what can we do about it? There's a couple of options.
One option is to remove the Australian driver's license information type from the policy. It's in there because it's
part of the DLP policy template, but we're not forced to use it. If you're only interested in Tax File Numbers and not
driver's licenses, you can just remove it. For example, you can remove it from the low volume rule in the policy, but
leave it in the high volume rule so that lists of multiple drivers licenses are still detected.

Another option is to simply increase the instance count, so that a low volume of driver's licenses is only detected
when there are multiple instances.

In addition to changing the instance count, you can also adjust the match accuracy (or confidence level). If your
sensitive information type has multiple patterns, you can adjust the match accuracy in your rule, so that your rule
matches only specific patterns. For example, to help reduce false positives, you can set the match accuracy of your
rule so that it matches only the pattern with the highest confidence level. Understanding how confidence level is
calculated is a bit tricky (and beyond the scope of this post), but here's a good explanation of how to use confidence
level to tune your rules.
Finally, if you want to get even a bit more advanced, you can customize any sensitive information type -- for
example, you can remove "Sydney NSW" from the list of keywords for Australian Driver's License, to eliminate the
false positive triggered above. To learn how to do this by using XML and PowerShell, see this topic on customizing
a built-in sensitive information type.

Turn off a DLP policy


When you're happy that your DLP policy is accurately and effectively detecting sensitive information types, and
that your end users are ready to deal with the policies being in place, then you can enable the policy.
If you're waiting to see when the policy will take effect, Connect to Office 365 Security & Compliance Center
PowerShell and run the Get-DlpCompliancePolicy cmdlet to see the DistributionStatus.

After turning on the DLP policy, you should run some final tests of your own to make sure that the expected policy
actions are occurring. If you're trying to test things like credit card data, there are websites online with information
on how to generate sample credit card or other personal information that will pass checksums and trigger your
policies.
Policies that allow user overrides will present that option to the user as part of the policy tip.
Policies that restrict content will present the warning to the user as part of the policy tip, and prevent them from
sending the email.

Summary
Data loss prevention policies are useful for organizations of all types. Testing some DLP policies is a low risk
exercise due to the control you have over things like policy tips, end user overrides, and incident reports. You can
quietly test some DLP policies to see what type of violations are already occurring in your organization, and then
craft policies with low false positive rates, educate your users on what is allowed and not allowed, and then roll out
your DLP policies to the organization.
Send email notifications and show policy tips for DLP
policies
10/26/2018 • 15 minutes to read • Edit Online

You can use a data loss prevention (DLP ) policy to identify, monitor, and protect sensitive information across
Office 365. You want people in your organization who work with this sensitive information to stay compliant with
your DLP policies, but you don't want to block them unnecessarily from getting their work done. This is where
email notifications and policy tips can help.

A policy tip is a notification or warning that appears when someone is working with content that conflicts with a
DLP policy—for example, content like an Excel workbook on a OneDrive for Business site that contains personally
identifiable information (PII) and is shared with an external user.
You can use email notifications and policy tips to increase awareness and help educate people about your
organization's policies. You can also give people the option to override the policy, so that they're not blocked if
they have a valid business need or if the policy is detecting a false positive.
In the Office 365 Security & Compliance Center, when you create a DLP policy, you can configure the user
notifications to:
Send an email notification to the people you choose that describes the issue.
Display a policy tip for content that conflicts with the DLP policy:
For email in Outlook on the web and Outlook 2013 and later, the policy tip appears at the top of a
message above the recipients while the message is being composed.
For documents in a OneDrive for Business account or SharePoint Online site, the policy tip is
indicated by a warning icon that appears on the item. To view more information, you can select an
item and then choose Information in the upper-right corner of the page to open the details
pane.
For Excel 2016, PowerPoint 2016, and Word 2016 documents that are stored on a OneDrive for
Business site or SharePoint Online site that's included in the DLP policy, the policy tip appears on
the Message Bar and the Backstage view ( File menu > Info).

Add user notifications to a DLP policy


When you create a DLP policy, both email notifications and policy tips are part of the User notifications section.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account. You're now in the Office 365 Security &
Compliance Center.
3. In the Security & Compliance Center > left navigation > Data loss prevention > Policy > + Create a
policy.

4. Choose the DLP policy template that protects the types of sensitive information that you need > Next.
To start with an empty template, choose Custom > Custom policy > Next.
5. Name the policy > Next.
6. To choose the locations that you want the DLP policy to protect, do one of the following:
Choose All locations in Office 365 > Next.
Choose Let me choose specific locations > Next.
To include or exclude an entire location such as all Exchange email or all OneDrive accounts, switch the
Status of that location on or off.
To include only specific SharePoint sites or OneDrive accounts, switch the Status to on, and then click the
links under Include to choose specific sites or accounts.
7. Choose Use advanced settings > Next.
8. Choose + New rule.
9. In the rule editor, under User notifications, switch the status on.
Options for configuring email notifications
For each rule in a DLP policy, you can:
Send the notification to the people you choose. These people can include the owner of the content, the
person who last modified the content, the owner of the site where the content is stored, or a specific user.
Customize the text that's included in the notification by using HTML or tokens. See the section below for
more information.

NOTE
Email notifications can be sent only to individual recipients—not groups or distribution lists. > Only new content will trigger
an email notification. Editing existing content will trigger policy tips but not an email notification.

Default email notification


Notifications have a Subject line that begins with the action taken, such as "Notification", "Message Blocked" for
email, or "Access Blocked" for documents. If the notification is about a document, the notification message body
includes a link that takes you to the site where the document's stored and opens the policy tip for the document,
where you can resolve any issues (see the section below about policy tips). If the notification is about a message,
the notification includes as an attachment the message that matches a DLP policy.

By default, notifications display text similar to the following for an item on a site. The notification text is configured
separately for each rule, so the text that's displayed differs depending on which rule is matched.

THEN THE DEFAULT NOTIFICATION FOR


SHAREPOINT OR ONEDRIVE FOR BUSINESS THEN THE DEFAULT NOTIFICATION FOR
IF THE DLP POLICY RULE DOES THIS… DOCUMENTS SAYS THIS… OUTLOOK MESSAGES SAYS THIS…

Sends a notification but doesn't allow This item conflicts with a policy in your Your email message conflicts with a
override organization. policy in your organization.

Blocks access, sends a notification, and This item conflicts with a policy in your Your email message conflicts with a
allows override organization. If you don't resolve this policy in your organization. The
conflict, access to this file might be message wasn't delivered to all
blocked. recipients.

Blocks access and sends a notification This item conflicts with a policy in your Your email message conflicts with a
organization. Access to this item is policy in your organization. The
blocked for everyone except its owner, message wasn't delivered to all
last modifier, and the primary site recipients.
collection administrator.

Custom email notification


You can create a custom email notification instead of sending the default email notification to your end users or
admins. The custom email notification supports HTML and has a 5,000-character limit. You can use HTML to
include images, formatting, and other branding in the notification.
You can also use the following tokens to help customize the email notification. These tokens are variables that are
replaced by specific information in the notification that's sent.

TOKEN DESCRIPTION

%%AppliedActions%% The actions applied to the content.

%%ContentURL%% The URL of the document on the SharePoint Online site or


OneDrive for Business site.

%%MatchedConditions%% The conditions that were matched by the content. Use this
token to inform people of possible issues with the content.
Options for configuring policy tips
For each rule in a DLP policy, you can configure policy tips to:
Simply notify the person that the content conflicts with a DLP policy, so that they can take action to resolve
the conflict. You can use the default text (see the tables below ) or enter custom text about your
organization's specific policies.
Allow the person to override the DLP policy. Optionally, you can:
Require the person to enter a business justification for overriding the policy. This information is
logged and you can view it in the DLP reports in the Reports section of the Security & Compliance
Center.
Allow the person to report a false positive and override the DLP policy. This information is also
logged for reporting, so that you can use false positives to fine tune your rules.
For example, you may have a DLP policy applied to OneDrive for Business sites that detects personally
identifiable information (PII), and this policy has three rules:
1. First rule: If fewer than five instances of this sensitive information are detected in a document, and the
document is shared with people inside the organization, the Send a notification action displays a policy
tip. For policy tips, no override options are necessary because this rule is simply notifying people and not
blocking access.
2. Second rule: If greater than five instances of this sensitive information are detected in a document, and the
document is shared with people inside the organization, the Block access to content action restricts the
permissions for the file, and the Send a notification action allows people to override the actions in this
rule by providing a business justification. Your organization's business sometimes requires internal people
to share PII data, and you don't want your DLP policy to block this work.
3. Third rule: If greater than five instances of this sensitive information are detected in a document, and the
document is shared with people outside the organization, the Block access to content action restricts the
permissions for the file, and the Send a notification action does not allow people to override the actions
in this rule because the information is shared externally. Under no circumstances should people in your
organization be allowed to share PII data outside the organization.
Here are some fine points to understand about using a policy tip to override a rule:
The option to override is per rule, and it overrides all of the actions in the rule (except sending a
notification, which can't be overridden).
It's possible for content to match several rules in a DLP policy, but only the policy tip from the most
restrictive, highest-priority rule will be shown. For example, a policy tip from a rule that blocks access to
content will be shown over a policy tip from a rule that simply sends a notification. This prevents people
from seeing a cascade of policy tips.
If the policy tips in the most restrictive rule allow people to override the rule, then overriding this rule also
overrides any other rules that the content matched.

Policy tips on OneDrive for Business sites and SharePoint Online sites
When a document on a OneDrive for Business site or SharePoint Online site matches a rule in a DLP policy, and
that rule uses policy tips, the policy tips display special icons on the document:
1. If the rule sends a notification about the file, the warning icon appears.
2. If the rule blocks access to the document, the blocked icon appears.

To take action on a document, you can select an item > choose Information in the upper-right corner of the
page to open the details pane > View policy tip.
The policy tip lists the issues with the content, and if the policy tips are configured with these options, you can
choose Resolve, and then Override the policy tip or Report a false positive.
DLP policies are synced to sites and contented is evaluated against them periodically and asynchronously, so
there may be a short delay between the time you create the DLP policy and the time you begin to see policy tips.
There may be a similar delay from when you resolve or override a policy tip to when the icon on the document on
the site goes away.
Default text for policy tips on sites
By default, policy tips display text similar to the following for an item on a site. The notification text is configured
separately for each rule, so the text that's displayed differs depending on which rule is matched.

IF THE DLP POLICY RULE DOES THIS… THEN THE DEFAULT POLICY TIP SAYS THIS…

Sends a notification but doesn't allow override This item conflicts with a policy in your organization.

Blocks access, sends a notification, and allows override This item conflicts with a policy in your organization. If you
don't resolve this conflict, access to this file might be blocked.

Blocks access and sends a notification This item conflicts with a policy in your organization. Access to
this item is blocked for everyone except its owner, last
modifier, and the primary site collection administrator.

Custom text for policy tips on sites


You can customize the text for policy tips separately from the email notification. Unlike custom text for email
notifications (see above section), custom text for policy tips does not accept HTML or tokens. Instead, custom text
for policy tips is plain text only with a 256-character limit.

Policy tips in Outlook on the web and Outlook 2013 and later
When you compose a new email in Outlook on the web and Outlook 2013 and later, you'll see a policy tip if you
add content that matches a rule in a DLP policy, and that rule uses policy tips. The policy tip appears at the top of
the message, above the recipients, while the message is being composed.

Policy tips work whether the sensitive information appears in the message body, subject line, or even a message
attachment as shown here.

If the policy tips are configured to allow override, you can choose Show Details > Override > enter a business
justification or report a false positive > Override.
Note that when you add sensitive information to an email, there may be latency between when the sensitive
information is added and when the policy tip appears.
Outlook 2013 and later supports showing policy tips for only some conditions
Currently, Outlook 2013 and later supports showing policy tips only for these conditions:
Content contains
Content is shared
We're currently working on support for showing policy tips for additional conditions. These include:
Any email attachment's content could not be scanned
Any email attachment's content didn't complete scanning
Attachment file extension is
Attachment is password protected
Document property is
Recipient domain is
Sender IP address is
Note that all of these conditions work in Outlook, where they will match content and enforce protective actions on
content. But showing policy tips to users is not yet supported.
Policy tips in the Exchange Admin Center vs. the Office 365 Security & Compliance Center
Policy tips can work either with DLP policies and mail flow rules created in the Exchange Admin Center, or with
DLP policies created in the Office 365 Security & Compliance Center, but not both. This is because these policies
are stored in different locations, but policy tips can draw only from a single location.
If you've configured policy tips in the Exchange Admin Center, any policy tips that you configure in the Office 365
Security & Compliance Center won't appear to users in Outlook on the web and Outlook 2013 and later until you
turn off the tips in the Exchange Admin Center. This ensures that your current Exchange transport rules will
continue to work until you choose to switch over to the Office 365 Security & Compliance Center.
Note that while policy tips can draw only from a single location, email notifications are always sent, even if you're
using DLP policies in both the Office 365 Security & Compliance Center and the Exchange Admin Center.
Default text for policy tips in email
By default, policy tips display text similar to the following for email.

IF THE DLP POLICY RULE DOES THIS… THEN THE DEFAULT POLICY TIP SAYS THIS…

Sends a notification but doesn't allow override Your email conflicts with a policy in your organization.

Blocks access, sends a notification, and allows override Your email conflicts with a policy in your organization.

Blocks access and sends a notification Your email conflicts with a policy in your organization.

Policy tips in Excel 2016, PowerPoint 2016, and Word 2016


When people work with sensitive content in the desktop versions of Excel 2016, PowerPoint 2016, and Word
2016, policy tips can notify them in real time that the content conflicts with a DLP policy. This requires that:
The Office document is stored on a OneDrive for Business site or SharePoint Online site.
The site is included in a DLP policy that's configured to use policy tips.
These Office 2016 desktop programs automatically sync DLP policies directly from Office 365, and then scan
your documents to ensure that they don't conflict with your DLP policies and display policy tips in real time.
Depending on how you configure the policy tips in the DLP policy, people can choose to simply ignore the policy
tip, override the policy with or without a business justification, or report a false positive.
Policy tips appear on the Message Bar.

And policy tips also appear in the Backstage view (on the File tab).
If policy tips in the DLP policy are configured with these options, you can choose Resolve to Override a policy tip
or Report a false positive.

In each of these Office 2016 desktop programs, people can choose to turn off policy tips. If turned off, policy tips
that are simple notifications will not appear on the Message Bar or Backstage view (on the File tab). However,
policy tips about blocking and overriding will still appear, and they will still receive the email notification. In
addition, turning off policy tips does not exempt the document from any DLP policies that have been applied to it.
Default text for policy tips in Excel 2016, PowerPoint 2016, and Word 2016
By default, policy tips display text similar to the following on the Message Bar and Backstage view of an open
document. The notification text is configured separately for each rule, so the text that's displayed differs
depending on which rule is matched.

IF THE DLP POLICY RULE DOES THIS… THEN THE DEFAULT POLICY TIP SAYS THIS…

Sends a notification but doesn't allow override This file conflicts with a policy in your organization. Go to the
File menu for more information.

Blocks access, sends a notification, and allows override This file conflicts with a policy in your organization. If you
don't resolve this conflict, access to this file might be blocked.
Go to the File menu for more information.

Blocks access and sends a notification This file conflicts with a policy in your organization. If you
don't resolve this conflict, access to this file might be blocked.
Go to the File menu for more information.

Custom text for policy tips in Excel 2016, PowerPoint 2016, and Word 2016
You can customize the text for policy tips separately from the email notification. Unlike custom text for email
notifications (see above section), custom text for policy tips does not accept HTML or tokens. Instead, custom text
for policy tips is plain text only with a 256-character limit.

More information
Overview of data loss prevention policies
Create a DLP policy from a template
Create a DLP policy to protect documents with FCI or other properties
What the DLP policy templates include
What the sensitive information types look for
What the DLP policy templates include
8/21/2018 • 28 minutes to read • Edit Online

Data loss prevention (DLP ) in the Office 365 Security & Compliance Center includes ready-to-use policy
templates that address common compliance requirements, such as helping you to protect sensitive information
subject to the U.S. Health Insurance Act (HIPAA), U.S. Gramm-Leach-Bliley Act (GLBA), or U.S. Patriot Act. This
topic lists all of the policy templates, what types of sensitive information they look for, and what the default
conditions and actions are. This topic does not include every detail of how each policy template is configured;
instead, the topic presents with you enough information to help you decide which template is the best starting
point for your scenario. Remember, you can customize these policy templates to meet your specific requirements.

Australia Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Australia Financial: Scan content shared Content contains sensitive information: Send a notification
outside - low count SWIFT Code — Min count 1, Max count
9
Australia Tax File Number — Min count
1, Max count 9
Australia Bank Account Number — Min
count 1, Max count 9
Credit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

Australia Financial: Scan content shared Content contains sensitive information: Block access to content
outside - high count SWIFT Code — Min count 10, Max Send a notification
count any Allow override
Australia Tax File Number — Min count Require business justification
10, Max count any Send incident report
Australia Bank Account Number — Min
count 10, Max count any
Credit Card Number — Min count 10,
Max count any
Content is shared with:
People outside my organization

Australia Health Records Act (HRIP Act)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Australia HRIP: Scan content shared Content contains sensitive information: Send a notification
outside - low count Australia Tax File Number — Min count
1, Max count 9
Australia Medical Account Number —
Min count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Australia HRIP: Scan content shared Content contains sensitive information: Block access to content
outside - high count Australia Tax File Number — Min count Send a notification
10, Max count any Allow override
Australia Medical Account Number — Require business justification
Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Australia Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Australia PII: Scan content shared Content contains sensitive information: Send a notification
outside - low count Australia Tax File Number — Min count
1, Max count 9
Australia Driver's License Number —
Min count 1, Max count 9
Content is shared with:
People outside my organization

Australia PII: Scan content shared Content contains sensitive information: Block access to content
outside - high count Australia Tax File Number — Min count Send a notification
10, Max count any Allow override
Australia Driver's License Number — Require business justification
Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Australia Privacy Act


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Australia Privacy: Scan content shared Content contains sensitive information: Send a notification
outside - low count Australia Driver's License Number —
Min count 1, Max count 9
Australia Passport Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization

Australia Privacy: Scan content shared Content contains sensitive information: Block access to content
outside - high count Australia Driver's License Number — Send a notification
Min count 10, Max count any Allow override
Australia Passport Number — Min Require business justification
count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Canada Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada Financial Data: Scan content Content contains sensitive information: Send a notification
shared outside - low count Credit Card Number — Min count 1,
Max count 9
Canada Bank Account Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization

Canada Financial Data: Scan content Content contains sensitive information: Block access to content
shared outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
Canada Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Canada Health Information Act (HIA)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada HIA: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Passport Number — Min count
1, Max count 9
Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Canada HIA: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Passport Number — Min count Send a notification
10, Max count any Allow override
Canada Social Insurance Number — Require business justification
Min count 10, Max count any Send incident report
Canada Health Service Number — Min
count 10, Max count any
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization

Canada Personal Health Act (PHIPA) - Ontario


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PHIPA: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Passport Number — Min count
1, Max count 9
Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Canada PHIPA: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Passport Number — Min count Send a notification
10, Max count any Allow override
Canada Social Insurance Number — Require business justification
Min count 10, Max count any Send incident report
Canada Health Service Number — Min
count 10, Max count any
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization

Canada Personal Health Information Act (PHIA) - Manitoba


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PHIA: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Canada PHIA: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Social Insurance Number — Send a notification
Min count 10, Max count any Allow override
Canada Health Service Number — Min Require business justification
count 10, Max count any Send incident report
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization

Canada Personal Information Protection Act (PIPA)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PIPA: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Passport Number — Min count
1, Max count 9
Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Canada PIPA: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Passport Number — Min count Send a notification
10, Max count any Allow override
Canada Social Insurance Number — Require business justification
Min count 10, Max count any Send incident report
Canada Health Service Number — Min
count 10, Max count any
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization

Canada Personal Information Protection Act (PIPEDA)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PIPEDA: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Driver's License Number —
Min count 1, Max count 9
Canada Bank Account Number — Min
count 1, Max count 9
Canada Passport Number — Min count
1, Max count 9
Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PIPEDA: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Driver's License Number — Send a notification
Min count 10, Max count any Allow override
Canada Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
Canada Passport Number — Min count
10, Max count any
Canada Social Insurance Number —
Min count 10, Max count any
Canada Health Service Number — Min
count 10, Max count any
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization

Canada Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Canada PII: Scan content shared Content contains sensitive information: Send a notification
outside - low count Canada Driver's License Number —
Min count 1, Max count 9
Canada Bank Account Number — Min
count 1, Max count 9
Canada Passport Number — Min count
1, Max count 9
Canada Social Insurance Number —
Min count 1, Max count 9
Canada Health Service Number — Min
count 1, Max count 9
Canada Personal Health Identification
Number (PHIN) — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Canada PII: Scan content shared Content contains sensitive information: Block access to content
outside - high count Canada Driver's License Number — Send a notification
Min count 10, Max count any Allow override
Canada Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
Canada Passport Number — Min count
10, Max count any
Canada Social Insurance Number —
Min count 10, Max count any
Canada Health Service Number — Min
count 10, Max count any
Canada Personal Health Identification
Number (PHIN) — Min count 10, Max
count any
Content is shared with:
People outside my organization
France Data Protection Act
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

France DPA: Scan content shared Content contains sensitive information: Send a notification
outside - low count France National ID Card (CNI) — Min
count 1, Max count 9
France Social Security Number (INSEE)
— Min count 1, Max count 9
Content is shared with:
People outside my organization

France DPA: Scan content shared Content contains sensitive information: Block access to content
outside - high count France National ID Card (CNI) — Min Send a notification
count 10, Max count any Allow override
France Social Security Number (INSEE) Require business justification
— Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

France Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

France Financial: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
EU Debit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

France Financial: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
EU Debit Card Number — Min count Require business justification
10, Max count any Send incident report
Content is shared with:
People outside my organization

France Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

France PII: Scan content shared outside Content contains sensitive information: Send a notification
- low count France Social Security Number (INSEE)
— Min count 1, Max count 9
France Driver's License Number — Min
count 1, Max count 9
France Passport Number — Min count
1, Max count 9
France National ID Card (CNI) — Min
count 1, Max count 9
Content is shared with:
People outside my organization

France PII: Scan content shared outside Content contains sensitive information: Block access to content
- high count France Social Security Number (INSEE) Send a notification
— Min count 10, Max count any Allow override
France Driver's License Number — Min Require business justification
count 10, Max count any Send incident report
France Passport Number — Min count
10, Max count any
France National ID Card (CNI) — Min
count 10, Max count any
Content is shared with:
People outside my organization

General Data Protection Regulation (GDPR)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Low volume EU Sensitive content found Content contains sensitive information: Send incident reports to Administrator
EU Debit Card Number — Min count 1,
Max count 9
EU Driver's License Number — Min
count 1, Max count 9
EU National Identification Number —
Min count 1, Max count 9
EU Passport Number — Min count 1,
Max count 9
EU Social Security Number (SSN) or
Equivalent ID — Min count 1, Max
count 9
EU Tax Identification Number (TIN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

High volume of EU Sensitive content Content contains sensitive information: Restrict access to the content for
found EU Debit Card Number — Min count 1, external users
Max count 9 Notify users with email and policy tips
EU Driver's License Number — Min Allow override
count 1, Max count 9 Require business justification
EU National Identification Number — Send incident reports to Administrator
Min count 1, Max count 9
EU Passport Number — Min count 1,
Max count 9
EU Social Security Number (SSN) or
Equivalent ID — Min count 1, Max
count 9
EU Tax Identification Number (TIN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization

Germany Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Germany Financial Data: Scan content Content contains sensitive information: Send a notification
shared outside - low count Credit Card Number — Min count 1,
Max count 9
EU Debit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

Germany Financial Data: Scan content Content contains sensitive information: Block access to content
shared outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
EU Debit Card Number — Min count Require business justification
10, Max count any Send incident report
Content is shared with:
People outside my organization

Germany Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Germany PII: Scan content shared Content contains sensitive information: Send a notification
outside - low count German Driver's License Number —
Min count 1, Max count 9
German Passport Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Germany PII: Scan content shared Content contains sensitive information: Block access to content
outside - high count German Driver's License Number — Send a notification
Min count 10, Max count any Allow override
German Passport Number — Min Require business justification
count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Israel Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Israel Financial Data: Scan content Content contains sensitive information: Send a notification
shared outside - low count Israel Bank Account Number — Min
count 1, Max count 9
SWIFT Code — Min count 1, Max count
9
Credit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

Israel Financial Data: Scan content Content contains sensitive information: Block access to content
shared outside - high count Israel Bank Account Number — Min Send a notification
count 10, Max count any Allow override
SWIFT Code — Min count 10, Max Require business justification
count any Send incident report
Credit Card Number — Min count 10,
Max count any
Content is shared with:
People outside my organization

Israel Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Israel PII: Scan content shared outside - Content contains sensitive information: Send a notification
low count Israel National ID — Min count 1, Max
count 9
Content is shared with:
People outside my organization

Israel PII: Scan content shared outside - Content contains sensitive information: Block access to content
high count Israel National ID — Min count 10, Max Send a notification
count any Allow override
Content is shared with: Require business justification
People outside my organization Send incident report

Israel Protection of Privacy


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Israel Privacy: Scan content shared Content contains sensitive information: Send a notification
outside - low count Israel National ID — Min count 1, Max
count 9
Israel Bank Account Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization

Israel Privacy: Scan content shared Content contains sensitive information: Block access to content
outside - high count Israel National ID — Min count 10, Max Send a notification
count any Allow override
Israel Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Japan Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Japan Financial: Scan content shared Content contains sensitive information: Send a notification
outside - low count Japan Bank Account Number — Min
count 1, Max count 9
Credit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

Japan Financial: Scan content shared Content contains sensitive information: Block access to content
outside - high count Japan Bank Account Number — Min Send a notification
count 10, Max count any Allow override
Credit Card Number — Min count 10, Require business justification
Max count any Send incident report
Content is shared with:
People outside my organization

Japan Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Japan PII: Scan content shared outside Content contains sensitive information: Send a notification
- low count Japan Resident Registration Number —
Min count 1, Max count 9
Japan Social Insurance Number (SIN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Japan PII: Scan content shared outside Content contains sensitive information: Block access to content
- high count Japan Resident Registration Number — Send a notification
Min count 10, Max count any Allow override
Japan Social Insurance Number (SIN) — Require business justification
Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Japan Protection of Personal Information


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Japan PPI: Scan content shared outside Content contains sensitive information: Send a notification
- low count Japan Resident Registration Number —
Min count 1, Max count 9
Japan Social Insurance Number (SIN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization

Japan PPI: Scan content shared outside Content contains sensitive information: Block access to content
- high count Japan Resident Registration Number — Send a notification
Min count 10, Max count any Allow override
Japan Social Insurance Number (SIN) — Require business justification
Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

PCI Data Security Standard (PCI DSS)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

PCI DSS: Scan content shared outside - Content contains sensitive information: Send a notification
low count Credit Card Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

PCI DSS: Scan content shared outside - Content contains sensitive information: Block access to content
high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
Content is shared with: Require business justification
People outside my organization Send incident report

Saudi Arabia - Anti-Cyber Crime Law


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Saudi Arabia ACC: Scan content shared Content contains sensitive information: Send a notification
outside - low count SWIFT Code — Min count 1, Max count
9
International Banking Account Number
(IBAN) — Min count 1, Max count 9
Content is shared with:
People outside my organization

Saudi Arabia ACC: Scan content shared Content contains sensitive information: Block access to content
outside - high count SWIFT Code — Min count 10, Max Send a notification
count any Allow override
International Banking Account Number Require business justification
(IBAN) — Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

Saudi Arabia Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Saudi Arabia Financial: Scan content Content contains sensitive information: Send a notification
shared outside - low count Credit Card Number — Min count 1,
Max count 9
SWIFT Code — Min count 1, Max count
9
International Banking Account Number
(IBAN) — Min count 1, Max count 9
Content is shared with:
People outside my organization

Saudi Arabia Financial: Scan content Content contains sensitive information: Block access to content
shared outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
SWIFT Code — Min count 10, Max Require business justification
count any Send incident report
International Banking Account Number
(IBAN) — Min count 10, Max count any
Content is shared with:
People outside my organization

Saudi Arabia Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Saudi Arabia PII: Scan content shared Content contains sensitive information: Send a notification
outside - low count Saudi Arabia National ID — Min count
1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Saudi Arabia PII: Scan content shared Content contains sensitive information: Block access to content
outside - high count Saudi Arabia National ID — Min count Send a notification
10, Max count any Allow override
Content is shared with: Require business justification
People outside my organization Send incident report

U.K. Access to Medical Reports Act


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. AMRA: Scan content shared Content contains sensitive information: Send a notification
outside - low count U.K. National Health Service Number —
Min count 1, Max count 9
U.K. National Insurance Number (NINO)
— Min count 1, Max count 9
Content is shared with:
People outside my organization

U.K. AMRA: Scan content shared Content contains sensitive information: Block access to content
outside - high count U.K. National Health Service Number — Send a notification
Min count 10, Max count any Allow override
U.K. National Insurance Number (NINO) Require business justification
— Min count 10, Max count any Send incident report
Content is shared with:
People outside my organization

U.K. Data Protection Act


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. DPA: Scan content shared outside Content contains sensitive information: Send a notification
- low count U.K. National Insurance Number (NINO)
— Min count 1, Max count 9
U.S. / U.K. Passport Number — Min
count 1, Max count 9
SWIFT Code — Min count 1, Max count
9
Content is shared with:
People outside my organization

U.K. DPA: Scan content shared outside Content contains sensitive information: Block access to content
- high count U.K. National Insurance Number (NINO) Send a notification
— Min count 10, Max count any Allow override
U.S. / U.K. Passport Number — Min Require business justification
count 10, Max count any Send incident report
SWIFT Code — Min count 10, Max
count any
Content is shared with:
People outside my organization
U.K. Financial Data
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. Financial: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
EU Debit Card Number — Min count 1,
Max count 9
SWIFT Code —Min count 1, Max count
9
Content is shared with:
People outside my organization

U.K. Financial: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
EU Debit Card Number — Min count Require business justification
10, Max count any Send incident report
SWIFT Code — Min count 10, Max
count any
Content is shared with:
People outside my organization

U.K. Personal Information Online Code of Practice (PIOCP)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. PIOCP: Scan content shared Content contains sensitive information: Send a notification
outside - low count U.K. National Insurance Number (NINO)
— Min count 1, Max count 9
U.K. National Health Service Number —
Min count 1, Max count 9
SWIFT Code — Min count 1, Max count
9
Content is shared with:
People outside my organization

U.K. PIOCP: Scan content shared Content contains sensitive information: Block access to content
outside - high count U.K. National Insurance Number (NINO) Send a notification
— Min count 10, Max count any Allow override
U.K. National Health Service Number — Require business justification
Min count 10, Max count any Send incident report
SWIFT Code — Min count 10, Max
count any
Content is shared with:
People outside my organization

U.K. Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. PII: Scan content shared outside - Content contains sensitive information: Send a notification
low count U.K. National Insurance Number (NINO)
— Min count 1, Max count 9
U.S. / U.K. Passport Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization

U.K. PII: Scan content shared outside - Content contains sensitive information: Block access to content
high count U.K. National Insurance Number (NINO) Send a notification
— Min count 10, Max count any Allow override
U.S. / U.K. Passport Number — Min Require business justification
count 10, Max count any Send incident report
Content is shared with:
People outside my organization

U.K. Privacy and Electronic Communications Regulations


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.K. PECR: Scan content shared outside Content contains sensitive information: Send a notification
- low count SWIFT Code — Min count 1, Max count
9
Content is shared with:
People outside my organization

U.K. PECR: Scan content shared outside Content contains sensitive information: Block access to content
- high count SWIFT Code — Min count 10, Max Send a notification
count any Allow override
Content is shared with: Require business justification
People outside my organization Send incident report

U.S. Federal Trade Commission (FTC) Consumer Rules


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. FTC Rules: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
U.S. Bank Account Number — Min
count 1, Max count 9
ABA Routing Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. FTC Rules: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
U.S. Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
ABA Routing Number — Min count 10,
Max count any
Content is shared with:
People outside my organization

U.S. Financial Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. Financial: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
U.S. Bank Account Number — Min
count 1, Max count 9
ABA Routing Number — Min count 1,
Max count 9
Content is shared with:
People outside my organization

U.S. Financial: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
U.S. Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
ABA Routing Number — Min count 10,
Max count any
Content is shared with:
People outside my organization

U.S. Gramm-Leach-Bliley Act (GLBA)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. GLBA: Scan content shared outside Content contains sensitive information: Send a notification
- low count Credit Card Number — Min count 1,
Max count 9
U.S. Bank Account Number — Min
count 1, Max count 9
U.S. Individual Taxpayer Identification
Number (ITIN) — Min count 1, Max
count 9
U.S. Social Security Number (SSN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. GLBA: Scan content shared outside Content contains sensitive information: Block access to content
- high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
U.S. Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
U.S. Individual Taxpayer Identification
Number (ITIN) — Min count 10, Max
count any
U.S. Social Security Number (SSN) —
Min count 10, Max count any
Content is shared with:
People outside my organization

U.S. Health Insurance Act (HIPAA)


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

Content matches U.S. HIPAA Contains any of the following sensitive Send a notification
information:
U.S. Social Security Number (SSN) —
Min count 1, Max count any
Drug Enforcement Agency (DEA)
Number — Min count 1, Max count
any
AND
Content contains any of these terms:
International Classification of Diseases
(ICD-9-CM) — Min count 1, Max count
any
International Classification of Diseases
(ICD-10-CM) — Min count 1, Max
count any
Content is shared with:
People outside my organization

U.S. Patriot Act


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. Patriot Act: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
U.S. Bank Account Number — Min
count 1, Max count 9
U.S. Individual Taxpayer Identification
Number (ITIN) — Min count 1, Max
count 9
U.S. Social Security Number (SSN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. Patriot Act: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
U.S. Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
U.S. Individual Taxpayer Identification
Number (ITIN) — Min count 10, Max
count any
U.S. Social Security Number (SSN) —
Min count 10, Max count any
Content is shared with:
People outside my organization

U.S. Personally Identifiable Information (PII) Data


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. PII: Scan content shared outside - Content contains sensitive information: Send a notification
low count U.S. Individual Taxpayer Identification
Number (ITIN) — Min count 1, Max
count 9
U.S. Social Security Number (SSN) —
Min count 1, Max count 9
U.S. / U.K. Passport Number — Min
count 1, Max count 9
Content is shared with:
People outside my organization

U.S. PII: Scan content shared outside - Content contains sensitive information: Block access to content
high count U.S. Individual Taxpayer Identification Send a notification
Number (ITIN) — Min count 10, Max Allow override
count any Require business justification
U.S. Social Security Number (SSN) — Send incident report
Min count 10, Max count any
U.S. / U.K. Passport Number — Min
count 10, Max count any
Content is shared with:
People outside my organization

U.S. State Breach Notification Laws


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS
CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. State Breach: Scan content shared Content contains sensitive information: Send a notification
outside - low count Credit Card Number — Min count 1,
Max count 9
U.S. Bank Account Number — Min
count 1, Max count 9
U.S. Driver's License Number — Min
count 1, Max count 9
U.S. Social Security Number (SSN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization

U.S. State Breach: Scan content shared Content contains sensitive information: Block access to content
outside - high count Credit Card Number — Min count 10, Send a notification
Max count any Allow override
U.S. Bank Account Number — Min Require business justification
count 10, Max count any Send incident report
U.S. Driver's License Number — Min
count 10, Max count any
U.S. Social Security Number (SSN) —
Min count 10, Max count any
Content is shared with:
People outside my organization

U.S. State Social Security Number Confidentiality Laws


CONDITIONS
(INCLUDING SENSITIVE INFORMATION
RULE NAME TYPES) ACTIONS

U.S. SSN Laws: Scan content shared Content contains sensitive information: Send a notification
outside - low count U.S. Social Security Number (SSN) —
Min count 1, Max count 9
Content is shared with:
People outside my organization

U.S. SSN Laws: Scan content shared Content contains sensitive information: Block access to content
outside - high count U.S. Social Security Number (SSN) — Send a notification
Min count 10, Max count any Allow override
Content is shared with: Require business justification
People outside my organization Send incident report
Create a DLP policy to protect documents with FCI
or other properties
8/24/2018 • 8 minutes to read • Edit Online

In Office 365, you can use a data loss prevention (DLP ) policy to identify, monitor, and protect sensitive
information. Many organizations already have a process to identify and classify sensitive information by using the
classification properties in Windows Server File Classification Infrastructure (FCI), the document properties in
SharePoint, or the document properties applied by a third-party system. If this describes your organization, you
can create a DLP policy in Office 365 that recognizes the properties that have been applied to documents by
Windows Server FCI or other system, so that the DLP policy can be enforced on Office documents with specific
FCI or other property values.

For example, your organization might use Windows Server FCI to identify documents with personally identifiable
information (PII) such as social security numbers, and then classify the document by setting the Personally
Identifiable Information property to High, Moderate, Low, Public, or Not PII based on the type and number
of occurrences of PII found in the document. In Office 365, you can create a DLP policy that identifies documents
that have that property set to specific values, such as High and Medium, and then takes an action such as
blocking access to those files. The same policy can have another rule that takes a different action if the property is
set to Low, such as sending an email notification. In this way, DLP in Office 365 integrates with Windows Server
FCI and can help protect Office documents uploaded or shared to Office 365 from Windows Server-based file
servers.
A DLP policy simply looks for a specific property name/value pair. Any document property can be used, as long as
the property has a corresponding managed property for SharePoint search. For example, a SharePoint site
collection might use a content type named Trip Report with a required field named Customer. Whenever a
person creates a trip report, they must enter the customer name. This property name/value pair can also be used
in a DLP policy — for example, if you want a rule that blocks access to the document for external users when the
Customer field contains Contoso.
Note that if you want to apply your DLP policy to content with specific Office 365 labels, you should not follow the
steps here. Instead, learn how to Using a label as a condition in a DLP policy.

Before you create the DLP policy


Before you can use a Windows Server FCI property or other property in a DLP policy, you need to create a
managed property in the SharePoint admin center. Here's why.
In SharePoint Online and OneDrive for Business, the search index is built up by crawling the content on your sites.
The crawler picks up content and metadata from the documents in the form of crawled properties. The search
schema helps the crawler decide what content and metadata to pick up. Examples of metadata are the author and
the title of a document. However, to get the content and metadata from the documents into the search index, the
crawled properties must be mapped to managed properties. Only managed properties are kept in the index. For
example, a crawled property related to author is mapped to a managed property related to author.
This is important because DLP in Office 365 uses the search crawler to identify and classify sensitive information
on your sites, and then store that sensitive information in a secure portion of the search index. When you upload a
document to Office 365, SharePoint automatically creates crawled properties based on the document properties.
But to use an FCI or other property in a DLP policy, that crawled property needs to be mapped to a managed
property so that content with that property is kept in the index.
For more information on search and managed properties, see Manage the search schema in SharePoint Online.
Step 1: Upload a document with the needed property to Office 365
You first need to upload a document with the property that you want to reference in your DLP policy. Office 365
will detect the property and automatically create a crawled property from it. In the next step, you'll create a
managed property, and then map the managed property to this crawled property.
Step 2: Create a managed property
1. Sign in to the Office 365 admin center.
2. In the left navigation, choose Admin centers > SharePoint. You're now in the SharePoint admin center.
3. In the left navigation, choose search > on the search administration page > Manage Search Schema.

4. On the Managed Properties page > New Managed Property.


5. Enter a name and description for the property. This name is what will appear in your DLP policies.
6. For Type, choose Text.
7. Under Main characteristics, select Queryable and Retrievable.
8. Under Mappings to crawled properties > Add a mapping.
9. In the crawled property selection dialog box > find and select the crawled property that corresponds to
the Windows Server FCI property or other property that you will use in your DLP policy > OK.
10. At the bottom of the page > OK.

Create a DLP policy that uses an FCI property or other property


In this example, an organization is using FCI on its Windows Server-based file servers; specifically, they're using
the FCI classification property named Personally Identifiable Information with possible values of High,
Moderate, Low, Public, and Not PII. Now they want to leverage their existing FCI classification in their DLP
policies in Office 365.
First, they follow the steps above to create a managed property in SharePoint Online, which maps to the crawled
property created automatically from the FCI property.
Next, they create a DLP policy with two rules that both use the condition Document properties contain any of
these values:
FCI PII content - High, Moderate The first rule restricts access to the document if the FCI classification
property Personally Identifiable Information equals High or Moderate and the document is shared
with people outside the organization.
FCI PII content - Low The second rule sends a notification to the document owner if the FCI classification
property Personally Identifiable Information equals Low and the document is shared with people
outside the organization.
Create the DLP policy by using PowerShell
Note that the condition Document properties contain any of these values is temporarily not available in the
UI of the Security & Compliance Center, but you can still use this condition by using PowerShell. You can use the
New\Set\Get-DlpCompliancePolicy cmdlets to work with a DLP policy, and use the New\Set\Get-DlpComplianceRule
cmdlets with the ContentPropertyContainsWords parameter to add the condition Document properties contain
any of these values.
For more information on these cmdlets, see Office 365 Security & Compliance Center cmdlets.
1. Connect to the Office 365 Security & Compliance Center using remote PowerShell
2. Create the policy by using New-DlpCompliancePolicy .
Here is a PowerShell example that creates a DLP policy that applies to all locations.

New-DlpCompliancePolicy -Name FCI_PII_policy -ExchangeLocation All -SharePointLocation All -


OneDriveLocation All -Mode Enable

3. Create the two rules described above by using New-DlpComplianceRule , where one rule is for the Low value,
and another rule is for the High and Moderate values.
Here is a PowerShell example that creates these two rules. Note that the property name/value pairs are
enclosed in quotation marks, and a property name may specify multiple values separated by commas with
no spaces, like "<Property1>:<Value1>,<Value2>","<Property2>:<Value3>,<Value4>"....

New-DlpComplianceRule -Name FCI_PII_content-High,Moderate -Policy FCI_PII_policy -AccessScope


NotInOrganization -BlockAccess $true -ContentPropertyContainsWords "Personally Identifiable
Information:High,Moderate" -Disabled $falseNew-DlpComplianceRule -Name FCI_PII_content-Low -Policy
FCI_PII_policy -AccessScope NotInOrganization -BlockAccess $false -ContentPropertyContainsWords
"Personally Identifiable Information:Low" -Disabled $false -NotifyUser Owner

Note that Windows Server FCI includes many built-in properties, including Personally Identifiable
Information used in this example. The possible values for each property can be different for every
organization. The High, Moderate, and Low values used here are only an example. For your organization,
you can view the Windows Server FCI classification properties with their possible values in the file Server
Resource Manager on the Windows Server-based file server. For more information, see Create a
classification property.
When you finish, your policy should have two new rules that both use the Document properties contain any of
these values condition. Note that this condition won't appear in the UI, though the other conditions, actions, and
settings will appear.
One rule blocks access to content where the Personally Identifiable Information property equals High or
Moderate. A second rule sends a notification about content where the Personally Identifiable Information
property equals Low.
After you create the DLP policy
Doing the steps in the previous sections will create a DLP policy that will quickly detect content with that property,
but only if that content is newly uploaded (so that the content's indexed), or if that content is old but just edited (so
that the content's re-indexed).
To detect content with that property everywhere, you may want to manually request that your library, site, or site
collection be re-indexed, so that the DLP policy is aware of all the content with that property. In SharePoint Online,
content is automatically crawled based on a defined crawl schedule. The crawler picks up content that has changed
since the last crawl and updates the index. If you need your DLP policy to protect content before the next
scheduled crawl, you can take these steps.
Cau t i on

Re-indexing a site can cause a massive load on the search system. Don't re-index your site unless your scenario
absolutely requires it.
For more information, see Manually request crawling and re-indexing of a site, a library or a list.
Re -index a site (optional)
1. On the site, choose Settings (gear icon in upper right) > Site Settings.
2. Under Search, choose Search and offline availability > Reindex site.

More information
Overview of data loss prevention policies
Create a DLP policy from a template
Send notifications and show policy tips for DLP policies
What the DLP policy templates include
Sensitive information types inventory
View the reports for data loss prevention
8/24/2018 • 3 minutes to read • Edit Online

After you create your data loss prevention (DLP ) policies, you'll want to verify that they're working as you
intended and helping you to stay compliant. With the DLP reports in the Office 365 Security & Compliance
Center, you can quickly view:
DLP policy matches This report shows the count of DLP policy matches over time. You can filter the
report by date, location, policy, or action. You can use this report to:
Tune or refine your DLP policies as you run them in test mode. You can view the specific rule that
matched the content.
Focus on specific time periods and understand the reasons for spikes and trends.
Discover business processes that violate your organization's DLP policies.
Understand any business impact of the DLP policies by seeing what actions are being applied to
content.
Verify compliance with a specific DLP policy by showing any matches for that policy.
View a list of top users and repeat users who are contributing to incidents in your organization.
View a list of the top types of sensitive information in your organization.
DLP incidents This report also shows policy matches over time, like the policy matches report. However,
the policy matches report shows matches at a rule level; for example, if an email matched three different
rules, the policy matches report shows three different line items. By contrast, the incidents report shows
matches at an item level; for example, if an email matched three different rules, the incidents report shows a
single line item for that piece of content.
Because the report counts are aggregated differently, the policy matches report is better for identifying
matches with specific rules and fine tuning DLP policies. The incidents report is better for identifying
specific pieces of content that are problematic for your DLP policies.
DLP false positives and overrides If your DLP policy allows users to override it or report a false positive,
this report shows a count of such instances over time. You can filter the report by date, location, or policy.
You can use this report to:
Tune or refine your DLP policies by seeing which policies incur a high number of false positives.
View the justifications submitted by users when they resolve a policy tip by overriding the policy.
Discover where DLP policies conflict with valid business processes by incurring a high number of
user overrides.
All DLP reports can show data from the most recent four-month time period. The most recent data can take up to
24 hours to appear in the reports.
You can find these reports in the Security & Compliance Center > Reports > Dashboard.
View the justification submitted by a user for an override
If your DLP policy allows users to override it, you can use the false positive and override report to view the text
submitted by users in the policy tip.

Take action on insights and recommendations


Reports can show insights and recommendations where you can click the red warning icon to see details about
potential issues and take possible remedial action.
Find the cmdlets for the DLP reports
To use most of the cmdlets for the Security & Compliance Center, you need to:
1. Connect to the Office 365 Security & Compliance Center using remote PowerShell
2. Use any of these Office 365 Security & Compliance Center cmdlets
However, DLP reports need pull data from across Office 365, including Exchange Online. For this reason, the
cmdlets for the DLP reports are available in Exchange Online Powershell—not in Security & Compliance Center
Powershell. Therefore, to use the cmdlets for the DLP reports, you need to:
1. Connect to Exchange Online using remote PowerShell
2. Use any of these cmdlets for the DLP reports:
Get-DlpDetectionsReport
Get-DlpDetailReport
Form a query to find sensitive data stored on sites
10/26/2018 • 5 minutes to read • Edit Online

Users often store sensitive data, such as credit card numbers, social security numbers, or personal, on their sites,
and over time this can expose an organization to significant risk of data loss. Documents stored on sites—including
OneDrive for Business sites—could be shared with people outside the organization who shouldn't have access to
the information. With data loss prevention (DLP ) in SharePoint Online, you can discover documents that contain
sensitive data throughout your tenant. After discovering the documents, you can work with the document owners
to protect the data. This topic can help you form a query to search for sensitive data.

NOTE
Electronic discovery, or eDiscovery, and DLP are premium features that require SharePoint Online Plan 2.

Forming a basic DLP query


There are three parts that make up a basic DLP query: SensitiveType, count range, and confidence range. As
illustrated in the following graphic, SensitiveType:"<type>" is required, and both**|<count range>** and**|
<confidence range>** are optional.

Sensitive type - required


So what is each part? SharePoint DLP queries typically begin with the property SensitiveType:" and an
information type name from the sensitive information types inventory, and end with a " . You can also use the
name of a custom sensitive information type that you created for your organization. For example, you might be
looking for documents that contain credit card numbers. In such an instance, you'd use the following format:
SensitiveType:"Credit Card Number" . Because you didn't include count range or confidence range, the query
returns every document in which a credit card number is detected. This is the simplest query that you can run, and
it returns the most results. Keep in mind that the spelling and spacing of the sensitive type matters.
Ranges - optional
Both of the next two parts are ranges, so let's quickly examine what a range looks like. In SharePoint DLP queries, a
basic range is represented by two numbers separated by two periods, which looks like this: [number]..[number] .
For instance, if 10..20 is used, that range would capture numbers from 10 through 20. There are many different
range combinations and several are covered in this topic.
Let's add a count range to the query. You can use count range to define the number of occurrences of sensitive
information a document needs to contain before it's included in the query results. For example, if you want your
query to return only documents that contain exactly five credit card numbers, use this:
SensitiveType:"Credit Card Number|5" . Count range can also help you identify documents that pose high degrees
of risk. For example, your organization might consider documents with five or more credit card numbers a high
risk. To find documents fitting this criterion, you would use this query: SensitiveType:"Credit Card Number|5.." .
Alternatively, you can find documents with five or fewer credit card numbers by using this query:
SensitiveType:"Credit Card Number|..5" .
Confidence range
Finally, confidence range is the level of confidence that the detected sensitive type is actually a match. The values
for confidence range work similarly to count range. You can form a query without including a count range. For
example, to search for documents with any number of credit card numbers—as long as the confidence range is 85
percent or higher—you would use this query: SensitiveType:"Credit Card Number|*|85.." .

IMPORTANT
The asterisk ( * ) is a wildcard character that means any value works. You can use the wildcard character ( * ) either in the
count range or in the confidence range, but not in a sensitive type.

Additional query properties and search operators available in the eDiscovery Center
DLP in SharePoint also introduces the LastSensitiveContentScan property, which can help you search for files
scanned within a specific timeframe. For query examples with the LastSensitiveContentScan property, see the
Examples of complex queries in the next section.
You can use not only DLP -specific properties to create a query, but also standard SharePoint eDiscovery search
properties such as Author or FileExtension . You can use operators to build complex queries. For the list of
available properties and operators, see the Using Search Properties and Operators with eDiscovery blog post.

Examples of complex queries


The following examples use different sensitive types, properties, and operators to illustrate how you can refine
your queries to find exactly what you're looking for.

QUERY EXPLANATION

SensitiveType:"International Banking Account Number The name might seem strange because it's so long, but it's the
(IBAN)" correct name for that sensitive type. Make sure to use exact
names from the sensitive information types inventory. You can
also use the name of a custom sensitive information type that
you created for your organization.

SensitiveType:"Credit Card This returns documents with at least one match to the
Number|1..4294967295|1..100" sensitive type "Credit Card Number." The values for each
range are the respective minimum and maximum values. A
simpler way to write this query is
SensitiveType:"Credit Card Number" , but where's the fun
in that?

SensitiveType:"Credit Card Number| 5..25" AND This returns documents with 5-25 credit card numbers that
LastSensitiveContentScan:"8/11/2018..8/13/2018" were scanned from August 11, 2018 through August 13,
2018.

SensitiveType:"Credit Card Number| 5..25" AND This returns documents with 5-25 credit card numbers that
LastSensitiveContentScan:"8/11/2018..8/13/2018" NOT were scanned from August 11, 2018 through August 13,
FileExtension:XLSX
2018. Files with an XLSX extension aren't included in the query
results. FileExtension is one of many properties that you
can include in a query. For more information, see Using Search
Properties and Operators with eDiscovery.

SensitiveType:"Credit Card Number" OR This returns documents that contain either a credit card
SensitiveType:"U.S. Social Security Number (SSN)" number or a social security number.
Examples of queries to avoid
Not all queries are created equal. The following table gives examples of queries that don't work with DLP in
SharePoint and describes why.

UNSUPPORTED QUERY REASON

SensitiveType:"Credit Card You must add at least one number.


Number|.."

SensitiveType:"NotARule" "NotARule" isn't a valid sensitive type


name. Only names in the sensitive
information types inventory work in
DLP queries.

SensitiveType:"Credit Card Zero isn't valid as either the minimum


Number|0" value or the maximum value in a range.

SensitiveType:"Credit Card It's might be difficult to see, but there's


Number" extra white space between "Credit" and
"Card" that makes the query invalid.
Use exact sensitive type names from the
sensitive information types inventory.

SensitiveType:"Credit Card The two-period portion shouldn't be


Number|1. .3" separated by a space.

SensitiveType:"Credit Card There are too many pipe delimiters ( ). Follow this format instead:
Number| |1..|80.." SensitiveType: "Credit Card
Number|1..|80.."

SensitiveType:"Credit Card Because confidence values represent a


Number|1..|80..101" percentage, they can't exceed 100.
Choose a number from 1 through 100
instead.

For more information


What the sensitive information types look for
Run a Content Search in the Office 365 Security & Compliance Center
Keyword queries and search conditions for Content Search
How DLP works between the Security & Compliance
Center and Exchange Admin Center
8/21/2018 • 2 minutes to read • Edit Online

In Office 365, you can create a data loss prevention (DLP ) policy in two different admin centers:
In the Security & Compliance Center, you can create a single DLP policy to help protect content in
SharePoint, OneDrive, and Exchange. When possible, we recommend that you create a DLP policy here. For
more information, see DLP in the Security & Compliance Center.
In the Exchange Admin Center, you can create a DLP policy to help protect content only in Exchange. This
policy can use Exchange transport rules, so it has more options specific to handling email. For more
information, see DLP in the Exchange Admin Center.
DLP polices created in these admin centers work side by side - this topic explains how.

How DLP in the Security & Compliance Center works with DLP and
transport rules in the Exchange Admin Center
After you create a DLP policy in the Security & Compliance Center, the policy is deployed to all of the locations
included in the policy. If the policy includes Exchange Online, the policy's synced there and enforced in exactly the
same way as a DLP policy created in the Exchange admin center.
If you've created DLP policies in the Exchange admin center, those policies will continue to work side by side with
any policies for email that you create in the Security & Compliance Center. But note that rules created in the
Exchange admin center take precedence. All Exchange transport rules are processed first, and then the DLP rules
from the Security & Compliance Center are processed.
This means that:
Messages that are blocked by Exchange transport rules won't get scanned by DLP rules created in the
Security & Compliance Center.
If an Exchange transport rule modifies a message in a way that causes it to match a DLP policy in the
Security & Compliance Center - such as adding external users - then the DLP rules will detect this and
enforce the policy as needed.
Also note that Exchange transport rules that use the "stop processing" action don't affect the processing of DLP
rules in the Security & Compliance Center - they'll still be processed.

Policy tips in the Security & Compliance Center vs. the Exchange
Admin Center
Policy tips can work either with DLP policies and mail flow rules created in the Exchange Admin Center, or with
DLP policies created in the Security & Compliance Center, but not both. This is because these policies are stored in
different locations, but policy tips can draw only from a single location.
If you've configured policy tips in the Exchange Admin Center, any policy tips that you configure in the Security &
Compliance Center won't appear to users in Outlook on the web and Outlook 2013 and later until you turn off the
tips in the Exchange Admin Center. This ensures that your current Exchange transport rules will continue to work
until you choose to switch over to the Security & Compliance Center.
Note that while policy tips can draw only from a single location, email notifications are always sent, even if you're
using DLP policies in both the Security & Compliance Center and the Exchange Admin Center.
What the sensitive information types look for
12/7/2018 • 68 minutes to read • Edit Online

Data loss prevention (DLP ) in the Office 365 Security & Compliance Center includes many sensitive
information types that are ready for you to use in your DLP policies. This topic lists all of these sensitive
information types and shows what a DLP policy looks for when it detects each type. A sensitive information
type is defined by a pattern that can be identified by a regular expression or a function. In addition,
corroborative evidence such as keywords and checksums can be used to identify a sensitive information type.
Confidence level and proximity are also used in the evaluation process.

ABA Routing Number


Format
9 digits which may be in a formatted or unformatted pattern
Pattern
Formatted:
Four digits beginning with 0, 1, 2, 3, 6, 7, or 8
A hyphen
Four digits
A hyphen
A digit
Unformatted: 9 consecutive digits beginning with 0, 1, 2, 3, 6, 7, or 8
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_aba_routing finds content that matches the pattern.
A keyword from Keyword_ABA_Routing is found.

<!-- ABA Routing Number -->


<Entity id="cb353f78-2b72-4c3c-8827-92ebe4f69fdf" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_aba_routing" />
<Match idRef="Keyword_ABA_Routing" />
</Pattern>
</Entity>

Keywords
Keyword_ABA_Routing
aba
aba #
aba routing #
aba routing number
aba#
abarouting#
aba number
abaroutingnumber
american bank association routing #
american bank association routing number
americanbankassociationrouting#
americanbankassociationroutingnumber
bank routing number
bankrouting#
bankroutingnumber
routing transit number
RTN

Argentina National Identity (DNI) Number


Format
Eight digits separated by periods
Pattern
Eight digits:
Two digits
A period
Three digits
A period
Three digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_argentina_national_id finds content that matches the pattern.
A keyword from Keyword_argentina_national_id is found.

<!-- Argentina National Identity (DNI) Number -->


<Entity id="eefbb00e-8282-433c-8620-8f1da3bffdb2" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_argentina_national_id"/>
<Match idRef="Keyword_argentina_national_id"/>
</Pattern>
</Entity>

Keywords
Keyword_argentina_national_id
Argentina National Identity number
Identity
Identification National Identity Card
DNI
NIC National Registry of Persons
Documento Nacional de Identidad
Registro Nacional de las Personas
Identidad
Identificación

Australia Bank Account Number


Format
6-10 digits with or without a bank state branch number
Pattern
Account number is 6-10 digits. Australia bank state branch number:
Three digits
A hyphen
Three digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_australia_bank_account_number finds content that matches the pattern..
A keyword from Keyword_australia_bank_account_number is found.
The regular expression Regex_australia_bank_account_number_bsb finds content that matches the pattern.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_australia_bank_account_number finds content that matches the pattern..
A keyword from Keyword_australia_bank_account_number is found.

<!-- Australia Bank Account Number -->


<Entity id="74a54de9-2a30-4aa0-a8aa-3d9327fc07c7" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_australia_bank_account_number" />
<Match idRef="Keyword_australia_bank_account_number" />
<Match idRef="Regex_australia_bank_account_number_bsb" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_australia_bank_account_number" />
<Match idRef="Keyword_australia_bank_account_number" />
</Pattern>
</Entity>

Keywords
Keyword_australia_bank_account_number
swift bank code
correspondent bank
base currency
usa account
holder address
bank address
information account
fund transfers
bank charges
bank details
banking information
full names
iaea

Australia Driver's License Number


Format
Nine letters and digits
Pattern
Nine letters and digits:
Two digits or letters (not case sensitive)
Two digits
Five digits or letters (not case sensitive)
OR
1-2 optional letters (not case sensitive)
4-9 digits
OR
Nine digits or letters (not case sensitive)
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_australia_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_australia_drivers_license_number is found.
No keyword from Keyword_australia_drivers_license_number_exclusions is found.

<!-- Australia Drivers License Number -->


<Entity id="1cbbc8f5-9216-4392-9eb5-5ac2298d1356" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_australia_drivers_license_number" />
<Match idRef="Keyword_australia_drivers_license_number" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_australia_drivers_license_number_exclusions" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_australia_drivers_license_number
international driving permits
australian automobile association
international driving permit
DriverLicence
DriverLicences
Driver Lic
Driver Licence
Driver Licences
DriversLic
DriversLicence
DriversLicences
Drivers Lic
Drivers Lics
Drivers Licence
Drivers Licences
Driver'Lic
Driver'Lics
Driver'Licence
Driver'Licences
Driver' Lic
Driver' Lics
Driver' Licence
Driver' Licences
Driver'sLic
Driver'sLics
Driver'sLicence
Driver'sLicences
Driver's Lic
Driver's Lics
Driver's Licence
Driver's Licences
DriverLic#
DriverLics#
DriverLicence#
DriverLicences#
Driver Lic#
Driver Lics#
Driver Licence#
Driver Licences#
DriversLic#
DriversLics#
DriversLicence#
DriversLicences#
Drivers Lic#
Drivers Lics#
Drivers Licence#
Drivers Licences#
Driver'Lic#
Driver'Lics#
Driver'Licence#
Driver'Licences#
Driver' Lic#
Driver' Lics#
Driver' Licence#
Driver' Licences#
Driver'sLic#
Driver'sLics#
Driver'sLicence#
Driver'sLicences#
Driver's Lic#
Driver's Lics#
Driver's Licence#
Driver's Licences#
Keyword_australia_drivers_license_number_exclusions
aaa
DriverLicense
DriverLicenses
Driver License
Driver Licenses
DriversLicense
DriversLicenses
Drivers License
Drivers Licenses
Driver'License
Driver'Licenses
Driver' License
Driver' Licenses
Driver'sLicense
Driver'sLicenses
Driver's License
Driver's Licenses
DriverLicense#
DriverLicenses#
Driver License#
Driver Licenses#
DriversLicense#
DriversLicenses#
Drivers License#
Drivers Licenses#
Driver'License#
Driver'Licenses#
Driver' License#
Driver' Licenses#
Driver'sLicense#
Driver'sLicenses#
Driver's License#
Driver's Licenses#

Australia Medical Account Number


Format
10-11 digits
Pattern
10-11 digits:
First digit is in the range 2-6
Ninth digit is a check digit
Tenth digit is the issue digit
Eleventh digit (optional) is the individual number
Checksum
Yes
Definition
A DLP policy is 95% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_australian_medical_account_number finds content that matches the pattern.
A keyword from Keyword_Australia_Medical_Account_Number is found.
The checksum passes.
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_australian_medical_account_number finds content that matches the pattern.
The checksum passes.

<!-- Australia Medical Account Number -->


<Entity id="104a99a0-3d3b-4542-a40d-ab0b9e1efe63" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="95">
<IdMatch idRef="Func_australian_medical_account_number"/>
<Any minMatches="1">
<Match idRef="Keyword_Australia_Medical_Account_Number"/>
</Any>
</Pattern>
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_australian_medical_account_number"/>
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_Australia_Medical_Account_Number"/>
</Any>
</Pattern>
</Entity>

Keywords
Keyword_Australia_Medical_Account_Number
bank account details
medicare payments
mortgage account
bank payments
information branch
credit card loan
department of human services
local service
medicare

Australia Passport Number


Format
A letter followed by seven digits
Pattern
A letter (not case sensitive) followed by seven digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_australia_passport_number finds content that matches the pattern.
A keyword from Keyword_passport or Keyword_australia_passport_number is found.

<!-- Australia Passport Number -->


<Entity id="29869db6-602d-4853-ab93-3484f905df50" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_australia_passport_number" />
<Any minMatches="1">
<Match idRef="Keyword_passport" />
<Match idRef="Keyword_australia_passport_number" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_passport
Passport Number
Passport No
Passport #
Passport#
PassportID
Passportno
passportnumber
パスポート
パスポート番号
パスポートのNum
パスポート #
Numéro de passeport
Passeport n °
Passeport Non
Passeport #
Passeport#
PasseportNon
Passeportn °
Keyword_australia_passport_number
passport
passport details
immigration and citizenship
commonwealth of australia
department of immigration
residential address
department of immigration and citizenship
visa
national identity card
passport number
travel document
issuing authority

Australia Tax File Number


Format
8-9 digits
Pattern
8-9 digits typically presented with spaces as follows:
Three digits
An optional space
Three digits
An optional space
2-3 digits where the last digit is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_australian_tax_file_number finds content that matches the pattern.
No keyword from Keyword_Australia_Tax_File_Number or Keyword_number_exclusions is found.
The checksum passes.
<!-- Australia Tax File Number -->
<Entity id="e29bc95f-ff70-4a37-aa01-04d17360a4c5" patternsProximity="300" recommendedConfidence="85">

<Pattern confidenceLevel="85">
<IdMatch idRef="Func_australian_tax_file_number" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_Australia_Tax_File_Number" />
<Match idRef="Keyword_number_exclusions" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_Australia_Tax_File_Number
australian business number
marginal tax rate
medicare levy
portfolio number
service veterans
withholding tax
individual tax return
tax file number
Keyword_number_exclusions
00000000
11111111
22222222
33333333
44444444
55555555
66666666
77777777
88888888
99999999
000000000
111111111
222222222
333333333
444444444
555555555
666666666
777777777
888888888
999999999
0000000000
1111111111
2222222222
3333333333
4444444444
5555555555
6666666666
7777777777
8888888888
9999999999

Belgium National Number


Format
11 digits plus delimiters
Pattern
11 digits plus delimiters:
Six digits and two periods in the format YY.MM.DD for date of birth
A hyphen
Three sequential digits (odd for males, even for females)
A period
Two digits that are a check digit
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_belgium_national_number finds content that matches the pattern.
A keyword from Keyword_belgium_national_number is found.
The checksum passes.

<!-- Belgium National Number -->


<Entity id="fb969c9e-0fd1-4b18-8091-a2123c5e6a54" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_belgium_national_number"/>
<Match idRef="Keyword_belgium_national_number"/>
</Pattern>
</Entity>

Keywords
Keyword_belgium_national_number
Identity
Registration
Identification
ID
Identiteitskaart
Registratie nummer
Identificatie nummer
Identiteit
Registratie
Identificatie
Carte d’identité
numéro d'immatriculation
numéro d'identification
identité
inscription
Identifikation
Identifizierung
Identifikationsnummer
Personalausweis
Registrierung
Registrationsnummer

Brazil CPF Number


Format
11 digits that include a check digit and can be formatted or unformatted
Pattern
Formatted:
Three digits
A period
Three digits
A period
Three digits
A hyphen
Two digits which are check digits
Unformatted:
11 digits where the last two digits are check digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_cpf finds content that matches the pattern.
A keyword from Keyword_brazil_cpf is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_cpf finds content that matches the pattern.
The checksum passes.
<!-- Brazil CPF Number -->
<Entity id="78e09124-f2c3-4656-b32a-c1a132cd2711" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_brazil_cpf"/>
<Match idRef="Keyword_brazil_cpf"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_brazil_cpf"/>
</Pattern>
</Entity>

Keywords
Keyword_brazil_cpf
CPF
Identification
Registration
Revenue
Cadastro de Pessoas Físicas
Imposto
Identificação
Inscrição
Receita

Brazil Legal Entity Number (CNPJ)


Format
14 digits that include a registration number, branch number, and check digits, plus delimiters
Pattern
14 digits, plus delimiters:
Two digits
A period
Three digits
A period
Three digits (these first eight digits are the registration number)
A forward slash
Four-digit branch number
A hyphen
Two digits which are check digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_cnpj finds content that matches the pattern.
A keyword from Keyword_brazil_cnpj is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_cnpj finds content that matches the pattern.
The checksum passes.

<!-- Brazil Legal Entity Number (CNPJ) -->


<Entity id="9b58b5cd-5e90-4df6-b34f-1ebcc88ceae4" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_brazil_cnpj"/>
<Match idRef="Keyword_brazil_cnpj"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_brazil_cnpj"/>
</Pattern>
</Entity>

Keywords
Keyword_brazil_cnpj
CNPJ
CNPJ/MF
CNPJ -MF
National Registry of Legal Entities
Taxpayers Registry
Legal entity
Legal entities
Registration Status
Business
Company
CNPJ
Cadastro Nacional da Pessoa Jurídica
Cadastro Geral de Contribuintes
CGC
Pessoa jurídica
Pessoas jurídicas
Situação cadastral
Inscrição
Empresa

Brazil National ID Card (RG)


Format
Registro Geral (old format): Nine digits
Registro de Identidade (RIC ) (new format): 11 digits
Pattern
Registro Geral (old format):
Two digits
A period
Three digits
A period
Three digits
A hyphen
One digit which is a check digit
Registro de Identidade (RIC ) (new format):
10 digits
A hyphen
One digit which is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_rg finds content that matches the pattern.
A keyword from Keyword_brazil_rg is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_brazil_rg finds content that matches the pattern.
The checksum passes.

<!-- Brazil National ID Card (RG) -->


<Entity id="486de900-db70-41b3-a886-abdf25af119c" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_brazil_rg"/>
<Match idRef="Keyword_brazil_rg"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_brazil_rg"/>
</Pattern>
</Entity>

Keywords
Keyword_brazil_rg
Cédula de identidade identity card national id número de rregistro registro de Iidentidade registro geral RG
(this keyword is case sensitive) RIC (this keyword is case sensitive)

Canada Bank Account Number


Format
Seven or twelve digits
Pattern
A Canada Bank Account Number is seven or twelve digits.
A Canada bank account transit number is:
Five digits
A hyphen
Three digits OR
A zero "0"
Eight digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_canada_bank_account_number finds content that matches the pattern.
A keyword from Keyword_canada_bank_account_number is found.
The regular expression Regex_canada_bank_account_transit_number finds content that matches the pattern.
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_canada_bank_account_number finds content that matches the pattern.
A keyword from Keyword_canada_bank_account_number is found.

<!-- Canada Bank Account Number -->


<Entity id="552e814c-cb50-4d94-bbaa-bb1d1ffb34de" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_canada_bank_account_number" />
<Match idRef="Keyword_canada_bank_account_number" />
<Match idRef="Regex_canada_bank_account_transit_number" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_canada_bank_account_number" />
<Match idRef="Keyword_canada_bank_account_number" />
</Pattern>
</Entity>

Keywords
Keyword_canada_bank_account_number
canada savings bonds
canada revenue agency
canadian financial institution
direct deposit form
canadian citizen
legal representative
notary public
commissioner for oaths
child care benefit
universal child care
canada child tax benefit
income tax benefit
harmonized sales tax
social insurance number
income tax refund
child tax benefit
territorial payments
institution number
deposit request
banking information
direct deposit

Canada Driver's License Number


Format
Varies by province
Pattern
Various patterns covering Alberta, British Columbia, Manitoba, New Brunswick, Newfoundland/Labrador, Nova
Scotia, Ontario, Prince Edward Island, Quebec, and Saskatchewan
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_[province_name]_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_[province_name]_drivers_license_name is found.
A keyword from Keyword_canada_drivers_license is found.
<!-- Canada Driver's License Number -->
<Entity id="37186abb-8e48-4800-ad3c-e3d1610b3db0" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_alberta_drivers_license_number" />
<Match idRef="Keyword_alberta_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_british_columbia_drivers_license_number" />
<Match idRef="Keyword_british_columbia_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_manitoba_drivers_license_number" />
<Match idRef="Keyword_manitoba_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_new_brunswick_drivers_license_number" />
<Match idRef="Keyword_new_brunswick_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_newfoundland_labrador_drivers_license_number" />
<Match idRef="Keyword_newfoundland_labrador_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_nova_scotia_drivers_license_number" />
<Match idRef="Keyword_nova_scotia_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_ontario_drivers_license_number" />
<Match idRef="Keyword_ontario_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_prince_edward_island_drivers_license_number" />
<Match idRef="Keyword_prince_edward_island_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_quebec_drivers_license_number" />
<Match idRef="Keyword_quebec_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_saskatchewan_drivers_license_number" />
<Match idRef="Keyword_saskatchewan_drivers_license_name" />
<Match idRef="Keyword_canada_drivers_license" />
</Pattern>
</Entity>

Keywords
Keyword_[province_name]_drivers_license_name
The province abbreviation, for example AB
The province name, for example Alberta
Keyword_canada_drivers_license
DL
DLS
CDL
CDLS
DriverLic
DriverLics
DriverLicense
DriverLicenses
DriverLicence
DriverLicences
Driver Lic
Driver Lics
Driver License
Driver Licenses
Driver Licence
Driver Licences
DriversLic
DriversLics
DriversLicence
DriversLicences
DriversLicense
DriversLicenses
Drivers Lic
Drivers Lics
Drivers License
Drivers Licenses
Drivers Licence
Drivers Licences
Driver'Lic
Driver'Lics
Driver'License
Driver'Licenses
Driver'Licence
Driver'Licences
Driver' Lic
Driver' Lics
Driver' License
Driver' Licenses
Driver' Licence
Driver' Licences
Driver'sLic
Driver'sLics
Driver'sLicense
Driver'sLicenses
Driver'sLicence
Driver'sLicences
Driver's Lic
Driver's Lics
Driver's License
Driver's Licenses
Driver's Licence
Driver's Licences
Permis de Conduire
id
ids
idcard number
idcard numbers
idcard #
idcard #s
idcard card
idcard cards
idcard
identification number
identification numbers
identification #
identification #s
identification card
identification cards
identification
DL#
DLS#
CDL#
CDLS#
DriverLic#
DriverLics#
DriverLicense#
DriverLicenses#
DriverLicence#
DriverLicences#
Driver Lic#
Driver Lics#
Driver License#
Driver Licenses#
Driver License#
Driver Licences#
DriversLic#
DriversLics#
DriversLicense#
DriversLicenses#
DriversLicence#
DriversLicences#
Drivers Lic#
Drivers Lics#
Drivers License#
Drivers Licenses#
Drivers Licence#
Drivers Licences#
Driver'Lic#
Driver'Lics#
Driver'License#
Driver'Licenses#
Driver'Licence#
Driver'Licences#
Driver' Lic#
Driver' Lics#
Driver' License#
Driver' Licenses#
Driver' Licence#
Driver' Licences#
Driver'sLic#
Driver'sLics#
Driver'sLicense#
Driver'sLicenses#
Driver'sLicence#
Driver'sLicences#
Driver's Lic#
Driver's Lics#
Driver's License#
Driver's Licenses#
Driver's Licence#
Driver's Licences#
Permis de Conduire#
id#
ids#
idcard card#
idcard cards#
idcard#
identification card#
identification cards#
identification#

Canada Health Service Number


Format
10 digits
Pattern
10 digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_canada_health_service_number finds content that matches the pattern.
A keyword from Keyword_canada_health_service_number is found.

<!-- Canada Health Service Number -->


<Entity id="59c0bf39-7fab-482c-af25-00faa4384c94" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_canada_health_service_number" />
<Any minMatches="1">
<Match idRef="Keyword_canada_health_service_number" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_canada_health_service_number
personal health number
patient information
health services
speciality services
automobile accident
patient hospital
psychiatrist
workers compensation
disability

Canada Passport Number


Format
Two uppercase letters followed by six digits
Pattern
Two uppercase letters followed by six digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_canada_passport_number finds content that matches the pattern.
A keyword from Keyword_canada_passport_number or Keyword_passport is found.
<!-- Canada Passport Number -->
<Entity id="14d0db8b-498a-43ed-9fca-f6097ae687eb" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_canada_passport_number" />
<Any minMatches="1">
<Match idRef="Keyword_canada_passport_number" />
<Match idRef="Keyword_passport" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_canada_passport_number
canadian citizenship
canadian passport
passport application
passport photos
certified translator
canadian citizens
processing times
renewal application
Keyword_passport
Passport Number
Passport No
Passport #
Passport#
PassportID
Passportno
passportnumber
パスポート
パスポート番号
パスポートのNum
パスポート#
Numéro de passeport
Passeport n °
Passeport Non
Passeport #
Passeport#
PasseportNon
Passeportn °

Canada Personal Health Identification Number (PHIN)


Format
Nine digits
Pattern
Nine digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters: The regular expression Regex_canada_phin finds content that matches the pattern. At least two
keywords from Keyword_canada_phin or Keyword_canada_provinces are found..

<!-- Canada PHIN -->


<Entity id="722e12ac-c89a-4ec8-a1b7-fea3469f89db" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_canada_phin" />
<Any minMatches="2">
<Match idRef="Keyword_canada_phin" />
<Match idRef="Keyword_canada_provinces" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_canada_phin
social insurance number
health information act
income tax information
manitoba health
health registration
prescription purchases
benefit eligibility
personal health
power of attorney
registration number
personal health number
practitioner referral
wellness professional
patient referral
health and wellness
Keyword_canada_provinces
Nunavut
Quebec
Northwest Territories
Ontario
British Columbia
Alberta
Saskatchewan
Manitoba
Yukon
Newfoundland and Labrador
New Brunswick
Nova Scotia
Prince Edward Island
Canada
Canada Social Insurance Number
Format
Nine digits with optional hyphens or spaces
Pattern
Formatted:
Three digits
A hyphen or space
Three digits
A hyphen or space
Three digits
Unformatted: Nine digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_canadian_sin finds content that matches the pattern.
At least two of any combination of the following:
A keyword from Keyword_sin is found.
A keyword from Keyword_sin_collaborative is found.
The function Func_eu_date finds a date in the right date format.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_unformatted_canadian_sin finds content that matches the pattern.
A keyword from Keyword_sin is found.
The checksum passes.

<!-- Canada Social Insurance Number -->


<Entity id="a2f29c85-ecb8-4514-a610-364790c0773e" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_canadian_sin" />
<Any minMatches="2">
<Match idRef="Keyword_sin" />
<Match idRef="Keyword_sin_collaborative" />
<Match idRef="Func_eu_date" />
</Any>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_unformatted_canadian_sin" />
<Match idRef="Keyword_sin" />
</Pattern>
</Entity>

Keywords
Keyword_sin
sin
social insurance
numero d'assurance sociale
sins
ssn
ssns
social security
numero d'assurance social
national identification number
national id
sin#
soc ins
social ins
Keyword_sin_collaborative
driver's license
drivers license
driver's licence
drivers licence
DOB
Birthdate
Birthday
Date of Birth

Chile Identity Card Number


Format
7-8 digits plus delimiters a check digit or letter
Pattern
7-8 digits plus delimiters:
1-2 digits
A period
Three digits
A period
Three digits
A dash
One digit or letter (not case sensitive) which is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_chile_id_card finds content that matches the pattern.
A keyword from Keyword_chile_id_card is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_chile_id_card finds content that matches the pattern.
The checksum passes.

<!-- Chile Identity Card Number -->


<Entity id="4e979794-49a0-407e-a0b9-2c536937b925" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_chile_id_card"/>
<Match idRef="Keyword_chile_id_card"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_chile_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_chile_id_card
National Identification Number
Identity card
ID
Identification
Rol Único Nacional
RUN
Rol Único Tributario
RUT
Cédula de Identidad
Número De Identificación Nacional
Tarjeta de identificación
Identificación

China Resident Identity Card (PRC) Number


Format
18 digits
Pattern
18 digits:
Six digits which are an address code
Eight digits in the form YYYYMMDD which are the date of birth
Three digits which are an order code
One digit which is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_china_resident_id finds content that matches the pattern.
A keyword from Keyword_china_resident_id is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_china_resident_id finds content that matches the pattern.
The checksum passes.

<!-- China Resident Identity Card (PRC) Number -->


<Entity id="c92daa86-2d16-4871-901f-816b3f554fc1" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_china_resident_id"/>
<Match idRef="Keyword_china_resident_id"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_china_resident_id"/>
</Pattern>
</Entity>

Keywords
Keyword_china_resident_id
Resident Identity Card
PRC
National Identification Card
身份证
居民 身份证
居民身份证
鉴定
身分證
居民 身份證
鑑定

Credit Card Number


Format
16 digits which can be formatted or unformatted (dddddddddddddddd) and must pass the Luhn test.
Pattern
Very complex and robust pattern that detects cards from all major brands worldwide, including Visa,
MasterCard, Discover Card, JCB, American Express, gift cards, and diner cards.
Checksum
Yes, the Luhn checksum
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_credit_card finds content that matches the pattern.
One of the following is true:
A keyword from Keyword_cc_verification is found.
A keyword from Keyword_cc_name is found.
The function Func_expiration_date finds a date in the right date format.
The checksum passes.
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_credit_card finds content that matches the pattern.
The checksum passes.

<!-- Credit Card Number -->


<Entity id="50842eb7-edc8-4019-85dd-5a5c1f2bb085" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
<Any minMatches="1">
<Match idRef="Keyword_cc_verification" />
<Match idRef="Keyword_cc_name" />
<Match idRef="Func_expiration_date" />
</Any>
</Pattern>
<Pattern confidenceLevel="65">
<IdMatch idRef="Func_credit_card" />
</Pattern>
</Entity>

Keywords
Keyword_cc_verification
card verification
card identification number
cvn
cid
cvc2
cvv2
pin block
security code
security number
security no
issue number
issue no
cryptogramme
numéro de sécurité
numero de securite
kreditkartenprüfnummer
kreditkartenprufnummer
prüfziffer
prufziffer
sicherheits Kode
sicherheitscode
sicherheitsnummer
verfalldatum
codice di verifica
cod. sicurezza
cod sicurezza
n autorizzazione
código
codigo
cod. seg
cod seg
código de segurança
codigo de seguranca
codigo de segurança
código de seguranca
cód. segurança
cod. seguranca cod. segurança
cód. seguranca
cód segurança
cod seguranca cod segurança
cód seguranca
número de verificação
numero de verificacao
ablauf
gültig bis
gültigkeitsdatum
gultig bis
gultigkeitsdatum
scadenza
data scad
fecha de expiracion
fecha de venc
vencimiento
válido hasta
valido hasta
vto
data de expiração
data de expiracao
data em que expira
validade
valor
vencimento
Venc
Keyword_cc_name
amex
american express
americanexpress
Visa
mastercard
master card
mc
mastercards
master cards
diner's Club
diners club
dinersclub
discover card
discovercard
discover cards
JCB
japanese card bureau
carte blanche
carteblanche
credit card
cc#
cc#:
expiration date
exp date
expiry date
date d’expiration
date d'exp
date expiration
bank card
bankcard
card number
card num
cardnumber
cardnumbers
card numbers
creditcard
credit cards
creditcards
ccn
card holder
cardholder
card holders
cardholders
check card
checkcard
check cards
checkcards
debit card
debitcard
debit cards
debitcards
atm card
atmcard
atm cards
atmcards
enroute
en route
card type
carte bancaire
carte de crédit
carte de credit
numéro de carte
numero de carte
nº de la carte
nº de carte
kreditkarte
karte
karteninhaber
karteninhabers
kreditkarteninhaber
kreditkarteninstitut
kreditkartentyp
eigentümername
kartennr
kartennummer
kreditkartennummer
kreditkarten-nummer
carta di credito
carta credito
carta
n carta
nr. carta
nr carta
numero carta
numero della carta
numero di carta
tarjeta credito
tarjeta de credito
tarjeta crédito
tarjeta de crédito
tarjeta de atm
tarjeta atm
tarjeta debito
tarjeta de debito
tarjeta débito
tarjeta de débito
nº de tarjeta
no. de tarjeta
no de tarjeta
numero de tarjeta
número de tarjeta
tarjeta no
tarjetahabiente
cartão de crédito
cartão de credito
cartao de crédito
cartao de credito
cartão de débito
cartao de débito
cartão de debito
cartao de debito
débito automático
debito automatico
número do cartão
numero do cartão
número do cartao
numero do cartao
número de cartão
numero de cartão
número de cartao
numero de cartao
nº do cartão
nº do cartao
nº. do cartão
no do cartão
no do cartao
no. do cartão
no. do cartao

Croatia Identity Card Number


Format
Nine digits
Pattern
Nine consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_croatia_id_card finds content that matches the pattern.
A keyword from Keyword_croatia_id_card is found.
<!--Croatia Identity Card Number-->
<Entity id="ff12f884-c20a-4189-b185-34c8e7258d47" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_croatia_id_card"/>
<Match idRef="Keyword_croatia_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_croatia_id_card
Croatian identity card
Osobna iskaznica

Croatia Personal Identification (OIB) Number


Format
11 digits
Pattern
11 digits:
10 digits
Final digit is a check digit For the purposes of international data exchange, the letters HR are added
preceding the eleven digits.
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_croatia_oib_number finds content that matches the pattern.
A keyword from Keyword_croatia_oib_number is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_croatia_oib_number finds content that matches the pattern.
The checksum passes.

<!-- Croatia Personal Identification (OIB) Number -->


<Entity id="31983b6d-db95-4eb2-a630-b44bd091968d" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_croatia_oib_number"/>
<Match idRef="Keyword_croatia_oib_number"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_croatia_oib_number"/>
</Pattern>
</Entity>

Keywords
Keyword_croatia_oib_number
Personal Identification Number
Osobni identifikacijski broj
OIB

Czech Personal Identity Number


Format
Nine digits with optional forward slash (old format) 10 digits with optional forward slash (new format)
Pattern
Nine digits (old format):
Nine digits
OR
Six digits that represent date of birth
A forward slash
Three digits
10 digits (new format):
10 digits
OR
Six digits that represent date of birth
A forward slash
Four digits where last digit is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters: The function Func_czech_id_card finds content that matches the pattern. A keyword from
Keyword_czech_id_card is found. The checksum passes.

<!-- Czech Personal Identity Number -->


<Entity id="60c0725a-4eb6-455b-9dda-05d8a7396497" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_czech_id_card" />
<Match idRef="Keyword_czech_id_card" />
</Pattern>
</Entity>

Keywords
czech personal identity number
Rodné číslo

Denmark Personal Identification Number


Format
10 digits containing a hyphen
Pattern
10 digits:
Six digits in the format DDMMYY which are the date of birth
A hyphen
Four digits where the final digit is a check digit
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters: The regular expression Regex_denmark_id finds content that matches the pattern. A keyword from
Keyword_denmark_id is found. The checksum passes.

<!-- Denmark Personal Identification Number -->


<Entity id="6c4f2fef-56e1-4c00-8093-88d7a01cf460" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_denmark_id"/>
<Match idRef="Keyword_denmark_id"/>
</Pattern>
</Entity>

Keywords
Keyword_denmark_id
Personal Identification Number
CPR
Det Centrale Personregister
Personnummer

Drug Enforcement Agency (DEA) Number


Format
Two letters followed by seven digits
Pattern
Pattern must include all of the following:
One letter (not case sensitive) from this set of possible letters: abcdefghjklmnprstux, which is a registrant
code
One letter (not case sensitive), which is the first letter of the registrant's last name
Seven digits, the last of which is the check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_dea_number finds content that matches the pattern.
The checksum passes.
<!-- DEA Number -->
<Entity id="9a5445ad-406e-43eb-8bd7-cac17ab6d0e4" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_dea_number"/>
</Pattern>
</Entity>

Keywords
None

EU Debit Card Number


Format
16 digits
Pattern
Very complex and robust pattern
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_eu_debit_card finds content that matches the pattern.
At least one of the following is true:
A keyword from Keyword_eu_debit_card is found.
A keyword from Keyword_card_terms_dict is found.
A keyword from Keyword_card_security_terms_dict is found.
A keyword from Keyword_card_expiration_terms_dict is found.
The function Func_expiration_date finds a date in the right date format.
The checksum passes.

<!-- EU Debit Card Number -->


<Entity id="0e9b3178-9678-47dd-a509-37222ca96b42" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_eu_debit_card" />
<Any minMatches="1">
<Match idRef="Keyword_eu_debit_card" />
<Match idRef="Keyword_card_terms_dict" />
<Match idRef="Keyword_card_security_terms_dict" />
<Match idRef="Keyword_card_expiration_terms_dict" />
<Match idRef="Func_expiration_date" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_eu_debit_card
account number
card number
card no.
security number
cc#
Keyword_card_terms_dict
acct nbr
acct num
acct no
american express
americanexpress
americano espresso
amex
atm card
atm cards
atm kaart
atmcard
atmcards
atmkaart
atmkaarten
bancontact
bank card
bankkaart
card holder
card holders
card num
card number
card numbers
card type
cardano numerico
cardholder
cardholders
cardnumber
cardnumbers
carta bianca
carta credito
carta di credito
cartao de credito
cartao de crédito
cartao de debito
cartao de débito
carte bancaire
carte blanche
carte bleue
carte de credit
carte de crédit
carte di credito
carteblanche
cartão de credito
cartão de crédito
cartão de debito
cartão de débito
cb
ccn
check card
check cards
checkcard
checkcards
chequekaart
cirrus
cirrus-edc-maestro
controlekaart
controlekaarten
credit card
credit cards
creditcard
creditcards
debetkaart
debetkaarten
debit card
debit cards
debitcard
debitcards
debito automatico
diners club
dinersclub
discover
discover card
discover cards
discovercard
discovercards
débito automático
edc
eigentümername
european debit card
hoofdkaart
hoofdkaarten
in viaggio
japanese card bureau
japanse kaartdienst
jcb
kaart
kaart num
kaartaantal
kaartaantallen
kaarthouder
kaarthouders
karte
karteninhaber
karteninhabers
kartennr
kartennummer
kreditkarte
kreditkarten-nummer
kreditkarteninhaber
kreditkarteninstitut
kreditkartennummer
kreditkartentyp
maestro
master card
master cards
mastercard
mastercards
mc
mister cash
n carta
carta
no de tarjeta
no do cartao
no do cartão
no. de tarjeta
no. do cartao
no. do cartão
nr carta
nr. carta
numeri di scheda
numero carta
numero de cartao
numero de carte
numero de cartão
numero de tarjeta
numero della carta
numero di carta
numero di scheda
numero do cartao
numero do cartão
numéro de carte
nº carta
nº de carte
nº de la carte
nº de tarjeta
nº do cartao
nº do cartão
nº. do cartão
número de cartao
número de cartão
número de tarjeta
número do cartao
scheda dell'assegno
scheda dell'atmosfera
scheda dell'atmosfera
scheda della banca
scheda di controllo
scheda di debito
scheda matrice
schede dell'atmosfera
schede di controllo
schede di debito
schede matrici
scoprono la scheda
scoprono le schede
solo
supporti di scheda
supporto di scheda
switch
tarjeta atm
tarjeta credito
tarjeta de atm
tarjeta de credito
tarjeta de debito
tarjeta debito
tarjeta no
tarjetahabiente
tipo della scheda
ufficio giapponese della
scheda
v pay
v-pay
visa
visa plus
visa electron
visto
visum
vpay
Keyword_card_security_terms_dict
card identification number
card verification
cardi la verifica
cid
cod seg
cod seguranca
cod segurança
cod sicurezza
cod. seg
cod. seguranca
cod. segurança
cod. sicurezza
codice di sicurezza
codice di verifica
codigo
codigo de seguranca
codigo de segurança
crittogramma
cryptogram
cryptogramme
cv2
cvc
cvc2
cvn
cvv
cvv2
cód seguranca
cód segurança
cód. seguranca
cód. segurança
código
código de seguranca
código de segurança
de kaart controle
geeft nr uit
issue no
issue number
kaartidentificatienummer
kreditkartenprufnummer
kreditkartenprüfnummer
kwestieaantal
no. dell'edizione
no. di sicurezza
numero de securite
numero de verificacao
numero dell'edizione
numero di identificazione della
scheda
numero di sicurezza
numero van veiligheid
numéro de sécurité
nº autorizzazione
número de verificação
perno il blocco
pin block
prufziffer
prüfziffer
security code
security no
security number
sicherheits kode
sicherheitscode
sicherheitsnummer
speldblok
veiligheid nr
veiligheidsaantal
veiligheidscode
veiligheidsnummer
verfalldatum
Keyword_card_expiration_terms_dict
ablauf
data de expiracao
data de expiração
data del exp
data di exp
data di scadenza
data em que expira
data scad
data scadenza
date de validité
datum afloop
datum van exp
de afloop
espira
espira
exp date
exp datum
expiration
expire
expires
expiry
fecha de expiracion
fecha de venc
gultig bis
gultigkeitsdatum
gültig bis
gültigkeitsdatum
la scadenza
scadenza
valable
validade
valido hasta
valor
venc
vencimento
vencimiento
verloopt
vervaldag
vervaldatum
vto
válido hasta

EU Driver's License Number


To learn more, see EU Driver's License Number sensitive information type.

EU National Identification Number


To learn more, see EU National Identification Number sensitive information type.

EU Passport Number
To learn more, see EU Passport Number sensitive information type.

EU Social Security Number or Equivalent ID


To learn more, see EU Social Security Number or Equivalent ID sensitive information type.

EU Tax Identification Number


To learn more, see EU Tax Identification Number sensitive information type.

Finland National ID
Format
Six digits plus a character indicating a century plus three digits plus a check digit
Pattern
Pattern must include all of the following:
Six digits in the format format DDMMYY which are a date of birth
Century marker (either '-', '+' or 'a')
Three-digit personal identification number
A digit or letter (case insensitive) which is a check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_finnish_national_id finds content that matches the pattern.
A keyword from Keyword_finnish_national_id is found.
The checksum passes.

<!-- Finnish National ID-->


<Entity id="338FD995-4CB5-4F87-AD35-79BD1DD926C1" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_finnish_national_id" />
<Match idRef="Keyword_finnish_national_id" />
</Pattern>
</Entity>

Keywords
Keyword_finnish_national_id
Sosiaaliturvatunnus
SOTU Henkilötunnus HETU
Personbeteckning
Personnummer

Finland Passport Number


Format Combination of nine letters and digits Pattern Combination of nine letters and digits: Two letters (not
case sensitive) Seven digits Checksum No Definition A DLP policy is 75% confident that it's detected this type
of sensitive information if, within a proximity of 300 characters: The regular expression
Regex_finland_passport_number finds content that matches the pattern. A keyword from
Keyword_finland_passport_number is found.
Keywords Keyword_finland_passport_number Passport Passi ## France Driver's License Number
Format
12 digits
Pattern
12 digits with validation to discount similar patterns such as French telephone numbers
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_french_drivers_license finds content that matches the pattern.
At least one of the following is true:
A keyword from Keyword_french_drivers_license is found.
The function Func_eu_date finds a date in the right date format.
<!-- France Driver's License Number -->
<Entity id="18e55a36-a01b-4b0f-943d-dc10282a1824" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_french_drivers_license" />
<Any minMatches="1">
<Match idRef="Keyword_french_drivers_license" />
<Match idRef="Func_eu_date" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_french_drivers_license
drivers licence
drivers license
driving licence
driving license
permis de conduire
licence number
license number
licence numbers
license numbers

France National ID Card (CNI)


Format
12 digits
Pattern
12 digits
Checksum
No
Definition
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_france_cni finds content that matches the pattern.

<!-- France CNI -->


<Entity id="f741ac74-1bc0-4665-b69b-f0c7f927c0c4" patternsProximity="300" recommendedConfidence="65">
<Pattern confidenceLevel="65">
<IdMatch idRef="Regex_france_cni" />
</Pattern>
</Entity>

Keywords
None

France Passport Number


Format
Nine digits and letters
Pattern
Nine digits and letters:
Two digits
Two letters (not case sensitive)
Five digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_fr_passport finds content that matches the pattern.
A keyword from Keyword_passport is found.

<!-- France Passport Number -->


<Entity id="3008b884-8c8c-4cd8-a289-99f34fc7ff5d" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_fr_passport" />
<Match idRef="Keyword_passport" />
</Pattern>
</Entity>

Keywords
Keyword_passport
Passport Number
Passport No
Passport #
Passport#
PassportID
Passportno
passportnumber
パスポート
パスポート番号
パスポートのNum
パスポート #
Numéro de passeport
Passeport n °
Passeport Non
Passeport #
Passeport#
PasseportNon
Passeportn °

France Social Security Number (INSEE)


Format
15 digits
Pattern
Must match one of two patterns:
13 digits followed by a space followed by two digits
or
15 consecutive digits
Checksum
Yes
Definition
A DLP policy is 95% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_french_insee or Func_fr_insee finds content that matches the pattern.
A keyword from Keyword_fr_insee is found.
The checksum passes.
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_french_insee or Func_fr_insee finds content that matches the pattern.
No keyword from Keyword_fr_insee is found.
The checksum passes.

<!-- France INSEE -->


<Entity id="71f62b97-efe0-4aa1-aa49-e14de253619d" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="95">
<IdMatch idRef="Func_french_insee" />
<Match idRef="Func_fr_insee" />
<Any minMatches="1">
<Match idRef="Keyword_fr_insee" />
</Any>
</Pattern>
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_french_insee" />
<Match idRef="Func_fr_insee" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_fr_insee" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_fr_insee
insee
securité sociale
securite sociale
national id
national identification
numéro d'identité
no d'identité
no. d'identité
numero d'identite
no d'identite
no. d'identite
social security number
social security code
social insurance number
le numéro d'identification nationale
d'identité nationale
numéro de sécurité sociale
le code de la sécurité sociale
numéro d'assurance sociale
numéro de sécu
code sécu

German Driver's License Number


Format
Combination of 11 digits and letters
Pattern
11 digits and letters (not case sensitive):
A digit or letter
Two digits
Six digits or letters
A digit
A digit or letter
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_german_drivers_license finds content that matches the pattern.
At least one of the following is true:
A keyword from Keyword_german_drivers_license_number is found.
A keyword from Keyword_german_drivers_license_collaborative is found.
A keyword from Keyword_german_drivers_license is found.
The checksum passes.

<!-- German Driver's License Number -->


<Entity id="91da9335-1edb-45b7-a95f-5fe41a16c63c" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_german_drivers_license" />
<Any minMatches="1">
<Match idRef="Keyword_german_drivers_license_number" />
<Match idRef="Keyword_german_drivers_license_collaborative" />
<Match idRef="Keyword_german_drivers_license" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_german_drivers_license_number
Führerschein
Fuhrerschein
Fuehrerschein
Führerscheinnummer
Fuhrerscheinnummer
Fuehrerscheinnummer
Führerschein-
Fuhrerschein-
Fuehrerschein-
FührerscheinnummerNr
FuhrerscheinnummerNr
FuehrerscheinnummerNr
FührerscheinnummerKlasse
FuhrerscheinnummerKlasse
FuehrerscheinnummerKlasse
Führerschein- Nr
Fuhrerschein- Nr
Fuehrerschein- Nr
Führerschein- Klasse
Fuhrerschein- Klasse
Fuehrerschein- Klasse
FührerscheinnummerNr
FuhrerscheinnummerNr
FuehrerscheinnummerNr
FührerscheinnummerKlasse
FuhrerscheinnummerKlasse
FuehrerscheinnummerKlasse
Führerschein- Nr
Fuhrerschein- Nr
Fuehrerschein- Nr
Führerschein- Klasse
Fuhrerschein- Klasse
Fuehrerschein- Klasse
DL
DLS
Driv Lic
Driv Licen
Driv License
Driv Licenses
Driv Licence
Driv Licences
Driv Lic
Driver Licen
Driver License
Driver Licenses
Driver Licence
Driver Licences
Drivers Lic
Drivers Licen
Drivers License
Drivers Licenses
Drivers Licence
Drivers Licences
Driver's Lic
Driver's Licen
Driver's License
Driver's Licenses
Driver's Licence
Driver's Licences
Driving Lic
Driving Licen
Driving License
Driving Licenses
Driving Licence
Driving Licences
Keyword_german_drivers_license_collaborative
Nr-Führerschein
Nr-Fuhrerschein
Nr-Fuehrerschein
No-Führerschein
No-Fuhrerschein
No-Fuehrerschein
N -Führerschein
N -Fuhrerschein
N -Fuehrerschein
Nr-Führerschein
Nr-Fuhrerschein
Nr-Fuehrerschein
No-Führerschein
No-Fuhrerschein
No-Fuehrerschein
N -Führerschein
N -Fuhrerschein
N -Fuehrerschein
Keyword_german_drivers_license
ausstellungsdatum
ausstellungsort
ausstellende behöde
ausstellende behorde
ausstellende behoerde

German Passport Number


Format
10 digits or letters
Pattern
Pattern must include all of the following:
First character is a digit or a letter from this set (C, F, G, H, J, K)
Three digits
Five digits or letters from this set (C, -H, J -N, P, R, T, V -Z )
A digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_german_passport finds content that matches the pattern.
A keyword from any of the five keyword lists is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_german_passport_data finds content that matches the pattern.
A keyword from any of the five keyword lists is found.
The checksum passes.

<!-- German Passport Number -->


<Entity id="2e3da144-d42b-47ed-b123-fbf78604e52c" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_german_passport" />
<Any minMatches="1">
<Match idRef="Keyword_german_passport" />
<Match idRef="Keyword_german_passport_collaborative" />
<Match idRef="Keyword_german_passport_number" />
<Match idRef="Keyword_german_passport1" />
<Match idRef="Keyword_german_passport2" />
</Any>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_german_passport_data" />
<Any minMatches="1">
<Match idRef="Keyword_german_passport" />
<Match idRef="Keyword_german_passport_collaborative" />
<Match idRef="Keyword_german_passport_number" />
<Match idRef="Keyword_german_passport1" />
<Match idRef="Keyword_german_passport2" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_german_passport
reisepass
reisepasse
reisepassnummer
passport
passports
Keyword_german_passport_collaborative
geburtsdatum
ausstellungsdatum
ausstellungsort
Keyword_german_passport_number
No-Reisepass Nr-Reisepass
Keyword_german_passport1
Reisepass-Nr
Keyword_german_passport2
bnationalit.t

Germany Identity Card Number


Format
Since 1 November 2010: Nine letters and digits
From 1 April 1987 until 31 October 2010: 10 digits
Pattern
Since 1 November 2010:
One letter (not case sensitive)
Eight digits
From 1 April 1987 until 31 October 2010:
10 digits
Checksum
No
Definition
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_germany_id_card finds content that matches the pattern.
A keyword from Keyword_germany_id_card is found.

<!-- Germany Identity Card Number -->


<Entity id="e577372f-c42e-47a0-9d85-bebed1c237d4" recommendedConfidence="65" patternsProximity="300">
<Pattern confidenceLevel="65">
<IdMatch idRef="Regex_germany_id_card"/>
<Match idRef="Keyword_germany_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_germany_id_card
Identity Card
ID
Identification
Personalausweis
Identifizierungsnummer
Ausweis
Identifikation

Greece National ID Card


Format
Combination of 7-8 letters and numbers plus a dash
Pattern
Seven letters and numbers (old format):
One letter (any letter of the Greek alphabet)
A dash
Six digits
Eight letters and numbers (new format):
Two letters whose uppercase character occurs in both the Greek and Latin alphabets (ABEZHIKMNOPTYX)
A dash
Six digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_greece_id_card finds content that matches the pattern.
A keyword from Keyword_greece_id_card is found.

<!-- Greece National ID Card -->


<Entity id="82568215-1da1-46d3-874a-d2294d81b5ac" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_greece_id_card"/>
<Match idRef="Keyword_greece_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_greece_id_card
Greek identity Card
Tautotita
Δελτίο αστυνομικής ταυτότητας
Ταυτότητα

Hong Kong Identity Card (HKID) Number


Format
Combination of 8-9 letters and numbers plus optional parentheses around the final character
Pattern
Combination of 8-9 letters:
1-2 letters (not case sensitive)
Six digits
The final character (any digit or the letter A), which is the check digit and is optionally enclosed in
parentheses.
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_hong_kong_id_card finds content that matches the pattern.
A keyword from Keyword_hong_kong_id_card is found.
The checksum passes.
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_hong_kong_id_card finds content that matches the pattern.
The checksum passes.

<!-- Hong Kong Identity Card (HKID) number -->


<Entity id="e63c28a7-ad29-4c17-a41a-3d2a0b70fd9c" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_hong_kong_id_card"/>
<Match idRef="Keyword_hong_kong_id_card"/>
</Pattern>
<Pattern confidenceLevel="65">
<IdMatch idRef="Func_hong_kong_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_hong_kong_id_card
hong kong identity card
HKIDC
id card
identity card
hk identity card
hong kong id
香港身份證
香港永久性居民身份證
身份證
身份証
身分證
身分証
香港身份証
香港身分證
香港身分証
香港身份證
香港居民身份證
香港居民身份証
香港居民身分證
香港居民身分証
香港永久性居民身份証
香港永久性居民身分證
香港永久性居民身分証
香港永久性居民身份證
香港非永久性居民身份證
香港非永久性居民身份証
香港非永久性居民身分證
香港非永久性居民身分証
香港特別行政區永久性居民身份證
香港特別行政區永久性居民身份証
香港特別行政區永久性居民身分證
香港特別行政區永久性居民身分証
香港特別行政區非永久性居民身份證
香港特別行政區非永久性居民身份証
香港特別行政區非永久性居民身分證
香港特別行政區非永久性居民身分証

India Permanent Account Number (PAN)


Format
10 letters or digits
Pattern
10 letters or digits:
Five letters (not case sensitive)
Four digits
A letter which is an alphabetic check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_india_permanent_account_number finds content that matches the pattern.
A keyword from Keyword_india_permanent_account_number is found.
The checksum passes.

<!-- India Permanent Account Number -->


<Entity id="2602bfee-9bb0-47a5-a7a6-2bf3053e2804" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_india_permanent_account_number"/>
<Match idRef="Keyword_india_permanent_account_number"/>
</Pattern>
</Entity>
Keywords
Keyword_india_permanent_account_number
Permanent Account Number
PAN

India Unique Identification (Aadhaar) Number


Format
12 digits containing optional spaces or dashes
Pattern
12 digits:
Four digits
An optional space or dash
Four digits
An optional space or dash
The final digit which is the check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters: The function Func_india_aadhaar finds content that matches the pattern. A keyword from
Keyword_india_aadhar is found. The checksum passes. A DLP policy is 75% confident that it's detected this type
of sensitive information if, within a proximity of 300 characters: The function Func_india_aadhaar finds content
that matches the pattern. The checksum passes.
Keywords
Keyword_india_aadhar
Aadhar
Aadhaar
UID

Indonesia Identity Card (KTP) Number


Format
16 digits containing optional periods
Pattern
16 digits:
Two-digit province code
A period (optional)
Two-digit regency or city code
Two-digit subdistrict code
A period (optional)
Six digits in the format DDMMYY which are the date of birth
A period (optional)
Four digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_indonesia_id_card finds content that matches the pattern.
A keyword from Keyword_indonesia_id_card is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_indonesia_id_card finds content that matches the pattern.

<!-- Indonesia Identity Card (KTP) Number -->


<Entity id="da68fdb0-f383-4981-8c86-82689d3b7d55" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_indonesia_id_card"/>
<Match idRef="Keyword_indonesia_id_card"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_indonesia_id_card"/>
</Pattern>
</Entity>

Keywords
Keyword_indonesia_id_card
KTP
Kartu Tanda Penduduk
Nomor Induk Kependudukan

International Banking Account Number (IBAN)


Format
Country code (two letters) plus check digits (two digits) plus bban number (up to 30 characters)
Pattern
Pattern must include all of the following:
Two-letter country code
Two check digits (followed by an optional space)
1-7 groups of four letters or digits (can be separated by spaces)
1-3 letters or digits
The format for each country is slightly different. The IBAN sensitive information type covers these 60 countries:
ad, ae, al, at, az, ba, be, bg, bh, ch, cr, cy, cz, de, dk, do, ee, es, fi, fo, fr, gb, ge, gi, gl, gr, hr, hu, ie, il, is, it, kw, kz, lb, li,
lt, lu, lv, mc, md, me, mk, mr, mt, mu, nl, no, pl, pt, ro, rs, sa, se, si, sk, sm, tn, tr, vg
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_iban finds content that matches the pattern.
The checksum passes.

<Entity id="e7dc4711-11b7-4cb0-b88b-2c394a771f0e" patternsProximity="300" recommendedConfidence="85">


<Pattern confidenceLevel="85">
<IdMatch idRef="Func_iban" />
</Pattern>
</Entity>

Keywords
None

IP Address
Format
IPv4:
Complex pattern which accounts for formatted (periods) and unformatted (no periods) versions of the IPv4
addresses
IPv6:
Complex pattern which accounts for formatted IPv6 numbers (which include colons)
Pattern
Checksum
No
Definition
For IPv6, a DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity
of 300 characters:
The regular expression Regex_ipv6_address finds content that matches the pattern.
No keyword from Keyword_ipaddress is found.
For IPv4, a DLP policy is 95% confident that it's detected this type of sensitive information if, within a proximity
of 300 characters:
The regular expression Regex_ipv4_address finds content that matches the pattern.
A keyword from Keyword_ipaddress is found.
For IPv6, a DLP policy is 95% confident that it's detected this type of sensitive information if, within a proximity
of 300 characters:
The regular expression Regex_ipv6_address finds content that matches the pattern.
No keyword from Keyword_ipaddress is found.
<!-- IP Address -->
<Entity id="1daa4ad5-e2dd-4ca4-a788-54722c09efb2" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_ipv6_address" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_ipaddress" />
</Any>
</Pattern>
<Pattern confidenceLevel="95">
<IdMatch idRef="Regex_ipv4_address" />
<Any minMatches="1">
<Match idRef="Keyword_ipaddress" />
</Any>
</Pattern>
<Pattern confidenceLevel="95">
<IdMatch idRef="Regex_ipv6_address" />
<Any minMatches="1">
<Match idRef="Keyword_ipaddress" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_ipaddress
IP (this keyword is case sensitive)
ip address
ip addresses
internet protocol
IP -‫כתובת ה‬

International Classification of Diseases (ICD-10-CM)


Format
Dictionary
Pattern
Keyword
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
A keyword from Dictionary_icd_10_cm is found.

<!-- ICD-10 CM -->


<Entity id="3356946c-6bb7-449b-b253-6ffa419c0ce7" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Dictionary_icd_10_cm" />
</Pattern>
</Entity>

Keywords
Any term from the Dictionary_icd_10_cm keyword dictionary, which is based on the International Classification
of Diseases, Tenth Revision, Clinical Modification (ICD -10-CM ). This type looks only for the term, not the
insurance codes.

International Classification of Diseases (ICD-9-CM)


Format
Dictionary
Pattern
Keyword
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
A keyword from Dictionary_icd_9_cm is found.

<Entity id="fa3f9c74-ee07-4c52-b5f2-085d6b2c0ec4" patternsProximity="300" recommendedConfidence="85">


<Pattern confidenceLevel="85">
<IdMatch idRef="Dictionary_icd_9_cm" />
</Pattern>
</Entity>

Keywords
Any term from the Dictionary_icd_9_cm keyword dictionary, which is based on the International Classification
of Diseases,Ninth Revision, Clinical Modification (ICD -9-CM ). This type looks only for the term, not the
insurance codes.

Ireland Personal Public Service (PPS) Number


Format
Old format (until 31 Dec 2012):
Seven digits followed by 1-2 letters
New format (1 Jan 2013 and after):
Seven digits followed by two letters
Pattern
Old format (until 31 Dec 2012):
Seven digits
1-2 letters (not case sensitive)
New format (1 Jan 2013 and after):
Seven digits
A letter (not case sensitive) which is an alphabetic check digit
The letter "A" or "H" (not case sensitive)
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_ireland_pps finds content that matches the pattern.
One of the following is true:
A keyword from Keyword_ireland_pps is found.
The function Func_eu_date finds a date in the right date format.
The checksum passes.
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_ireland_pps finds content that matches the pattern.
The checksum passes.

<!-- Ireland Personal Public Service (PPS) Number -->


<Entity id="1cdb674d-c19a-4fcf-9f4b-7f56cc87345a" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_ireland_pps"/>
<Any minMatches="1">
<Match idRef="Keyword_ireland_pps"/>
<Match idRef="Func_eu_date"/>
</Any>
</Pattern>
<Pattern confidenceLevel="65">
<IdMatch idRef="Func_ireland_pps"/>
</Pattern>
</Entity>

Keywords
Keyword_ireland_pps
Personal Public Service Number
PPS Number
PPS Num
PPS No.
PPS #
PPS#
PPSN
Public Services Card
Uimhir Phearsanta Seirbhíse Poiblí
Uimh. PSP
PSP

Israel Bank Account Number


Format
13 digits
Pattern
Formatted:
Two digits
A dash
Three digits
A dash
Eight digits
Unformatted:
13 consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_israel_bank_account_number finds content that matches the pattern.
A keyword from Keyword_israel_bank_account_number is found.

<!-- Israel Bank Account Number -->


<Entity id="7d08b2ff-a0b9-437f-957c-aeddbf9b2b25" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_israel_bank_account_number" />
<Any minMatches="1">
<Match idRef="Keyword_israel_bank_account_number" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_israel_bank_account_number
Bank Account Number
Bank Account
Account Number
‫מספר ח שבון בנק‬

Israel National ID
Format
Nine digits
Pattern
Nine consecutive digits
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_israeli_national_id_number finds content that matches the pattern.
A keyword from Keyword_Israel_National_ID is found.
The checksum passes.
<!-- Israel National ID Number -->
<Entity id="e05881f5-1db1-418c-89aa-a3ac5c5277ee" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_israeli_national_id_number" />
<Any minMatches="1">
<Match idRef="Keyword_Israel_National_ID" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_Israel_National_ID
‫מספר זהות‬
National ID Number

Italy Driver's License Number


Format
A combination of 10 letters and digits
Pattern
A combination of 10 letters and digits:
One letter (not case sensitive)
The letter "A" or "V" (not case sensitive)
Seven letters (not case sensitive), digits, or the underscore character
One letter (not case sensitive)
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_italy_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_italy_drivers_license_number is found.

<!-- Italy Driver's license Number -->


<Entity id="97d6244f-9157-41bd-8e0c-9d669a5c4d71" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_italy_drivers_license_number" />
<Any minMatches="1">
<Match idRef="Keyword_italy_drivers_license_number" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_italy_drivers_license_number
numero di patente di guida
patente di guida

Japan Bank Account Number


Format
Seven or eight digits
Pattern
Bank account number:
Seven or eight digits
Bank account branch code:
Four digits
A space or dash (optional)
Three digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_bank_account finds content that matches the pattern.
A keyword from Keyword_jp_bank_account is found.
One of the following is true:
The function Func_jp_bank_account_branch_code finds content that matches the pattern.
A keyword from Keyword_jp_bank_branch_code is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_bank_account finds content that matches the pattern.
A keyword from Keyword_jp_bank_account is found.

<!-- Japan Bank Account Number -->


<Entity id="d354f95b-96ee-4b80-80bc-4377312b55bc" patternsProximity="300" recommendedConfidence="75">
<Version minEngineVersion="15.01.0131.000">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_jp_bank_account" />
<Match idRef="Keyword_jp_bank_account" />
<Any minMatches="1">
<Match idRef="Func_jp_bank_account_branch_code" />
<Match idRef="Keyword_jp_bank_branch_code" />
</Any>
</Pattern>
</Version>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_jp_bank_account" />
<Match idRef="Keyword_jp_bank_account" />
</Pattern>
</Entity>

Keywords
Keyword_jp_bank_account
Checking Account Number
Checking Account
Checking Account #
Checking Acct Number
Checking Acct #
Checking Acct No.
Checking Account No.
Bank Account Number
Bank Account
Bank Account #
Bank Acct Number
Bank Acct #
Bank Acct No.
Bank Account No.
Savings Account Number
Savings Account
Savings Account #
Savings Acct Number
Savings Acct #
Savings Acct No.
Savings Account No.
Debit Account Number
Debit Account
Debit Account #
Debit Acct Number
Debit Acct #
Debit Acct No.
Debit Account No.
口座番号を当座預金口座の確認
#アカウントの確認、勘定番号の確認
#勘定の確認
勘定番号の確認
口座番号の確認
銀行口座番号
銀行口座
銀行口座#
銀行の勘定番号
銀行のacct#
銀行の勘定いいえ
銀行口座番号
普通預金口座番号
預金口座
貯蓄口座#
貯蓄勘定の数
貯蓄勘定#
貯蓄勘定番号
普通預金口座番号
引き落とし口座番号
口座番号
口座番号#
デビットのacct番号
デビット勘定#
デビットACCT の番号
デビット口座番号

Keyword_jp_bank_branch_code
Otemachi

Japan Driver's License Number


Format
12 digits
Pattern
12 consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_jp_drivers_license_number is found.

<!-- Japan Driver's License Number -->


<Entity id="c6011143-d087-451c-8313-7f6d4aed2270" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_jp_drivers_license_number" />
<Match idRef ="Keyword_jp_drivers_license_number" />
</Pattern>
</Entity>

Keywords
Keyword_jp_drivers_license_number
dl#
DL #
dls#
DLS #
driver license
driver licenses
drivers license
driver's license
drivers licenses
driver's licenses
driving licence
lic#
LIC #
lics#
state id
state identification
state identification number
低所得国#
免許証
状態ID
状態の識別
状態の識別番号
運転免許
運転免許証
運転免許証番号

Japan Passport Number


Format
Two letters followed by seven digits
Pattern
Two letters (not case sensitive) followed by seven digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_passport finds content that matches the pattern.
A keyword from Keyword_jp_passport is found.

<!-- Japan Passport Number -->


<Entity id="75177310-1a09-4613-bf6d-833aae3743f8" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_jp_passport" />
<Match idRef="Keyword_jp_passport" />
</Pattern>
</Entity>

Keywords
Keyword_jp_passport
パスポート
パスポート番号
パスポートのNum
パスポート#

Japan Resident Registration Number


Format
11 digits
Pattern
11 consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_resident_registration_number finds content that matches the pattern.
A keyword from Keyword_jp_resident_registration_number is found.

<!-- Japan Resident Registration Number -->


<Entity id="01c1209b-6389-4faf-a5f8-3f7e13899652" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_jp_resident_registration_number" />
<Match idRef ="Keyword_jp_resident_registration_number" />
</Pattern>
</Entity>

Keywords
Keyword_jp_resident_registration_number
Resident Registration Number
Resident Register Number
Residents Basic Registry Number
Resident Registration No.
Resident Register No.
Residents Basic Registry No.
Basic Resident Register No.
住民登録番号、登録番号をレジデント
住民基本登録番号、登録番号
住民基本レジストリ番号を常駐
登録番号を常駐住民基本台帳登録番号

Japan Social Insurance Number (SIN)


Format
7-12 digits
Pattern
7-12 digits:
Four digits
A hyphen (optional)
Six digits OR
7-12 consecutive digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_sin finds content that matches the pattern.
A keyword from Keyword_jp_sin is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_jp_sin_pre_1997 finds content that matches the pattern.
A keyword from Keyword_jp_sin is found.

<!-- Japan Social Insurance Number -->


<Entity id="c840e719-0896-45bb-84fd-1ed5c95e45ff" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_jp_sin" />
<Match idRef="Keyword_jp_sin" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_jp_sin_pre_1997" />
<Match idRef="Keyword_jp_sin" />
</Pattern>
</Entity>

Keywords
Keyword_jp_sin
Social Insurance No.
Social Insurance Num
Social Insurance Number
社会保険のテンキー
社会保険番号

Japanese Residence Card Number


Format
12 letters and digits
Pattern
12 letters and digits:
Two letters (not case sensitive)
Eight digits
Two letters (not case sensitive)
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_jp_residence_card_number finds content that matches the pattern.
A keyword from Keyword_jp_residence_card_number is found.

<!--Japan Residence Card Number-->


-<Entity id="ac36fef2-a289-4e2c-bb48-b02366e89fc0" recommendedConfidence="75" patternsProximity="300">
-<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_jp_residence_card_number"/>
<Match idRef="Keyword_jp_residence_card_number"/>
</Pattern>
</Entity>

Keywords
Keyword_jp_residence_card_number
Residence card number
Residence card no
Residence card #
在留カード番号

Malaysia ID Card Number


Format
12 digits containing optional hyphens
Pattern
12 digits:
Six digits in the format YYMMDD which are the date of birth
A dash (optional)
Two-letter place-of-birth code
A dash (optional)
Three random digits
One-digit gender code
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_malaysia_id_card_number finds content that matches the pattern.
A keyword from Keyword_malaysia_id_card_number is found.

<!-- Malaysia ID Card Number -->


</Entity>
<Entity id="7f0e921c-9677-435b-aba2-bb8f1013c749" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_malaysia_id_card_number" />
<Match idRef="Keyword_malaysia_id_card_number" />
</Pattern>
</Entity>

Keywords
Keyword_malaysia_id_card_number
digital application card
i/c
i/c no
ic
ic no
id card
identification Card
identity card
k/p
k/p no
kad akuan diri
kad aplikasi digital
kad pengenalan malaysia
kp
kp no
mykad
mykas
mykid
mypr
mytentera
malaysia identity card
malaysian identity card
nric
personal identification card

Netherlands Citizen's Service (BSN) Number


Format
8-9 digits containing optional spaces
Pattern
8-9 digits:
Three digits
A space (optional)
Three digits
A space (optional)
2-3 digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_netherlands_bsn finds content that matches the pattern.
A keyword from Keyword_netherlands_bsn is found.
The function Func_eu_date2 finds a date in the right date format.
The checksum passes.

<!-- Netherlands Citizen's Service (BSN) Number -->


<Entity id="c5f54253-ef7e-44f6-a578-440ed67e946d" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_netherlands_bsn" />
<Match idRef="Keyword_netherlands_bsn" />
<Match idRef="Func_eu_date2" />
</Pattern>
</Entity>

Keywords
Keyword_netherlands_bsn
Citizen service number
BSN
Burgerservicenummer
Sofinummer
Persoonsgebonden nummer
Persoonsnummer

New Zealand Ministry of Health Number


Format
Three letters, a space (optional), and four digits
Pattern
Three letters (not case sensitive) a space (optional) four digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_new_zealand_ministry_of_health_number finds content that matches the pattern.
A keyword from Keyword_nz_terms is found.
The checksum passes.

<!-- New Zealand Health Number -->


<Entity id="2b71c1c8-d14e-4430-82dc-fd1ed6bf05c7" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_new_zealand_ministry_of_health_number" />
<Any minMatches="1">
<Match idRef="Keyword_nz_terms" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_nz_terms
NHI
New Zealand
Health
treatment

Norway Identification Number


Format
11 digits
Pattern
11 digits:
Six digits in the format DDMMYY which are the date of birth
Three-digit individual number
Two check digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_norway_id_number finds content that matches the pattern.
A keyword from Keyword_norway_id_number is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_norway_id_numbe finds content that matches the pattern.
The checksum passes.

<!-- Norway Identification Number -->


<Entity id="d4c8a798-e9f2-4bd3-9652-500d24080fc3" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_norway_id_number"/>
<Match idRef="Keyword_norway_id_number"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_norway_id_number"/>
</Pattern>
</Entity>

Keywords
Keyword_norway_id_number
Personal identification number
Norwegian ID Number
ID Number
Identification
Personnummer
Fødselsnummer

Philippines Unified Multi-Purpose ID Number


Format
12 digits separated by hyphens
Pattern
12 digits:
Four digits
A hyphen
Seven digits
A hyphen
One digit
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_philippines_unified_id finds content that matches the pattern.
A keyword from Keyword_philippines_id is found.

<!-- Philippines Unified Multi-Purpose ID number -->


<Entity id="019b39dd-8c25-4765-91a3-d9c6baf3c3b3" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_philippines_unified_id"/>
<Match idRef="Keyword_philippines_id"/>
</Pattern>
</Entity>

Keywords
Keyword_philippines_id
Unified Multi-Purpose ID
UMID
Identity Card
Pinag-isang Multi-Layunin ID

Poland Identity Card


Format
Three letters and six digits
Pattern
Three letters (not case sensitive) followed by six digits
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters: The function Func_polish_national_id finds content that matches the pattern. A keyword from
Keyword_polish_national_id_passport_number is found. The checksum passes.

<!-- Poland Identity Card-->


<Entity id="25E64989-ED5D-40CA-A939-6C14183BB7BF" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_polish_national_id" />
<Match idRef="Keyword_polish_national_id_passport_number" />
</Pattern>
</Entity>

Keywords
Keyword_polish_national_id_passport_number
Dowód osobisty
Numer dowodu osobistego
Nazwa i numer dowodu osobistego
Nazwa i nr dowodu osobistego
Nazwa i nr dowodu tożsamości
Dowód Tożsamości
dow. os.

Poland National ID (PESEL)


Format
11 digits
Pattern
11 consecutive digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_pesel_identification_number finds content that matches the pattern.
A keyword from Keyword_pesel_identification_number is found.
The checksum passes.

<!-- Poland National ID (PESEL) -->


<Entity id="E3AAF206-4297-412F-9E06-BA8487E22456" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_pesel_identification_number" />
<Match idRef="Keyword_pesel_identification_number" />
</Pattern>
</Entity>

Keywords
Keyword_pesel_identification_number
Nr PESEL
PESEL

Poland Passport
Format
Two letters and seven digits
Pattern
Two letters (not case sensitive) followed by seven digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_polish_passport_number finds content that matches the pattern.
A keyword from Keyword_polish_national_id_passport_number is found.
The checksum passes.
<!-- Poland Passport Number -->
<Entity id="03937FB5-D2B6-4487-B61F-0F8BFF7C3517" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_polish_passport_number" />
<Match idRef="Keyword_polish_national_id_passport_number" />
</Pattern>
</Entity>
</Version>

Keywords
Keyword_polish_national_id_passport_number
Numer paszportu
Nr. Paszportu
Paszport

Portugal Citizen Card Number


Format
Eight digits
Pattern
Eight digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_portugal_citizen_card finds content that matches the pattern.
A keyword from Keyword_portugal_citizen_card is found.

<!-- Portugal Citizen Card Number -->


<Entity id="91a7ece2-add4-4986-9a15-c84544d81ecd" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_portugal_citizen_card"/>
<Match idRef="Keyword_portugal_citizen_card"/>
</Pattern>
</Entity>

Keywords
Keyword_portugal_citizen_card
Citizen Card
National ID Card
CC
Cartão de Cidadão
Bilhete de Identidade

Saudi Arabia National ID


Format
10 digits
Pattern
10 consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_saudi_arabia_national_id finds content that matches the pattern.
A keyword from Keyword_saudi_arabia_national_id is found.

<!-- Saudi Arabia National ID -->


<Entity id="8c5a0ba8-404a-41a3-8871-746aa21ee6c0" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_saudi_arabia_national_id" />
<Any minMatches="1">
<Match idRef="Keyword_saudi_arabia_national_id" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_saudi_arabia_national_id
Identification Card
I card number
ID number
‫اﻟﻮﻃﻨﻴﺔ اﻟﻬﻮ ﻳﺔ ﺑﻄﺎﻗﺔ رﻗﻢ‬

Singapore National Registration Identity Card (NRIC) Number


Format
Nine letters and digits
Pattern
Nine letters and digits:
The letter "F", "G", "S", or "T" (not case sensitive)
Seven digits
An alphabetic check digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_singapore_nric finds content that matches the pattern.
A keyword from Keyword_singapore_nric is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_singapore_nric finds content that matches the pattern.
The checksum passes.

<!-- Singapore National Registration Identity Card (NRIC) Number -->


<Entity id="cead390a-dd83-4856-9751-fb6dc98c34da" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_singapore_nric"/>
<Match idRef="Keyword_singapore_nric"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_singapore_nric"/>
</Pattern>
</Entity>

Keywords
Keyword_singapore_nric
National Registration Identity Card
Identity Card Number
NRIC
IC
Foreign Identification Number
FIN
身份证
身份證

South Africa Identification Number


Format
13 digits that may contain spaces
Pattern
13 digits:
Six digits in the format YYMMDD which are the date of birth
Four digits
A single-digit citizenship indicator
The digit "8" or "9"
One digit which is a checksum digit
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_south_africa_identification_number finds content that matches the pattern.
A keyword from Keyword_south_africa_identification_number is found.
The checksum passes.
<!-- South Africa Identification Number -->
<Entity id="e2adf7cb-8ea6-4048-a2ed-d89eb65f2780" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_south_africa_identification_number"/>
<Match idRef="Keyword_south_africa_identification_number"/>
</Pattern>
</Entity>

Keywords
Keyword_south_africa_identification_number
Identity card
ID
Identification

South Korea Resident Registration Number


Format
13 digits containing a hyphen
Pattern
13 digits:
Six digits in the format YYMMDD which are the date of birth
A hyphen
One digit determined by the century and gender
Four-digit region-of-birth code
One digit used to differentiate people for whom the preceding numbers are identical
A check digit.
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_south_korea_resident_number finds content that matches the pattern.
A keyword from Keyword_south_korea_resident_number is found.
The checksum passes.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_south_korea_resident_number finds content that matches the pattern.
The checksum passes.
<!-- South Korea Resident Registration Number -->
<Entity id="5b802e18-ba80-44c4-bc83-bf2ad36ae36a" recommendedConfidence="85" patternsProximity="300">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_south_korea_resident_number"/>
<Match idRef="Keyword_south_korea_resident_number"/>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_south_korea_resident_number"/>
</Pattern>
</Entity>

Keywords
Keyword_south_korea_resident_number
National ID card
Citizen's Registration Number
Jumin deungnok beonho
RRN
주민등록번호

Spain Social Security Number (SSN)


Format
11-12 digits
Pattern
11-12 digits:
Two digits
A forward slash (optional)
7-8 digits
A forward slash (optional)
Two digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_spanish_social_security_number finds content that matches the pattern.
The checksum passes.

<!-- Spain SSN -->


<Entity id="5df987c0-8eae-4bce-ace7-b316347f3070" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_spanish_social_security_number" />
</Pattern>
</Entity>

Keywords
None
Sweden National ID
Format
10 or 12 digits and an optional delimiter
Pattern
10 or 12 digits and an optional delimiter:
2-4 digits (optional)
Six digits in date format YYMMDD
Delimiter of "-" or "+" (optional), plus
Four digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_swedish_national_identifier finds content that matches the pattern.
The checksum passes.

<!-- Sweden National ID -->


<Entity id="f69aaf40-79be-4fac-8f05-fd1910d272c8" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_swedish_national_identifier" />
</Pattern>
</Entity>

Keywords
No

Sweden Passport Number


Format
Eight digits
Pattern
Eight consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_sweden_passport_number finds content that matches the pattern.
One of the following is true:
A keyword from Keyword_passport is found.
A keyword from Keyword_sweden_passport is found.
<!-- Sweden Passport Number -->
<Entity id="ba4e7456-55a9-4d89-9140-c33673553526" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_sweden_passport_number" />
<Any minMatches="1">
<Match idRef="Keyword_passport" />
<Match idRef="Keyword_sweden_passport" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_sweden_passport
visa requirements
Alien Registration Card
Schengen visas
Schengen visa
Visa Processing
Visa Type
Single Entry
Multiple Entry
G3 Processing Fees
Keyword_passport
Passport Number
Passport No
Passport #
Passport#
PassportID
Passportno
passportnumber
パスポート
パスポート番号
パスポートのNum
パスポート#
Numéro de passeport
Passeport n °
Passeport Non
Passeport #
Passeport#
PasseportNon
Passeportn °

SWIFT Code
Format
Four letters followed by 5-31 letters or digits
Pattern
Four letters followed by 5-31 letters or digits:
Four-letter bank code (not case sensitive)
An optional space
4-28 letters or digits (the Basic Bank Account Number (BBAN ))
An optional space
1-3 letters or digits (remainder of the BBAN )
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_swift finds content that matches the pattern.
A keyword from Keyword_swift is found.

<Entity id="cb2ab58c-9cb8-4c81-baf8-a4e106791df4" patternsProximity="300" recommendedConfidence="75">


<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_swift" />
<Match idRef="Keyword_swift" />
</Pattern>
</Entity>

Keywords
Keyword_swift
international organization for standardization 9362
iso 9362
iso9362
swift#
swiftcode
swiftnumber
swiftroutingnumber
swift code
swift number #
swift routing number
bic number
bic code
bic #
bic#
bank identifier code
標準化9362
迅速#
SWIFTコード
SWIFT番号
迅速なルーティング番号
BIC 番号
BIC コード
銀行識別コードのための国際組織
Organisation internationale de normalisation 9362
rapide #
code SWIFT
le numéro de swift
swift numéro d'acheminement
le numéro BIC
# BIC
code identificateur de banque

Taiwan National ID
Format
One letter (in English) followed by nine digits
Pattern
One letter (in English) followed by nine digits:
One letter (in English, not case sensitive)
The digit "1" or "2"
Eight digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_taiwanese_national_id finds content that matches the pattern.
A keyword from Keyword_taiwanese_national_id is found.
The checksum passes.

<!-- Taiwanese National ID -->


<Entity id="4C7BFC34-8DD1-421D-8FB7-6C6182C2AF03" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_taiwanese_national_id" />
<Match idRef="Keyword_taiwanese_national_id" />
</Pattern>
</Entity>

Keywords
Keyword_taiwanese_national_id
身份證字號
身份證
身份證號碼
身份證號
身分證字號
身分證
身分證號碼
身份證號
身分證統一編號
國民身分證統一編號
簽名
蓋章
簽名或蓋章
簽章

Taiwan Passport Number


Format
Biometric passport number: Nine digits
Non-biometric passport number: Nine digits
Pattern
Biometric passport number:
The digit "3"
Eight digits
Non-biometric passport number:
Nine digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_taiwan_passport finds content that matches the pattern.
A keyword from Keyword_taiwan_passport is found.

<!-- Taiwan Passport Number -->


<Entity id="e7251cb4-4c2c-41df-963e-924eb3dae04a" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_taiwan_passport"/>
<Match idRef="Keyword_taiwan_passport"/>
</Pattern>
</Entity>

Keywords
Keyword_taiwan_passport
ROC passport number
Passport number
Passport no
Passport Num
Passport #
护照
中華民國護照
Zhōnghuá Mínguó hùzhào

Taiwan Resident Certificate (ARC/TARC) Number


Format
10 letters and digits
Pattern
10 letters and digits:
Two letters (not case sensitive)
Eight digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_taiwan_resident_certificate finds content that matches the pattern.
A keyword from Keyword_taiwan_resident_certificate is found.

<!-- Taiwan Resident Certificate (ARC/TARC) -->


<Entity id="48269fec-05ea-46ea-b326-f5623a58c6e9" recommendedConfidence="75" patternsProximity="300">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_taiwan_resident_certificate"/>
<Match idRef="Keyword_taiwan_resident_certificate"/>
</Pattern>
</Entity>

Keywords
Keyword_taiwan_resident_certificate
Resident Certificate
Resident Cert
Resident Cert.
Identification card
Alien Resident Certificate
ARC
Taiwan Area Resident Certificate
TARC
居留證
外僑居留證
台灣地區居留證

Thai Population Identification Code


Format
13 digits
Pattern
13 digits:
First digit is not 0 or 9
12 digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_Thai_Citizen_Id finds content that matches the pattern.
A keyword from Keyword_Thai_Citizen_Id is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_Thai_Citizen_Id finds content that matches the pattern.

<!-- Thai Citizen ID -->


-<Entity id="44ca9e86-ead7-4c5d-884a-e2eaa401515e" recommendedConfidence="75" patternsProximity="300">
-<Pattern confidenceLevel="85">
<IdMatch idRef="Func_Thai_Citizen_Id"/>
<Match idRef="Keyword_Thai_Citizen_Id"/>
</Pattern>
-<Pattern confidenceLevel="75">
<IdMatch idRef="Func_Thai_Citizen_Id"/>
</Pattern>
</Entity>

Keywords
Keyword_Thai_Citizen_Id
ID Number
Identification Number
บัตรประชาชน
รหัสบัตรประชาชน
บัตรประชาชน
รหัสบัตรประชาชน

Turkish National Identification Number


Format
11 digits
Pattern
11 digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_Turkish_National_Id finds content that matches the pattern.
A keyword from Keyword_Turkish_National_Id is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_Turkish_National_Id finds content that matches the pattern.
<!-- Turkish National Identity -->
-<Entity id="fb621f20-3876-4cfc-acec-8c8e73ca32c7" recommendedConfidence="75" patternsProximity="300">
-<Pattern confidenceLevel="85">
<IdMatch idRef="Func_Turkish_National_Id"/>
<Match idRef="Keyword_Turkish_National_Id"/>
</Pattern>
-<Pattern confidenceLevel="75">
<IdMatch idRef="Func_Turkish_National_Id"/>
</Pattern>
</Entity>

Keywords
Keyword_Turkish_National_Id
TC Kimlik No
TC Kimlik numarası
Vatandaşlık numarası
Vatandaşlık no

U.K. Driver's License Number


Format
Combination of 18 letters and digits in the specified format
Pattern
18 letters and digits:
Five letters (not case sensitive) or the digit "9" in place of a letter
One digit
Five digits in the date format DDMMY for date of birth
Two letters (not case sensitive) or the digit "9" in place of a letter
Five digits
Checksum
Yes
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_uk_drivers_license finds content that matches the pattern.
A keyword from Keyword_uk_drivers_license is found.
The checksum passes.

<!-- U.K. Driver's License Number -->


<Entity id="f93de4be-d94c-40df-a8be-461738047551" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_uk_drivers_license" />
<Match idRef="Keyword_uk_drivers_license" />
</Pattern>
</Entity>

Keywords
Keyword_uk_drivers_license
DVLA
light vans
quadbikes
motor cars
125cc
sidecar
tricycles
motorcycles
photocard licence
learner drivers
licence holder
licence holders
driving licences
driving licence
dual control car

U.K. Electoral Roll Number


Format
Two letters followed by 1-4 digits
Pattern
Two letters (not case sensitive) followed by 1-4 numbers
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_uk_electoral finds content that matches the pattern.
A keyword from Keyword_uk_electoral is found.

<!-- U.K. Electoral Number -->


<Entity id="a3eea206-dc0c-4f06-9e22-aa1be3059963" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_uk_electoral" />
<Any minMatches="1">
<Match idRef="Keyword_uk_electoral" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_uk_electoral
council nomination
nomination form
electoral register
electoral roll

U.K. National Health Service Number


Format
10-17 digits separated by spaces
Pattern
10-17 digits:
Either 3 or 10 digits
A space
Three digits
A space
Four digits
Checksum
Yes
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_uk_nhs_number finds content that matches the pattern.
One of the following is true:
A keyword from Keyword_uk_nhs_number is found.
A keyword from Keyword_uk_nhs_number1 is found.
A keyword from Keyword_uk_nhs_number_dob is found.
The checksum passes.

<!-- U.K. NHS Number -->


<Entity id="3192014e-2a16-44e9-aa69-4b20375c9a78" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_uk_nhs_number" />
<Any minMatches="1">
<Match idRef="Keyword_uk_nhs_number" />
<Match idRef="Keyword_uk_nhs_number1" />
<Match idRef="Keyword_uk_nhs_number_dob" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_uk_nhs_number
national health service
nhs
health services authority
health authority
Keyword_uk_nhs_number1
patient id
patient identification
patient no
patient number
Keyword_uk_nhs_number_dob
GP
DOB
D.O.B
Date of Birth
Birth Date

U.K. National Insurance Number (NINO)


Format
7 characters or 9 characters separated by spaces or dashes
Pattern
Two possible patterns:
Two letters (valid NINOs use only certain characters in this prefix, which this pattern validates; not case
sensitive)
Six digits
Either 'A', 'B', 'C', or 'D' (like the prefix, only certain characters are allowed in the suffix; not case sensitive)
OR
Two letters
A space or dash
Two digits
A space or dash
Two digits
A space or dash
Two digits
A space or dash
Either 'A', 'B', 'C', or 'D'
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_uk_nino finds content that matches the pattern.
A keyword from Keyword_uk_nino is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_uk_nino finds content that matches the pattern.
No keyword from Keyword_uk_nino is found.
<!-- U.K. NINO -->
<Entity id="16c07343-c26f-49d2-a987-3daf717e94cc" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_uk_nino" />
<Any minMatches="1">
<Match idRef="Keyword_uk_nino" />
</Any>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_uk_nino" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_uk_nino" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_uk_nino
national insurance number
national insurance contributions
protection act
insurance
social security number
insurance application
medical application
social insurance
medical attention
social security
great britain
insurance

U.S. / U.K. Passport Number


Format
Nine digits
Pattern
Nine consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_usa_uk_passport finds content that matches the pattern.
A keyword from Keyword_passport is found.
<Entity id="178ec42a-18b4-47cc-85c7-d62c92fd67f8" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_usa_uk_passport" />
<Match idRef="Keyword_passport" />
</Pattern>
</Entity>

Keywords
Keyword_passport
Passport Number
Passport No
Passport #
Passport#
PassportID
Passportno
passportnumber
パスポート
パスポート番号
パスポートのNum
パスポート#
Numéro de passeport
Passeport n °
Passeport Non
Passeport #
Passeport#
PasseportNon
Passeportn °

U.S. Bank Account Number


Format
8-17 digits
Pattern
8-17 consecutive digits
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The regular expression Regex_usa_bank_account_number finds content that matches the pattern.
A keyword from Keyword_usa_Bank_Account is found.
<!-- U.S. Bank Account Number -->
<Entity id="a2ce32a8-f935-4bb6-8e96-2a5157672e2c" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch idRef="Regex_usa_bank_account_number" />
<Match idRef="Keyword_usa_Bank_Account" />
</Pattern>
</Entity>

Keywords
Keyword_usa_Bank_Account
Checking Account Number
Checking Account
Checking Account #
Checking Acct Number
Checking Acct #
Checking Acct No.
Checking Account No.
Bank Account Number
Bank Account #
Bank Acct Number
Bank Acct #
Bank Acct No.
Bank Account No.
Savings Account Number
Savings Account.
Savings Account #
Savings Acct Number
Savings Acct #
Savings Acct No.
Savings Account No.
Debit Account Number
Debit Account
Debit Account #
Debit Acct Number
Debit Acct #
Debit Acct No.
Debit Account No.

U.S. Driver's License Number


Format
Depends on the state
Pattern
Depends on the state -- for example, New York:
Nine digits formatted like ddd ddd ddd will match.
Nine digits like ddddddddd will not match.
Checksum
No
Definition
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_new_york_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_[state_name]_drivers_license_name is found.
A keyword from Keyword_us_drivers_license is found.
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_new_york_drivers_license_number finds content that matches the pattern.
A keyword from Keyword_[state_name]_drivers_license_name is found.
A keyword from Keyword_us_drivers_license_abbreviations is found.
No keyword from Keyword_us_drivers_license is found.

<Pattern confidenceLevel="75">
<IdMatch idRef="Func_new_york_drivers_license_number" />
<Match idRef="Keyword_new_york_drivers_license_name" />
<Match idRef="Keyword_us_drivers_license" />
</Pattern>
<Pattern confidenceLevel="65">
<IdMatch idRef="Func_new_york_drivers_license_number" />
<Match idRef="Keyword_new_york_drivers_license_name" />
<Match idRef="Keyword_us_drivers_license_abbreviations" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_us_drivers_license" />
</Any>
</Pattern>

Keywords
Keyword_us_drivers_license_abbreviations
DL
DLS
CDL
CDLS
ID
IDs
DL#
DLS#
CDL#
CDLS#
ID#
IDs#
ID number
ID numbers
LIC
LIC#
Keyword_us_drivers_license
DriverLic
DriverLics
DriverLicense
DriverLicenses
Driver Lic
Driver Lics
Driver License
Driver Licenses
DriversLic
DriversLics
DriversLicense
DriversLicenses
Drivers Lic
Drivers Lics
Drivers License
Drivers Licenses
Driver'Lic
Driver'Lics
Driver'License
Driver'Licenses
Driver' Lic
Driver' Lics
Driver' License
Driver' Licenses
Driver'sLic
Driver'sLics
Driver'sLicense
Driver'sLicenses
Driver's Lic
Driver's Lics
Driver's License
Driver's Licenses
identification number
identification numbers
identification #
id card
id cards
identification card
identification cards
DriverLic#
DriverLics#
DriverLicense#
DriverLicenses#
Driver Lic#
Driver Lics#
Driver License#
Driver Licenses#
DriversLic#
DriversLics#
DriversLicense#
DriversLicenses#
Drivers Lic#
Drivers Lics#
Drivers License#
Drivers Licenses#
Driver'Lic#
Driver'Lics#
Driver'License#
Driver'Licenses#
Driver' Lic#
Driver' Lics#
Driver' License#
Driver' Licenses#
Driver'sLic#
Driver'sLics#
Driver'sLicense#
Driver'sLicenses#
Driver's Lic#
Driver's Lics#
Driver's License#
Driver's Licenses#
id card#
id cards#
identification card#
identification cards#
Keyword_[state_name]_drivers_license_name
State abbreviation (for example, "NY")
State name (for example, "New York")

U.S. Individual Taxpayer Identification Number (ITIN)


Format
Nine digits that start with a "9" and contain a "7" or "8" as the fourth digit, optionally formatted with spaces or
dashes
Pattern
Formatted:
The digit "9"
Two digits
A space or dash
A "7" or "8"
A digit
A space, or dash
Four digits
Unformatted:
The digit "9"
Two digits
A "7" or "8"
Five digits
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_formatted_itin finds content that matches the pattern.
At least one of the following is true:
A keyword from Keyword_itin is found.
The function Func_us_address finds an address in the right date format.
The function Func_us_date finds a date in the right date format.
A keyword from Keyword_itin_collaborative is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_unformatted_itin finds content that matches the pattern.
At least one of the following is true:
A keyword from Keyword_itin_collaborative is found.
The function Func_us_address finds an address in the right date format.
The function Func_us_date finds a date in the right date format.

<!-- U.S. Individual Taxpayer Identification Number (ITIN) -->


<Entity id="e55e2a32-f92d-4985-a35d-a0b269eb687b" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_formatted_itin" />
<Any minMatches="1">
<Match idRef="Keyword_itin" />
<Match idRef="Func_us_address" />
<Match idRef="Func_us_date" />
<Match idRef="Keyword_itin_collaborative" />
</Any>
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_unformatted_itin" />
<Match idRef="Keyword_itin" />
<Any minMatches="1">
<Match idRef="Keyword_itin_collaborative" />
<Match idRef="Func_us_address" />
<Match idRef="Func_us_date" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_itin
taxpayer
tax id
tax identification
itin
ssn
tin
social security
tax payer
itins
taxid
individual taxpayer
Keyword_itin_collaborative
License
DL
DOB
Birthdate
Birthday
Date of Birth

U.S. Social Security Number (SSN)


Format
9 digits, which may be in a formatted or unformatted pattern

NOTE
If issued before mid-2011, an SSN has strong formatting where certain parts of the number must fall within certain
ranges to be valid (but there's no checksum).

Pattern
Four functions look for SSNs in four different patterns:
Func_ssn finds SSNs with pre-2011 strong formatting that are formatted with dashes or spaces (ddd-dd-
dddd OR ddd dd dddd)
Func_unformatted_ssn finds SSNs with pre-2011 strong formatting that are unformatted as nine
consecutive digits (ddddddddd)
Func_randomized_formatted_ssn finds post-2011 SSNs that are formatted with dashes or spaces (ddd-dd-
dddd OR ddd dd dddd)
Func_randomized_unformatted_ssn finds post-2011 SSNs that are unformatted as nine consecutive digits
(ddddddddd)
Checksum
No
Definition
A DLP policy is 85% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_ssn finds content that matches the pattern.
A keyword from Keyword_ssn is found.
A DLP policy is 75% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_unformatted_ssn finds content that matches the pattern.
A keyword from Keyword_ssn is found.
A DLP policy is 65% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_randomized_formatted_ssn finds content that matches the pattern.
A keyword from Keyword_ssn is found.
The function Func_ssn does not find content that matches the pattern.
A DLP policy is 55% confident that it's detected this type of sensitive information if, within a proximity of 300
characters:
The function Func_randomized_unformatted_ssn finds content that matches the pattern.
A keyword from Keyword_ssn is found.
The function Func_unformatted_ssn does not find content that matches the pattern.

<!-- U.S. Social Security Number (SSN) -->


<Entity id="a44669fe-0d48-453d-a9b1-2cc83f2cba77" patternsProximity="300" recommendedConfidence="75">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_ssn" />
<Match idRef="Keyword_ssn" />
</Pattern>
<Pattern confidenceLevel="75">
<IdMatch idRef="Func_unformatted_ssn" />
<Match idRef="Keyword_ssn" />
</Pattern>
<Pattern confidenceLevel="65">
<IdMatch idRef="Func_randomized_formatted_ssn" />
<Match idRef="Keyword_ssn" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Func_ssn" />
</Any>
</Pattern>
<Pattern confidenceLevel="55">
<IdMatch idRef="Func_randomized_unformatted_ssn" />
<Match idRef="Keyword_ssn" />
<Any minMatches="0" maxMatches="0">
<Match idRef="Func_unformatted_ssn" />
</Any>
</Pattern>
</Entity>

Keywords
Keyword_ssn
Social Security
Social Security#
Soc Sec
SSN
SSNS
SSN#
SS#
SSID
What the DLP functions look for
8/24/2018 • 4 minutes to read • Edit Online

Data loss prevention (DLP ) includes sensitive information types, such as Credit Card Number and EU Debit Card
Number, which are ready for you to use in your DLP policies. These sensitive information types look for a specific
pattern and corroborate it by ensuring proper formatting, enforcing checksums, and looking for relevant keywords
or other information. Some of this functionality is performed by internal functions. For example, the Credit Card
Number sensitive information type uses a function to look for dates formatted like an expiration date, to help
corroborate that a number is a credit card number.
This topic explains what these functions look for, to help you understand how the predefined sensitive information
types work. For more information, see What the sensitive information types look for.

Func_us_date
This function looks for a date in the format commonly used in the U.S. This includes the formats
"month/day/year", "month-day-year", and "month day year ". The names or abbreviations of months are not case
sensitive.
Examples:
December 2, 2016
Dec 2, 2016
dec 02 2016
12/2/2016
12/02/16
Dec-2-2016
12-2-16
Accepted month names:
English
January, February, march, April, may, June, July, August, September, October, November, December
Jan. Feb. Mar. Apr. May June July Aug. Sept. Oct. Nov. Dec.

Func_eu_date
This function looks for a date in the format commonly used in the E.U. (and most places outside the U.S.). This
includes the formats "day/month/year", "day-month-year", and "day month year". The names or abbreviations of
months are not case sensitive.
Examples:
2 Dec 2016
02 dec 2016
2 Dec 16
2/12/2016
02/12/16
2-Dec-2016
2-12-16
Accepted month names:
English
January, February, march, April, may, June, July, August, September, October, November, December
Jan. Feb. Mar. Apr. May June July Aug. Sept. Oct. Nov. Dec.
Dutch
januari, februari, maart, April, mei, juni, juli, augustus, September, ocktober, October, November,
December
jan feb maart apr mei jun jul aug sep sept oct okt nov dec
French
janvier, février, mars, avril, mai, juin juillet, août, septembre, octobre, novembre, décembre
janv. févr. mars avril mai juin juil. août sept. oct. nov. déc.
German
jänuar, februar, märz, April, mai, juni juli, August, September, oktober, November, dezember
Jan./Jän. Feb. März Apr. Mai Juni Juli Aug. Sept. Okt. Nov. Dez.
Italian
gennaio, febbraio, marzo, aprile, maggio, giugno, luglio, agosto, settembre, ottobre, novembre,
dicembre
genn. febbr. mar. apr. magg. giugno luglio ag. sett. ott. nov. dic.
Portuguese
janeiro, fevereiro, março, marco, abril, maio, junho, julho, agosto, setembro, outubro, novembro,
dezembro
jan fev mar abr mai jun jul ago set out nov dez
Spanish
enero, febrero, marzo, abril, mayo, junio, julio, agosto, septiembre, octubre, noviembre, diciembre
enero feb. marzo abr. mayo jun. jul. agosto sept./set. oct. nov. dic.

Func_eu_date1 (deprecated)
NOTE
This function is deprecated because it supports only Portuguese month names, which are now included in the
Func_eu_date function above.

This function looks for a date in the format commonly used in Portuguese. The format for this function is the same
as Func_eu_date , differing only in the language used.
Examples:
2 Dez 2016
02 dez 2016
2 Dez 16
2/12/2016
02/12/16
2-Dez-2016
2-12-16
Accepted month names:
Portuguese
janeiro, fevereiro, março, marco, abril, maio, junho, julho, agosto, setembro, outubro, novembro,
dezembro
jan fev mar abr mai jun jul ago set out nov dez

Func_eu_date2 (deprecated)
NOTE
This function is deprecated because it supports only Dutch month names, which are now included in the Func_eu_date
function above.

This function looks for a date in the format commonly used in Dutch. The format for this function is the same as
Func_eu_date , differing only in the language used.

Examples:
2 Mei 2016
02 mei 2016
2 Mei 16
2/12/2016
02/12/16
2-Mei-2016
2-12-16
Accepted month names:
Dutch
januari, februari, maart, April, mei, juni, juli, augustus, September, ocktober, October, November,
December
jan feb maart apr mei jun jul aug sep sept oct okt nov dec
Func_expiration_date
This function looks for a date in the formats commonly used by credit and debit cards, which exclude days in favor
of months. This function will match dates in format of "month/year", "month-year", "[month name] year", and "
[month abbreviation] year". The names or abbreviations of months are not case sensitive.
Examples:
MM/YY -- for example, 01/11 or 1/11
MM/YYYY -- for example, 01/2011 or 1/2011
MM -YY -- for example, 01-22 or 1-11
MM -YYYY -- for example, 01-2000 or 1-2000
The following formats support YY or YYYY:
Month-YYYY -- for example, .Jan-2010 or january-2010 or Jan-10 or january-10
Month YYYY -- for example, 'january 2010' or 'Jan 2010' or 'january 10' or 'Jan 10'
MonthYYYY -- for example, 'january2010' or 'Jan2010' or 'january10' or 'Jan10'
Month/YYYY -- for example, 'january/2010' or 'Jan/2010' or 'january/10' or 'Jan/10'
Accepted month names:
English
January, February, march, April, may, June, July, August, September, October, November, December
Jan Feb Mar Apr May June July Aug Sept Oct Nov Dec

Func_us_address
This function looks for a U.S. state name or postal abbreviation followed by a valid zip code, just as they are used
in postal addresses. The zip code must be one of the correct zip codes associated with the U.S. state name or
abbreviation. The U.S. state name and zip code cannot be separated by punctuation or letters.
Examples:
Washington 98052
Washington 98052-9998
WA 98052
WA 98052-9998
Customize a built-in sensitive information type
10/31/2018 • 9 minutes to read • Edit Online

When looking for sensitive information in content, you need to describe that information in what's called a rule .
Data loss prevention (DLP ) includes rules for the most-common sensitive information types that you can use right
away. To use these rules, you have to include them in a policy. You might find that you want to adjust these built-in
rules to meet your organization's specific needs, and you can do that by creating a custom sensitive information
type. This topic shows you how to customize the XML file that contains the existing rule collection to detect a wider
range of potential credit-card information.
You can take this example and apply it to other built-in sensitive information types. For a list of default sensitive
information types and XML definitions, see What the sensitive information types look for.

Export the XML file of the current rules


To export the XML, you need to connect to the Security and Compliance Center via Remote PowerShell..
1. In the PowerShell, type the following to display your organization's rules on screen. If you haven't created
your own, you'll only see the default, built-in rules, labeled "Microsoft Rule Package."
Get-DlpSensitiveInformationTypeRulePackage

2. Store your organization's rules in a in a variable by typing the following. Storing something in a variable
makes it easily available later in a format that works for remote PowerShell commands.
$ruleCollections = Get-DlpSensitiveInformationTypeRulePackage

3. Make a formatted XML file with all that data by typing the following. ( Set-content is the part of the cmdlet
that writes the XML to the file.)
Set-Content -path "C:\custompath\exportedRules.xml" -Encoding Byte -Value
$ruleCollections.SerializedClassificationRuleCollection

IMPORTANT
Make sure that you use the file location where your rule pack is actually stored. C:\custompath\ is a placeholder.

Find the rule that you want to modify in the XML


The cmdlets above exported the entire rule collection , which includes the default rules we provide. Next you'll
need to look specifically for the Credit Card Number rule that you want to modify.
1. Use a text editor to open the XML file that you exported in the previous section.
2. Scroll down to the <Rules> tag, which is the start of the section that contains the DLP rules. (Because this
XML file contains the information for the entire rule collection, it contains other information at the top that
you need to scroll past to get to the rules.)
3. Look for Func_credit_card to find the Credit Card Number rule definition. (In the XML, rule names can't
contain spaces, so the spaces are usually replaced with underscores, and rule names are sometimes
abbreviated. An example of this is the U.S. Social Security number rule, which is abbreviated "SSN." The
Credit Card Number rule XML should look like the following code sample.
<Entity id="50842eb7-edc8-4019-85dd-5a5c1f2bb085"
patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
<Any minMatches="1">
<Match idRef="Keyword_cc_verification" />
<Match idRef="Keyword_cc_name" />
<Match idRef="Func_expiration_date" />
</Any>
</Pattern>
</Entity>

Now that you have located the Credit Card Number rule definition in the XML, you can customize the rule's XML
to meet your needs. (For a refresher on the XML definitions, see the Term glossary at the end of this topic.)

Modify the XML and create a new sensitive information type


First, you need to create a new sensitive information type because you can't directly modify the default rules. You
can do a wide variety of things with custom sensitive information types, which are outlined in Create a custom
sensitive information type in Office 365 Security & Compliance Center PowerShell. For this example, we'll keep it
simple and only remove corroborative evidence and add keywords to the Credit Card Number rule.
All XML rule definitions are built on the following general template. You need to copy and paste the Credit Card
Number definition XML in the template, modify some values (notice the ". . ." placeholders in the following
example), and then upload the modified XML as a new rule that can be used in policies.

<?xml version="1.0" encoding="utf-16"?>


<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce">
<RulePack id=". . .">
<Version major="1" minor="0" build="0" revision="0" />
<Publisher id=". . ." />
<Details defaultLangCode=". . .">
<LocalizedDetails langcode=" . . . ">
<PublisherName>. . .</PublisherName>
<Name>. . .</Name>
<Description>. . .</Description>
</LocalizedDetails>
</Details>
</RulePack>

<Rules>
<!-- Paste the Credit Card Number rule definition here.-->
<LocalizedStrings>
<Resource idRef=". . .">
<Name default="true" langcode=" . . . ">. . .</Name>
<Description default="true" langcode=". . ."> . . .</Description>
</Resource>
</LocalizedStrings>
</Rules>
</RulePackage>

Now, you have something that looks similar to the following XML. Because rule packages and rules are identified
by their unique GUIDs, you need to generate two GUIDs: one for the rule package and one to replace the GUID
for the Credit Card Number rule. (The GUID for the entity ID in the following code sample is the one for our built-
in rule definition, which you need to replace with a new one.) There are several ways to generate GUIDs, but you
can do it easily in PowerShell by typing [guid]::NewGuid().
<?xml version="1.0" encoding="utf-16"?>
<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce">
<RulePack id="8aac8390-e99f-4487-8d16-7f0cdee8defc">
<Version major="1" minor="0" build="0" revision="0" />
<Publisher id="8d34806e-cd65-4178-ba0e-5d7d712e5b66" />
<Details defaultLangCode="en">
<LocalizedDetails langcode="en">
<PublisherName>Contoso Ltd.</PublisherName>
<Name>Financial Information</Name>
<Description>Modified versions of the Microsoft rule package</Description>
</LocalizedDetails>
</Details>
</RulePack>

<Rules>
<Entity id="db80b3da-0056-436e-b0ca-1f4cf7080d1f"
patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
<Any minMatches="1">
<Match idRef="Keyword_cc_verification" />
<Match idRef="Keyword_cc_name" />
<Match idRef="Func_expiration_date" />
</Any>
</Pattern>
</Entity>
<LocalizedStrings>
<Resource idRef="db80b3da-0056-436e-b0ca-1f4cf7080d1f">
<!-- This is the GUID for the preceding Credit Card Number entity because the following text is for that
Entity. -->
<Name default="true" langcode="en-us">Modified Credit Card Number</Name>
<Description default="true" langcode="en-us">Credit Card Number that looks for additional keywords,
and another version of Credit Card Number that doesn't require keywords (but has a lower confidence level)
</Description>
</Resource>
</LocalizedStrings>
</Rules>
</RulePackage>

Remove the corroborative evidence requirement from a sensitive


information type
Now that you have a new sensitive information type that you're able to upload to the Security & Compliance
Center, the next step is to make the rule more specific. Modify the rule so that it only looks for a 16-digit number
that passes the checksum but doesn't require additional (corroborative) evidence (for example keywords). To do
this, you need to remove the part of the XML that looks for corroborative evidence. Corroborative evidence is very
helpful in reducing false positives because usually there are certain keywords or an expiration date near the credit
card number. If you remove that evidence, you should also adjust how confident you are that you found a credit
card number by lowering the confidenceLevel , which is 85 in the example.

<Entity id="db80b3da-0056-436e-b0ca-1f4cf7080d1f" patternsProximity="300"


<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
</Pattern>
</Entity>

Look for keywords that are specific to your organization


You might want to require corroborative evidence but want different or additional keywords, and perhaps you
want to change where to look for that evidence. You can adjust the patternsProximity to expand or shrink the
window for corroborative evidence around the 16-digit number. To add your own keywords, you need to define a
keyword list and reference it within your rule. The following XML adds the keywords "company card" and
"Contoso card" so that any message that contains those phrases within 150 characters of a credit card number will
be identified as a credit card number.

<Rules>
<! -- Modify the patternsProximity to be "150" rather than "300." -->
<Entity id="db80b3da-0056-436e-b0ca-1f4cf7080d1f" patternsProximity="150" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Func_credit_card" />
<Any minMatches="1">
<Match idRef="Keyword_cc_verification" />
<Match idRef="Keyword_cc_name" />
<!-- Add the following XML, which references the keywords at the end of the XML sample. -->
<Match idRef="My_Additional_Keywords" />
<Match idRef="Func_expiration_date" />
</Any>
</Pattern>
</Entity>
<!-- Add the following XML, and update the information inside the <Term> tags with the keywords that you want
to detect. -->
<Keyword id="My_Additional_Keywords">
<Group matchStyle="word">
<Term caseSensitive="false">company card</Term>
<Term caseSensitive="false">Contoso card</Term>
</Group>
</Keyword>

Upload your rule


To upload your rule, you need to do the following.
1. Save it as an .xml file with Unicode encoding. This is important because the rule won't work if the file is
saved with a different encoding.
2. Connect to the Security and Compliance Center via Remote PowerShell.
3. In the PowerShell, type the following.
New-DlpSensitiveInformationTypeRulePackage -FileData (Get-Content -Path
"C:\custompath\MyNewRulePack.xml" -Encoding Byte)
.

IMPORTANT
Make sure that you use the file location where your rule pack is actually stored. C:\custompath\ is a placeholder.

4. To confirm, type Y, and then press Enter.


5. Verify that your new rule was uploaded by typing Get-DlpSensitiveInformationType , which now displays the
name of your rule.
To start using the new rule to detect sensitive information, you need to add the rule to a DLP policy. To learn how
to add the rule to a policy, see Create a DLP policy from a template.

Term glossary
These are the definitions for the terms you encountered during this procedure.
TERM DEFINITION

Entity Entities are what we call sensitive information types, such as


credit card numbers. Each entity has a unique GUID as its ID.
If you copy a GUID and search for it in the XML, you'll find the
XML rule definition and all the localized translations of that
XML rule. You can also find this definition by locating the
GUID for the translation and then searching for that GUID.

Functions The XML file references Func_credit_card , which is a


function in compiled code. Functions are used to run complex
regexes and verify that checksums match for our built-in
rules.) Because this happens in the code, some of the variables
don't appear in the XML file.

IdMatch This is the identifier that the pattern is to trying to match—for


example, a credit card number. You can read more about this
and about the Match tags in Entity rules.

Keyword lists The XML file also references keyword_cc_verification and


keyword_cc_name , which are lists of keywords from which we
are looking for matches within the patternsProximity for
the entity. These aren't currently displayed in the XML.

Pattern The pattern contains the list of what the sensitive type is
looking for. This includes keywords, regexes, and internal
functions (that perform tasks like verifying checksums).
Sensitive information types can have multiple patterns with
unique confidences. This is useful when creating a sensitive
information type that returns a high confidence if
corroborative evidence is found and a lower confidence if little
or no corroborative evidence is found.

Pattern confidenceLevel This is the level of confidence that the DLP engine found a
match. This level of confidence is associated with a match for
the pattern if the pattern's requirements are met. This is the
confidence measure you should consider when using
Exchange transport rules (ETRs).

patternsProximity When we find what looks like a credit card number pattern,
patternsProximity is the proximity around that number
where we'll look for corroborative evidence.

recommendedConfidence This is the confidence level we recommend for this rule. The
recommended confidence applies to entities and affinities. For
entities, this number is never evaluated against the
confidenceLevel for the pattern. It's merely a suggestion to
help you choose a confidence level if you want to apply one.
For affinities, the confidenceLevel of the pattern must be
higher than the recommendedConfidence number for an ETR
action to be invoked. The recommendedConfidence is the
default confidence level used in ETRs that invokes an action. If
you want, you can manually change the ETR to be invoked
based off the pattern's confidence level, instead.

For more information


What the sensitive information types look for
Create a custom sensitive information type
Overview of data loss prevention policies
Create a custom sensitive information type
11/15/2018 • 8 minutes to read • Edit Online

Data loss prevention (DLP ) in Office 365 includes many built-in sensitive information types that are ready for you
to use in your DLP policies. These built-in types can help identify and protect credit card numbers, bank account
numbers, passport numbers, and more.
But if you need to identify and protect a different type of sensitive information (for example, employee IDs or
project numbers that uses a format specific to your organization) you can create a custom sensitive information
type.
The fundamental parts of a custom sensitive information type are:
Primary pattern: employee ID numbers, project numbers, etc. This is typically identified by a regular
expression (RegEx), but it can also be a list of keywords.
Additional evidence: Suppose you're looking for a nine-digit employee ID number. Not all nine-digit
numbers are employee ID numbers, so you can look for additional text: keywords like "employee", "badge",
"ID", or other text patterns based on additional regular expressions. This supporting evidence (also known
as supporting or corroborative evidence) increases the likelihood that nine-digit number found in content
is really an employee ID number.
Character proximity: It makes sense that the closer the primary pattern and the supporting evidence are
to each other, the more likely the detected content is going to be what you're looking for. You can specify
the character distance between the primary pattern and the supporting evidence (also known as the
proximity window ) as shown in the following diagram:

Confidence level: The more supporting evidence you have, the higher the likelihood that a match
contains the sensitive information you're looking for. You can assign higher levels of confidence for
matches that are detected by using more evidence.
When satisfied, a pattern returns a count and confidence level, which you can use in the conditions in your
DLP policies. When you add a condition for detecting a sensitive information type to a DLP policy, you can
edit the count and confidence level as shown in the following diagram:

To create custom sensitive information types in the Office 365 Security & Compliance Center, you have the
following options:
Use the UI: This method is easier and faster, but you have less configuration options than PowerShell. The
rest of this topic describes these procedures.
Use PowerShell: This method requires that you first create an XML file (called a rule package) that
contains one or more sensitive information types, and then you use PowerShell to import the rule package
(importing the rule package is trivial compared to creating the rule package. This method is much more
complex than the UI, but you have more configuration options. For instructions, see Create a custom
sensitive information type in Office 365 Security & Compliance Center PowerShell.
The key differences are described in the following table:

CUSTOM SENSITIVE INFORMATION TYPES IN THE UI CUSTOM SENSITIVE INFORMATION TYPES IN POWERSHELL

Name and Description are in one language. Supports multiple languages for Name and Description.

Supports one pattern. Supports multiple patterns.

Supporting evidence can be: Supporting evidence can be:


• Regular expressions • Regular expressions
• Keywords • Keywords
• Keyword dictionaries • Keyword dictionaries
• Built-in DLP functions

Custom sensitive information types are added to the rule You can create up to 10 rule packages that contain custom
package named Microsoft.SCCManaged.CustomRulePack sensitive information types.

Pattern match requires the detection of the primary pattern Pattern match requires the detection of the primary pattern
and all supporting evidence (the implicit AND operator is and a configurable amount of supporting evidence (implicit
used). AND and OR operators can be used).

What do you need to know before you begin?


To open the Security & Compliance Center, see Go to the Office 365 Security & Compliance Center.
Custom sensitive information types require familiarity with regular expressions (RegEx). For more
information about the Boost.RegEx (formerly known as RegEx++) engine that's used for processing the
text, see Boost.Regex 5.1.3.
Microsoft Customer Service & Support can't assist with providing custom content-matching definitions
(creating custom classifications or regular expression patterns). Support engineers can provide limited
support for the feature (for example, providing sample regular expression patterns for testing purposes, or
assisting with troubleshooting an existing regular expression pattern that's not triggering as expected), but
can't provide assurances that any custom content-matching development will fulfill your requirements or
obligations.
DLP uses the search crawler to identify and classify sensitive information in SharePoint Online and
OneDrive for Business sites. To identify your new custom sensitive information type in existing content, the
content must be recrawled. Content is recrawled based on a schedule, but you can manually recrawl
content for a site collection, list, or library. For more information, see Manually request crawling and re-
indexing of a site, a library or a list.

Create custom sensitive information types in the Security &


Compliance Center
In the Security & Compliance Center, go to Classifications > Sensitive info types and click Create.
The settings are fairly self-evident, and are explained on the associate page of the wizard:
Name
Description
Proximity
Confidence level
Primary pattern element (keywords, regular expression, or dictionary)
Optional Supporting pattern elements (keywords, regular expression, or dictionary) and a
corresponding Minimum cost value.
Here's a scenario: You want a custom sensitive information type that detects 9-digit employee numbers in
content, along with the keywords "employee" "ID" and "badge". To create this custom sensitive information type,
do the following steps:
1. In the Security & Compliance Center, go to Classifications > Sensitive info types and click Create.

2. In the Choose a name and description page that opens, enter the following values:
Name: Employee ID.
Description: Detect nine-digit Contoso employee ID numbers.

When you're finished, click Next.


3. In the Requirements for matching page that opens, click Add an element configure the following
settings:
Detect content containing:
a. Click Any of these and select Regular expression.
b. In the regular expression box, enter (\s)(\d{9})(\s) (nine-digit numbers surrounded by white
space).
Supporting elements: Click Add supporting elements and select Contains this keyword list.
In the Contains this keyword list area that appears, configure the following settings:
Keyword list: Enter the following value: employee,ID,badge.
Minimum count: Leave the default value 1.
Leave the default Confidence level value 60.
Leave the default Character proximity value 300.

When you're finished, click Next.


4. On the Review and finalize page that opens, review the settings and click Finish.
5. The next page encourages you to test the new custom sensitive information type by clicking Yes. For more
information, see Test custom sensitive information types in the Security & Compliance Center. To test the
rule later, click No.

How do you know this worked?


To verify that you've successfully created a new sensitive information type, do any of the following steps:
Go to Classifications > Sensitive info types and verify the new custom sensitive information type is
listed.
Test the new custom sensitive information type. For more information, see Test custom sensitive
information types in the Security & Compliance Center.

Modify custom sensitive information types in the Security &


Compliance Center
Notes:
You can only modify custom sensitive information types; you can't modify built-in sensitive information
types. But you can use PowerShell to export built-in custom sensitive information types, customize them,
and import them as custom sensitive information types. For more information, see Customize a built-in
sensitive information type.
You can only modify custom sensitive information types that you created in the UI. If you used the
PowerShell procedure to import a custom sensitive information type rule package, you'll get an error.
In the Security & Compliance Center, go to Classifications > Sensitive info types, select the custom sensitive
information type that you want to modify, and then click Edit.
The same options are available here as when you created the custom sensitive information type in the Security &
Compliance Center. For more information, see Create custom sensitive information types in the Security &
Compliance Center.
How do you know this worked?
To verify that you've successfully modified a sensitive information type, do any of the following steps:
Go to Classifications > Sensitive info types to verify the properties of the modified custom sensitive
information type.
Test the modified custom sensitive information type. For more information, see Test custom sensitive
information types in the Security & Compliance Center.

Remove custom sensitive information types in the Security &


Compliance Center
Notes:
You can only remove custom sensitive information types; you can't remove built-in sensitive information
types.
Before your remove a custom sensitive information type, verify that no DLP policies or Exchange mail flow
rules (also known as transport rules) still reference the sensitive information type.
1. In the Security & Compliance Center, go to Classifications > Sensitive info types and select one or
more custom sensitive information types that you want to remove.
2. In the fly-out that opens, click Delete (or Delete sensitive info types if you selected more than one).

3. In the warning message that appears, click Yes.


How do you know this worked?
To verify that you've successfully removed a custom sensitive information type, go to Classifications > Sensitive
info types to verify the custom sensitive information type is no longer listed.

Test custom sensitive information types in the Security & Compliance


Center
1. In the Security & Compliance Center, go to Classifications > Sensitive info types.
2. Select one or more custom sensitive information types to test. In the fly-out that opens, click Test type (or
Test sensitive info types if you selected more than one).
3. On the Upload file to test page that opens, upload a document to test by dragging and dropping a file or
by clicking Browse and selecting a file.

4. Click the Test button to test the document for pattern matches in the file.
5. On the Match results page, click Finish.
Create a custom sensitive information type in Office
365 Security & Compliance Center PowerShell
11/1/2018 • 26 minutes to read • Edit Online

Data loss prevention (DLP ) in Office 365 includes many built-in sensitive information types that are ready for you
to use in your DLP policies. These built-in types can help identify and protect credit card numbers, bank account
numbers, passport numbers, and more.
But if you need to identify and protect a different type of sensitive information (for example, an employee ID that
uses a format specific to your organization) you can create a custom sensitive information type. A sensitive
information type is defined in an XML file called a rule package.
This topic shows you how to create an XML file that defines your own custom sensitive information type. You
need to know how to create a regular expression. As an example, this topic creates a custom sensitive information
type that identifies an employee ID. You can use this example XML as a starting point for your own XML file.
After you've created a well-formed XML file, you can upload it to Office 365 by using Office 365 PowerShell. Then
you're ready to use your custom sensitive information type in your DLP policies and test that it's detecting the
sensitive information as you intended.

NOTE
You can also create less complex custom sensitive information types in the Security & Compliance Center UI. For more
information, see Create a custom sensitive information type.

Important disclaimer
Due to the variances in customer environments and content match requirements, Microsoft Support cannot assist
in providing custom content-matching definitions; e.g., defining custom classifications or regular expression (also
known as RegEx) patterns. For custom content-matching development, testing, and debugging, Office 365
customers will need to rely upon internal IT resources, or use an external consulting resource such as Microsoft
Consulting Services (MCS ). Support engineers can provide limited support for the feature, but cannot provide
assurances that any custom content-matching development will fulfill the customer's requirements or obligations.
As an example of the type of support that can be provided, sample regular expression patterns may be provided
for testing purposes. Or, support can assist with troubleshooting an existing RegEx pattern which is not triggering
as expected with a single specific content example.
For more information about the Boost.RegEx (formerly known as RegEx++) engine that's used for processing the
text, see Boost.Regex 5.1.3.

Sample XML of a rule package


Here's the sample XML of the rule package that we'll create in this topic. Elements and attributes are explained in
the sections below.

<?xml version="1.0" encoding="UTF-16"?>


<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce">
<RulePack id="DAD86A92-AB18-43BB-AB35-96F7C594ADAA">
<Version build="0" major="1" minor="0" revision="0"/>
<Publisher id="619DD8C3-7B80-4998-A312-4DF0402BAC04"/>
<Details defaultLangCode="en-us">
<Details defaultLangCode="en-us">
<LocalizedDetails langcode="en-us">
<PublisherName>Contoso</PublisherName>
<Name>Employee ID Custom Rule Pack</Name>
<Description>
This rule package contains the custom Employee ID entity.
</Description>
</LocalizedDetails>
</Details>
</RulePack>
<Rules>
<!-- Employee ID -->
<Entity id="E1CC861E-3FE9-4A58-82DF-4BD259EAB378" patternsProximity="300" recommendedConfidence="70">
<Pattern confidenceLevel="60">
<IdMatch idRef="Regex_employee_id"/>
</Pattern>
<Pattern confidenceLevel="70">
<IdMatch idRef="Regex_employee_id"/>
<Match idRef="Func_us_date"/>
</Pattern>
<Pattern confidenceLevel="80">
<IdMatch idRef="Regex_employee_id"/>
<Match idRef="Func_us_date"/>
<Any minMatches="1">
<Match idRef="Keyword_badge" minCount="2"/>
<Match idRef="Keyword_employee"/>
</Any>
<Any minMatches="0" maxMatches="0">
<Match idRef="Keyword_false_positives_local"/>
<Match idRef="Keyword_false_positives_intl"/>
</Any>
</Pattern>
</Entity>
<Regex id="Regex_employee_id">(\s)(\d{9})(\s)</Regex>
<Keyword id="Keyword_employee">
<Group matchStyle="word">
<Term>Identification</Term>
<Term>Contoso Employee</Term>
</Group>
</Keyword>
<Keyword id="Keyword_badge">
<Group matchStyle="string">
<Term>card</Term>
<Term>badge</Term>
<Term caseSensitive="true">ID</Term>
</Group>
</Keyword>
<Keyword id="Keyword_false_positives_local">
<Group matchStyle="word">
<Term>credit card</Term>
<Term>national ID</Term>
</Group>
</Keyword>
<Keyword id="Keyword_false_positives_intl">
<Group matchStyle="word">
<Term>identity card</Term>
<Term>national ID</Term>
<Term>EU debit card</Term>
</Group>
</Keyword>
<LocalizedStrings>
<Resource idRef="E1CC861E-3FE9-4A58-82DF-4BD259EAB378">
<Name default="true" langcode="en-us">Employee ID</Name>
<Description default="true" langcode="en-us">
A custom classification for detecting Employee IDs.
</Description>
<Name default="true" langcode="de-de">Name for German locale</Name>
<Description default="true" langcode="de-de">
Description for German locale.
</Description>
</Description>
</Resource>
</LocalizedStrings>
</Rules>
</RulePackage>

What are your key requirements? [Rule, Entity, Pattern elements]


Before you get started, it's helpful to understand the basic structure of the XML schema for a rule, and how you
can use this structure to define your custom sensitive information type so that it will identify the right content.
A rule defines one or more entities (sensitive information types), and each entity defines one or more patterns. A
pattern is what DLP looks for when it evaluates content such as email and documents.
(A quick note on terminology - if you're familiar with DLP policies, you know that a policy contains one or more
rules comprised of conditions and actions. However, in this topic, the XML markup uses rule to mean the patterns
that define an entity, also known as a sensitive information type. So in this topic, when you see rule, think entity or
sensitive information type, not conditions and actions.)
Simplest scenario: entity with one pattern
Here's the simplest scenario. You want your DLP policy to identify content that contains your organization's
employee ID, which is formatted as a nine-digit number. So the pattern refers to a regular expression contained in
the rule that identifies nine-digit numbers. Any content containing a nine-digit number satisfies the pattern.

However, while simple, this pattern may identify many false positives by matching content that contains any nine-
digit number that is not necessarily an employee ID.
More common scenario: entity with multiple patterns
For this reason, it's more common to define an entity by using more than one pattern, where the patterns identify
supporting evidence (such as a keyword or date) in addition to the entity (such as a nine-digit number).
For example, to increase the likelihood of identifying content that contains an employee ID, you can define
another pattern that also identifies a hire date, and define yet another pattern that identifies both a hire date and a
keyword (such as "employee ID"), in addition to the nine-digit number.
Note a couple of important aspects of this structure:
Patterns that require more evidence have a higher confidence level. This is useful because when you later
use this sensitive information type in a DLP policy, you can use more restrictive actions (such as block
content) with only the higher-confidence matches, and you can use less restrictive actions (such as send
notification) with the lower-confidence matches.
The supporting IdMatch and Match elements reference regexes and keywords that are actually children of
the Rule element, not the Pattern. These supporting elements are referenced by the Pattern but included in
the Rule. This means that a single definition of a supporting element, like a regular expression or a keyword
list, can be referenced by multiple entities and patterns.

What entity do you need to identify? [Entity element, id attribute]


An entity is a sensitive information type, such as a credit card number, that has a well-defined pattern. Each entity
has a unique GUID as its ID.
Name the entity and generate its GUID
Add the Rules and Entity elements. Then add a comment that contains the name of your custom entity - in this
example, Employee ID. Later, you'll add the entity name to the localized strings section, and that name is what
appears in the UI when you create a DLP policy.
Next, generate a GUID for your entity. There are several ways to generate GUIDs, but you can do it easily in
PowerShell by typing [guid]::NewGuid(). Later, you'll also add the entity GUID to the localized strings section.
What pattern do you want to match? [Pattern element, IdMatch
element, Regex element]
The pattern contains the list of what the sensitive information type is looking for. This can include regexes,
keywords, and built-in functions (which perform tasks like running regexes to find dates or addresses). Sensitive
information types can have multiple patterns with unique confidences.
What all of the below patterns have in common is that they all reference the same regular expression, which looks
for a nine-digit number (\d{9}) surrounded by white space (\s) … (\s). This regular expression is referenced by the
IdMatch element and is the common requirement for all patterns that look for the Employee ID entity. IdMatch is
the identifier that the pattern is to trying to match, such as Employee ID or credit card number or social security
number. A Pattern element must have exactly one IdMatch element.

When satisfied, a pattern returns a count and confidence level, which you can use in the conditions in your DLP
policy. When you add a condition for detecting a sensitive information type to a DLP policy, you can edit the count
and confidence level as shown here. Confidence level (also called match accuracy) is explained later in this topic.

When you create your regular expression, keep in mind that there are potential issues to be aware of. For example,
if you write and upload a regex that identifies too much content, this can impact performance. To learn more about
these potential issues, see the later section Potential validation issues to be aware of.

Do you want to require additional evidence? [Match element,


minCount attribute]
In addition to the IdMatch, a pattern can use the Match element to require additional supporting evidence, such as
a keyword, regex, date, or address.
A Pattern can include multiple Match elements; they can be included directly in the Pattern element or combined
by using the Any element. Match elements are joined by an implicit AND operator; all Match elements must be
satisfied for the pattern to be matched. You can use the Any element to introduce AND or OR operators (more on
that in a later section).
You can use the optional minCount attribute to specify how many instances of a match need to be found for each
of the Match elements. For example, you can specify that a pattern is satisfied only when at least two keywords
from a keyword list are found.

Keywords [Keyword, Group, and Term elements, matchStyle and caseSensitive attributes]
When you identify sensitive information, like an employee ID, you often want to require keywords as
corroborative evidence. For example, in addition to matching a nine-digit number, you may want to look for words
like "card", "badge", or "ID". To do this, you use the Keyword element. The Keyword element has an id attribute that
can be referenced by multiple Match elements in multiple patterns or entities.
Keywords are included as a list of Term elements in a Group element. The Group element has a matchStyle
attribute with two possible values:
matchStyle="word" Word match identifies whole words surrounded by white space or other delimiters.
You should always use word unless you need to match parts of words or match words in Asian languages.
matchStyle="string" String match identifies strings no matter what they're surrounded by. For example,
"id" will match "bid" and "idea". Use string only when you need to match Asian words or if your keyword
may be included as part of other strings.
Finally, you can use the caseSensitive attribute of the Term element to specify that the content must match the
keyword exactly, including lower- and upper-case letters.
Regular expressions [Regex element]
In this example, the employee ID entity already uses the IdMatch element to reference a regex for the pattern - a
nine-digit number surrounded by whitespace. In addition, a pattern can use a Match element to reference an
additional Regex element to identify corroborative evidence, such as a five- or nine-digit number in the format of a
US zip code.
Additional patterns such as dates or addresses [built-in functions]
In addition to the built-in sensitive information types, DLP also includes built-in functions that can identify
corroborative evidence such as a US date, EU date, expiration date, or US address. DLP does not support
uploading your own custom functions, but when you create a custom sensitive information type, your entity can
reference the built-in functions.
For example, an employee ID badge has a hire date on it, so this custom entity can use the built-in function
Func_us_date to identify a date in the format commonly used in the US.

For more information, see What the DLP functions look for.
Different combinations of evidence [Any element, minMatches and
maxMatches attributes]
In a Pattern element, all IdMatch and Match elements are joined by an implicit AND operator - all of the matches
must be satisfied before the pattern can be satisfied. However, you can create more flexible matching logic by
using the Any element to group Match elements. For example, you can use the Any element to match all, none, or
an exact subset of its children Match elements.
The Any element has optional minMatches and maxMatches attributes that you can use to define how many of
the children Match elements must be satisfied before the pattern is matched. Note that these attributes define the
number of Match elements that must be satisfied, not the number of instances of evidence found for the matches.
To define a minimum number of instances for a specific match, such as two keywords from a list, use the
minCount attribute for a Match element (see above).
Match at least one child Match element
If you want to require that only a minimum number of Match elements must be met, you can use the minMatches
attribute. In effect, these Match elements are joined by an implicit OR operator. This Any element is satisfied if a
US -formatted date or a keyword from either list is found.
Match an exact subset of any children Match elements
If you want to require that an exact number of Match elements must be met, you can set minMatches and
maxMatches to the same value. This Any element is satisfied only if exactly one date or keyword is found - any
more than that, and the pattern won't be matched.

Match none of children Match elements


If you want to require the absence of specific evidence for a pattern to be satisfied, you can set both minMatches
and maxMatches to 0. This can be useful if you have a keyword list or other evidence that are likely to indicate a
false positive.
For example, the employee ID entity looks for the keyword "card" because it might refer to an "ID card". However,
if card appears only in the phrase "credit card", "card" in this content is unlikely to mean "ID card". So you can add
"credit card" as a keyword to a list of terms that you want to exclude from satisfying the pattern.

How close to the entity must the other evidence be?


[patternsProximity attribute]
Your sensitive information type is looking for a pattern that represents an employee ID, and as part of that pattern
it's also looking for corroborative evidence like a keyword such as "ID". It makes sense that the closer together this
evidence is, the more likely the pattern is to be an actual employee ID. You can determine how close other
evidence in the pattern must be to the entity by using the required patternsProximity attribute of the Entity
element.

For each pattern in the entity, the patternsProximity attribute value defines the distance (in Unicode characters)
from the IdMatch location for all other Matches specified for that Pattern. The proximity window is anchored by
the IdMatch location, with the window extending to the left and right of the IdMatch.
The example below illustrates how the proximity window affects the pattern matching where IdMatch element for
the employee ID custom entity requires at least one corroborating match of keyword or date. Only ID1 matches
because for ID2 and ID3, either no or only partial corroborating evidence is found within the proximity window.

Note that for email, the message body and each attachment are treated as separate items. This means that the
proximity window does not extend beyond the end of each of these items. For each item (attachment or body),
both the idMatch and corroborative evidence needs to reside in that item.

What are the right confidence levels for different patterns?


[confidenceLevel attribute, recommendedConfidence attribute]
The more evidence that a pattern requires, the more confidence you have that an actual entity (such as employee
ID ) has been identified when the pattern is matched. For example, you have more confidence in a pattern that
requires a nine-digit ID number, hire date, and keyword in close proximity, than you do in a pattern that requires
only a nine-digit ID number.
The Pattern element has a required confidenceLevel attribute. You can think of the value of confidenceLevel (an
integer between 1 and 100) as a unique ID for each pattern in an entity - the patterns in an entity must have
different confidence levels that you assign. The precise value of the integer doesn't matter - simply pick numbers
that make sense to your compliance team. After you upload your custom sensitive information type and then
create a DLP policy, you can reference these confidence levels in the conditions of the rules that you create.
In addition to confidenceLevel for each Pattern, the Entity has a recommendedConfidence attribute. The
recommended confidence attribute can be thought of as the default confidence level for the rule. When you create
a rule in a DLP policy, if you don't specify a confidence level for the rule to use, that rule will match based on the
recommended confidence level for the entity.

Do you want to support other languages in the UI of the Security &


Compliance Center? [LocalizedStrings element]
If your compliance team uses the Office 365 Security & Compliance Center to create DLP policies in different
locales and in different languages, you can provide localized versions of the name and description of your custom
sensitive information type. When your compliance team uses Office 365 in a language that you support, they'll
see the localized name in the UI.

The Rules element must contain a LocalizedStrings element, which contains a Resource element that references
the GUID of your custom entity. In turn, each Resource element contains one or more Name and Description
elements that each use the langcode attribute to provide a localized string for a specific language.
Note that you use localized strings only for how your custom sensitive information type appears in the UI of the
Security & Compliance Center. You can't use localized strings to provide different localized versions of a keyword
list or regular expression.

Other rule package markup [RulePack GUID]


Finally, the beginning of each RulePackage contains some general information that you need to fill in. You can use
the following markup as a template and replace the ". . ." placeholders with your own info.
Most importantly, you'll need to generate a GUID for the RulePack. Above, you generated a GUID for the entity;
this is a second GUID for the RulePack. There are several ways to generate GUIDs, but you can do it easily in
PowerShell by typing [guid]::NewGuid().
The Version element is also important. When you upload your rule package for the first time, Office 365 notes the
version number. Later, if you update the rule package and upload a new version, make sure to update the version
number or Office 365 won't deploy the rule package.

<?xml version="1.0" encoding="utf-16"?>


<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce">
<RulePack id=". . .">
<Version major="1" minor="0" build="0" revision="0" />
<Publisher id=". . ." />
<Details defaultLangCode=". . .">
<LocalizedDetails langcode=" . . . ">
<PublisherName>. . .</PublisherName>
<Name>. . .</Name>
<Description>. . .</Description>
</LocalizedDetails>
</Details>
</RulePack>

<Rules>
. . .
</Rules>
</RulePackage>

When complete, your RulePack element should look like this.


Changes for Exchange Online
Previously, you might have used Exchange Online PowerShell to import your custom sensitive information types
for DLP. Now your custom sensitive information types can be used in both the Exchange Admin Center and the
Security & Compliance Center. As part of this improvement, you should use Security & Compliance Center
PowerShell to import your custom sensitive information types - you can't import them from the Exchange
PowerShell anymore. Your custom sensitive information types will continue to work just like before; however, it
may take up to one hour for changes made to custom sensitive information types in the Security & Compliance
Center to appear in the Exchange Admin Center.
Note that in the Security & Compliance Center, you use the DlpSensitiveInformationTypeRulePackage cmdlet to
upload a rule package. Previously, in the Exchange Admin Center, you used the ClassificationRuleCollection
cmdlet.

Upload your rule package


To upload your rule package, do the following steps:
1. Save it as an .xml file with Unicode encoding.
2. Connect to Office 365 Security & Compliance Center PowerShell
3. Use the following syntax:

New-DlpSensitiveInformationTypeRulePackage -FileData (Get-Content -Path "PathToUnicodeXMLFile" -


Encoding Byte)

This example uploads the Unicode XML file named MyNewRulePack.xml from C:\My Documents.

New-DlpSensitiveInformationTypeRulePackage -FileData (Get-Content -Path "C:\My


Documents\MyNewRulePack.xml" -Encoding Byte)

For detailed syntax and parameter information, see New -DlpSensitiveInformationTypeRulePackage.


4. To verify that you've successfully created a new sensitive information type, do any of the following steps:
Run the following command and verify the new rule package is listed:

Get-DlpSensitiveInformationTypeRulePackage

Run the following command and verify the sensitive information type is listed:
Get-DlpSensitiveInformationType

For custom sensitive information types, the Publisher property value will be something other than
Microsoft Corporation.
Replace <Name> with the Name value of the sensitive information type (for example, Employee ID ) and
run the following command:

Get-DlpSensitiveInformationType -Identity "<Name>"

Potential validation issues to be aware of


When you upload your rule package XML file, the system validates the XML and checks for known bad patterns
and obvious performance issues. Here are some known issues that the validation checks for — a regular
expression:
Cannot begin or end with alternator "|", which matches everything because it's considered an empty match.
For example, "|a" or "b|" will not pass validation.
Cannot begin or end with a ".{0,m}" pattern, which has no functional purpose and only impairs
performance.
For example, ".{0,50}ASDF" or "ASDF.{0,50}" will not pass validation.
Cannot have ".{0,m}" or ".{1,m}" in groups, and cannot have ".*" or ".+" in groups.
For example, "(.{0,50000})" will not pass validation.
Cannot have any character with "{0,m}" or "{1,m}" repeaters in groups.
For example, "(a*)" will not pass validation.
Cannot begin or end with ".{1,m}"; instead, use just "."
For example, ".{1,m}asdf" will not pass validation; instead, use just ".asdf".
Cannot have an unbounded repeater (such as "*" or "+") on a group.
For example, "(xx)*" and "(xx)+" will not pass validation.
If a custom sensitive information type contains an issue that may affect performance, it won't be uploaded and
you may see one of these error messages:
Generic quantifiers which match more content than expected (e.g., '+', '*')
Lookaround assertions
Complex grouping in conjunction with general quantifiers

Recrawl your content to identify the sensitive information


DLP uses the search crawler to identify and classify sensitive information in site content. Content in SharePoint
Online and OneDrive for Business sites is recrawled automatically whenever it's updated. But to identify your new
custom type of sensitive information in all existing content, that content must be recrawled.
In Office 365, you can't manually request a recrawl of an entire tenant, but you can do this for a site collection, list,
or library - see Manually request crawling and re-indexing of a site, a library or a list.
Remove a custom sensitive information type
Note: Before your remove a custom sensitive information type, verify that no DLP policies or Exchange mail flow
rules (also known as transport rules) still reference the sensitive information type.
In Security & Compliance Center PowerShell, there are two methods to remove custom sensitive information
types:
Remove individual custom sensitive information types: Use the method documented in Modify a
custom sensitive information type. You export the custom rule package that contains the custom sensitive
information type, remove the sensitive information type from the XML file, and import the updated XML
file back into the existing custom rule package.
Remove a custom rule package and all custom sensitive information types that it contains: This
method is documented in this section.
1. Connect to Office 365 Security & Compliance Center PowerShell
2. To remove a custom rule package, use the following syntax:

Remove-DlpSensitiveInformationTypeRulePackage -Identity "RulePackageIdentity"

You can use the Name value (for any language) or the RulePack id (GUID ) value to identify the rule
package.
This example removes the rule package named "Employee ID Custom Rule Pack".

Remove-DlpSensitiveInformationTypeRulePackage -Identity "Employee ID Custom Rule Pack"

For detailed syntax and parameter information, see Remove-DlpSensitiveInformationTypeRulePackage.


3. To verify that you've successfully removed a custom sensitive information type, do any of the following
steps:
Run the following command and verify the rule package is no longer listed:

Get-DlpSensitiveInformationTypeRulePackage

Run the following command and verify the sensitive information types in the removed rule package are no
longer listed:

Get-DlpSensitiveInformationType

For custom sensitive information types, the Publisher property value will be something other than
Microsoft Corporation.
Replace <Name> with the Name value of the sensitive information type (for example, Employee ID ) and
run the following command to verify the sensitive information type is no longer listed:

Get-DlpSensitiveInformationType -Identity "<Name>"

Modify a custom sensitive information type


In Security & Compliance Center PowerShell, modifying a custom sensitive information type requires you to:
1. Export the existing rule package that contains the custom sensitive information type to an XML file (or use
the existing XML file if you have it).
2. Modify the custom sensitive information type in the exported XML file.
3. Import the updated XML file back into the existing rule package.
To connect to Security & Compliance Center PowerShell, see Connect to Office 365 Security & Compliance
Center PowerShell.
Step 1: Export the existing rule package to an XML file
Note: If you have a copy of the XML file (for example, you just created and imported it), you can skip to the next
step to modify the XML file.
1. If you don't already know it, run the following command to find the name of the custom rule package:

Get-DlpSensitiveInformationTypeRulePackage

Note: The built-in rule package that contains the built-in sensitive information types is named Microsoft
Rule Package. The rule package that contains the custom sensitive information types that you created in the
Security & Compliance Center UI is named Microsoft.SCCManaged.CustomRulePack.
2. Use the following syntax to store the custom rule package to a variable:

$rulepak = Get-DlpSensitiveInformationTypeRulePackage -Identity "RulePackageName"

For example, if the name of the rule package is "Employee ID Custom Rule Pack", run the following
command:

$rulepak = Get-DlpSensitiveInformationTypeRulePackage -Identity "Employee ID Custom Rule Pack"

3. Use the following syntax to export the custom rule package to an XML file:

Set-Content -Path "XMLFileAndPath" -Encoding Byte -Value


$rulepak.SerializedClassificationRuleCollection

This example export the rule package to the file named ExportedRulePackage.xml in the C:\My Documents
folder.

Set-Content -Path "C:\My Documents\ExportedRulePackage.xml" -Encoding Byte -Value


$rulepak.SerializedClassificationRuleCollection

Step 2: Modify the sensitive information type in the exported XML file
Sensitive information types in the XML file and other elements in the file are described earlier in this topic.
Step 3: Import the updated XML file back into the existing rule package
To import the updated XML back into the existing rule package, use the following syntax:

Set-DlpSensitiveInformationTypeRulePackage -Identity "RulePackageIdentity" -FileData (Get-Content -Path


"PathToUnicodeXMLFile" -Encoding Byte)

You can use the Name value or the RulePack id (GUID ) value to identify the rule package.
This example uploads the updated Unicode XML file named MyUpdatedRulePack.xml from C:\My Documents
into the existing rule package named "Employee ID Custom Rule Pack".

Set-DlpSensitiveInformationTypeRulePackage -Identity "Employee ID Custom Rule Pack" -FileData (Get-Content -


Path "C:\My Documents\MyUpdatedRulePack.xml" -Encoding Byte)

For detailed syntax and parameter information, see Set-DlpSensitiveInformationTypeRulePackage.

Reference: Rule package XML schema definition


You can copy this markup, save it as an XSD file, and use it to validate your rule package XML file.

<?xml version="1.0" encoding="utf-8"?>


<xs:schema xmlns:mce="http://schemas.microsoft.com/office/2011/mce"
targetNamespace="http://schemas.microsoft.com/office/2011/mce"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified"
attributeFormDefault="unqualified"
id="RulePackageSchema">
<!-- Use include if this schema has the same target namespace as the schema being referenced, otherwise use
import -->
<xs:element name="RulePackage" type="mce:RulePackageType"/>
<xs:simpleType name="LangType">
<xs:union memberTypes="xs:language">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value=""/>
</xs:restriction>
</xs:simpleType>
</xs:union>
</xs:simpleType>
<xs:simpleType name="GuidType" final="#all">
<xs:restriction base="xs:token">
<xs:pattern value="[0-9a-fA-F]{8}\-([0-9a-fA-F]{4}\-){3}[0-9a-fA-F]{12}"/>
</xs:restriction>
</xs:simpleType>
<xs:complexType name="RulePackageType">
<xs:sequence>
<xs:element name="RulePack" type="mce:RulePackType"/>
<xs:element name="Rules" type="mce:RulesType">
<xs:key name="UniqueRuleId">
<xs:selector xpath="mce:Entity|mce:Affinity|mce:Version/mce:Entity|mce:Version/mce:Affinity"/>
<xs:field xpath="@id"/>
</xs:key>
<xs:key name="UniqueProcessorId">
<xs:selector xpath="mce:Regex|mce:Keyword|mce:Fingerprint"></xs:selector>
<xs:field xpath="@id"/>
</xs:key>
<xs:key name="UniqueResourceIdRef">
<xs:selector xpath="mce:LocalizedStrings/mce:Resource"/>
<xs:field xpath="@idRef"/>
</xs:key>
<xs:keyref name="ReferencedRuleMustExist" refer="mce:UniqueRuleId">
<xs:selector xpath="mce:LocalizedStrings/mce:Resource"/>
<xs:field xpath="@idRef"/>
</xs:keyref>
<xs:keyref name="RuleMustHaveResource" refer="mce:UniqueResourceIdRef">
<xs:selector xpath="mce:Entity|mce:Affinity|mce:Version/mce:Entity|mce:Version/mce:Affinity"/>
<xs:field xpath="@id"/>
</xs:keyref>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="RulePackType">
<xs:sequence>
<xs:sequence>
<xs:element name="Version" type="mce:VersionType"/>
<xs:element name="Publisher" type="mce:PublisherType"/>
<xs:element name="Details" type="mce:DetailsType">
<xs:key name="UniqueLangCodeInLocalizedDetails">
<xs:selector xpath="mce:LocalizedDetails"/>
<xs:field xpath="@langcode"/>
</xs:key>
<xs:keyref name="DefaultLangCodeMustExist" refer="mce:UniqueLangCodeInLocalizedDetails">
<xs:selector xpath="."/>
<xs:field xpath="@defaultLangCode"/>
</xs:keyref>
</xs:element>
<xs:element name="Encryption" type="mce:EncryptionType" minOccurs="0" maxOccurs="1"/>
</xs:sequence>
<xs:attribute name="id" type="mce:GuidType" use="required"/>
</xs:complexType>
<xs:complexType name="VersionType">
<xs:attribute name="major" type="xs:unsignedShort" use="required"/>
<xs:attribute name="minor" type="xs:unsignedShort" use="required"/>
<xs:attribute name="build" type="xs:unsignedShort" use="required"/>
<xs:attribute name="revision" type="xs:unsignedShort" use="required"/>
</xs:complexType>
<xs:complexType name="PublisherType">
<xs:attribute name="id" type="mce:GuidType" use="required"/>
</xs:complexType>
<xs:complexType name="LocalizedDetailsType">
<xs:sequence>
<xs:element name="PublisherName" type="mce:NameType"/>
<xs:element name="Name" type="mce:RulePackNameType"/>
<xs:element name="Description" type="mce:OptionalNameType"/>
</xs:sequence>
<xs:attribute name="langcode" type="mce:LangType" use="required"/>
</xs:complexType>
<xs:complexType name="DetailsType">
<xs:sequence>
<xs:element name="LocalizedDetails" type="mce:LocalizedDetailsType" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="defaultLangCode" type="mce:LangType" use="required"/>
</xs:complexType>
<xs:complexType name="EncryptionType">
<xs:sequence>
<xs:element name="Key" type="xs:normalizedString"/>
<xs:element name="IV" type="xs:normalizedString"/>
</xs:sequence>
</xs:complexType>
<xs:simpleType name="RulePackNameType">
<xs:restriction base="xs:token">
<xs:minLength value="1"/>
<xs:maxLength value="64"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="NameType">
<xs:restriction base="xs:normalizedString">
<xs:minLength value="1"/>
<xs:maxLength value="256"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="OptionalNameType">
<xs:restriction base="xs:normalizedString">
<xs:minLength value="0"/>
<xs:maxLength value="256"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="RestrictedTermType">
<xs:restriction base="xs:string">
<xs:minLength value="1"/>
<xs:maxLength value="100"/>
</xs:restriction>
</xs:simpleType>
</xs:simpleType>
<xs:complexType name="RulesType">
<xs:sequence>
<xs:choice maxOccurs="unbounded">
<xs:element name="Entity" type="mce:EntityType"/>
<xs:element name="Affinity" type="mce:AffinityType"/>
<xs:element name="Version" type="mce:VersionedRuleType"/>
</xs:choice>
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:element name="Regex" type="mce:RegexType"/>
<xs:element name="Keyword" type="mce:KeywordType"/>
<xs:element name="Fingerprint" type="mce:FingerprintType"/>
<xs:element name="ExtendedKeyword" type="mce:ExtendedKeywordType"/>
</xs:choice>
<xs:element name="LocalizedStrings" type="mce:LocalizedStringsType"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="EntityType">
<xs:sequence>
<xs:element name="Pattern" type="mce:PatternType" maxOccurs="unbounded"/>
<xs:element name="Version" type="mce:VersionedPatternType" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
<xs:attribute name="id" type="mce:GuidType" use="required"/>
<xs:attribute name="patternsProximity" type="mce:ProximityType" use="required"/>
<xs:attribute name="recommendedConfidence" type="mce:ProbabilityType"/>
<xs:attribute name="workload" type="mce:WorkloadType"/>
</xs:complexType>
<xs:complexType name="PatternType">
<xs:sequence>
<xs:element name="IdMatch" type="mce:IdMatchType"/>
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:element name="Match" type="mce:MatchType"/>
<xs:element name="Any" type="mce:AnyType"/>
</xs:choice>
</xs:sequence>
<xs:attribute name="confidenceLevel" type="mce:ProbabilityType" use="required"/>
</xs:complexType>
<xs:complexType name="AffinityType">
<xs:sequence>
<xs:element name="Evidence" type="mce:EvidenceType" maxOccurs="unbounded"/>
<xs:element name="Version" type="mce:VersionedEvidenceType" minOccurs="0" maxOccurs="unbounded" />
</xs:sequence>
<xs:attribute name="id" type="mce:GuidType" use="required"/>
<xs:attribute name="evidencesProximity" type="mce:ProximityType" use="required"/>
<xs:attribute name="thresholdConfidenceLevel" type="mce:ProbabilityType" use="required"/>
<xs:attribute name="workload" type="mce:WorkloadType"/>
</xs:complexType>
<xs:complexType name="EvidenceType">
<xs:sequence>
<xs:choice maxOccurs="unbounded">
<xs:element name="Match" type="mce:MatchType"/>
<xs:element name="Any" type="mce:AnyType"/>
</xs:choice>
</xs:sequence>
<xs:attribute name="confidenceLevel" type="mce:ProbabilityType" use="required"/>
</xs:complexType>
<xs:complexType name="IdMatchType">
<xs:attribute name="idRef" type="xs:string" use="required"/>
</xs:complexType>
<xs:complexType name="MatchType">
<xs:attribute name="idRef" type="xs:string" use="required"/>
<xs:attribute name="minCount" type="xs:positiveInteger" use="optional"/>
<xs:attribute name="uniqueResults" type="xs:boolean" use="optional"/>
</xs:complexType>
<xs:complexType name="AnyType">
<xs:sequence>
<xs:choice maxOccurs="unbounded">
<xs:element name="Match" type="mce:MatchType"/>
<xs:element name="Any" type="mce:AnyType"/>
</xs:choice>
</xs:choice>
</xs:sequence>
<xs:attribute name="minMatches" type="xs:nonNegativeInteger" default="1"/>
<xs:attribute name="maxMatches" type="xs:nonNegativeInteger" use="optional"/>
</xs:complexType>
<xs:simpleType name="ProximityType">
<xs:union>
<xs:simpleType>
<xs:restriction base='xs:string'>
<xs:enumeration value="unlimited"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType>
<xs:restriction base="xs:positiveInteger">
<xs:minInclusive value="1"/>
</xs:restriction>
</xs:simpleType>
</xs:union>
</xs:simpleType>
<xs:simpleType name="ProbabilityType">
<xs:restriction base="xs:integer">
<xs:minInclusive value="1"/>
<xs:maxInclusive value="100"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="WorkloadType">
<xs:restriction base="xs:string">
<xs:enumeration value="Exchange"/>
<xs:enumeration value="Outlook"/>
</xs:restriction>
</xs:simpleType>
<xs:simpleType name="EngineVersionType">
<xs:restriction base="xs:token">
<xs:pattern value="^\d{2}\.01?\.\d{3,4}\.\d{1,3}$"/>
</xs:restriction>
</xs:simpleType>
<xs:complexType name="VersionedRuleType">
<xs:choice maxOccurs="unbounded">
<xs:element name="Entity" type="mce:EntityType"/>
<xs:element name="Affinity" type="mce:AffinityType"/>
</xs:choice>
<xs:attribute name="minEngineVersion" type="mce:EngineVersionType" use="required" />
</xs:complexType>
<xs:complexType name="VersionedPatternType">
<xs:sequence>
<xs:element name="Pattern" type="mce:PatternType" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="minEngineVersion" type="mce:EngineVersionType" use="required" />
</xs:complexType>
<xs:complexType name="VersionedEvidenceType">
<xs:sequence>
<xs:element name="Evidence" type="mce:EvidenceType" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="minEngineVersion" type="mce:EngineVersionType" use="required" />
</xs:complexType>
<xs:simpleType name="FingerprintValueType">
<xs:restriction base="xs:string">
<xs:minLength value="2732"/>
<xs:maxLength value="2732"/>
</xs:restriction>
</xs:simpleType>
<xs:complexType name="FingerprintType">
<xs:simpleContent>
<xs:extension base="mce:FingerprintValueType">
<xs:attribute name="id" type="xs:token" use="required"/>
<xs:attribute name="threshold" type="mce:ProbabilityType" use="required"/>
<xs:attribute name="shingleCount" type="xs:positiveInteger" use="required"/>
<xs:attribute name="description" type="xs:string" use="optional"/>
</xs:extension>
</xs:simpleContent>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="RegexType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="id" type="xs:token" use="required"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="KeywordType">
<xs:sequence>
<xs:element name="Group" type="mce:GroupType" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="id" type="xs:token" use="required"/>
</xs:complexType>
<xs:complexType name="GroupType">
<xs:sequence>
<xs:choice>
<xs:element name="Term" type="mce:TermType" maxOccurs="unbounded"/>
</xs:choice>
</xs:sequence>
<xs:attribute name="matchStyle" default="word">
<xs:simpleType>
<xs:restriction base="xs:NMTOKEN">
<xs:enumeration value="word"/>
<xs:enumeration value="string"/>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:complexType>
<xs:complexType name="TermType">
<xs:simpleContent>
<xs:extension base="mce:RestrictedTermType">
<xs:attribute name="caseSensitive" type="xs:boolean" default="false"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="ExtendedKeywordType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="id" type="xs:token" use="required"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="LocalizedStringsType">
<xs:sequence>
<xs:element name="Resource" type="mce:ResourceType" maxOccurs="unbounded">
<xs:key name="UniqueLangCodeUsedInNamePerResource">
<xs:selector xpath="mce:Name"/>
<xs:field xpath="@langcode"/>
</xs:key>
<xs:key name="UniqueLangCodeUsedInDescriptionPerResource">
<xs:selector xpath="mce:Description"/>
<xs:field xpath="@langcode"/>
</xs:key>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ResourceType">
<xs:sequence>
<xs:element name="Name" type="mce:ResourceNameType" maxOccurs="unbounded"/>
<xs:element name="Description" type="mce:DescriptionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="idRef" type="mce:GuidType" use="required"/>
</xs:complexType>
<xs:complexType name="ResourceNameType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="default" type="xs:boolean" default="false"/>
<xs:attribute name="langcode" type="mce:LangType" use="required"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="DescriptionType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="default" type="xs:boolean" default="false"/>
<xs:attribute name="langcode" type="mce:LangType" use="required"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
</xs:schema>

More information
Overview of data loss prevention policies
What the sensitive information types look for
What the DLP functions look for
Create a keyword dictionary
10/31/2018 • 5 minutes to read • Edit Online

Data loss prevention (DLP ) in Office 365 can identify, monitor, and protect your sensitive information. Identifying
sensitive information sometimes requires looking for keywords, particularly when identifying generic content (such
as healthcare-related communication) or inappropriate or explicit language. While you can create keyword lists in
sensitive information types, keyword lists are limited in size and require modifying XML to create or edit them.
Keyword dictionaries provide simpler management of keywords and at a much larger scale, supporting up to
100,000 terms per dictionary.

Basic steps to creating a keyword dictionary


The keywords for your dictionary could come from a variety of sources, most commonly from a file (such as a .csv
or .txt list), from a list you enter directly in the cmdlet, or from an existing dictionary. When you create a keyword
dictionary, you follow the same core steps:
1. Connect to Security & Compliance Center PowerShell - see this topic.
2. Define or load your keywords from your intended source - the cmdlet to create a keyword dictionary
accepts a comma-separated list of keywords, so this step will vary slightly depending on where your
keywords come from.
3. Encode your keywords - once loaded, they're converted to a byte array before they're imported.
4. Create your dictionary - choose a name and description and create your dictionary.

Create a keyword dictionary from a file


Often when you need to create a large dictionary, it's to use keywords from a file or a list exported from some
other source. In this case, you'll create a keyword dictionary containing a list of inappropriate language to screen in
external email. You need to first Connect to Office 365 Security & Compliance Center PowerShell.
1. Copy the keywords into a text file and make sure that each keyword is on a separate line.
2. Save the text file with Unicode encoding. In Notepad > Save As > Encoding > Unicode.
3. Read the file into a variable by running this cmdlet:

$fileData = Get-Content <filename> -Encoding Byte -ReadCount 0

4. Create the dictionary by running this cmdlet:

New-DlpKeywordDictionary -Name <name> -Description <description> -FileData $fileData

Modifying an existing keyword dictionary


You might need to modify keywords in one of your keyword dictionaries, or modify one of the built-in dictionaries.
In this example, we'll modify some terms in PowerShell, save the terms locally where you can modify them in an
editor, and then update the previous terms in place. First, retrieve the dictionary object:
$dict = Get-DlpKeywordDictionary -Name "Diseases"

Printing $dict will show the various variables. The keywords themselves are stored in an object on the backend,
but $dict.KeywordDictionary contains a string representation of them, which you'll use to modify the dictionary.
Before you modify the dictionary, you need to turn the string of terms back into an array using the .split(',')
method. Then you'll clean up the unwanted spaces between the keywords with the .trim() method, leaving just
the keywords to work with.

$terms = $dict.KeywordDictionary.split(',').trim()

Now you'll remove some terms from the dictionary. Because the example dictionary has only a few keywords, you
could just as easily skip to exporting the dictionary and editing it in Notepad, but dictionaries generally contain a
large amount of text, so you'll first learn this way to edit them easily in PowerShell.
In the last step, you saved the keywords to an array. There are several ways to remove items from an array, but as a
straightforward approach, you'll create an array of the terms you want to remove from the dictionary, and then
copy only the dictionary terms to it that aren't in the list of terms to remove.
Run the command $terms to show the current list of terms. The output of the command looks like this:

aarskog's syndrome
abandonment
abasia
abderhalden-kaufmann-lignac
abdominalgia
abduction contracture
abetalipoproteinemia
abiotrophy
ablatio
ablation
ablepharia
abocclusion
abolition
aborter
abortion
abortus
aboulomania
abrami's disease

Run this command to specify the terms that you want to remove:

$termsToRemove = @('abandonment', 'ablatio')

Run this command to actually remove the terms from the list:

$updatedTerms = $terms | Where-Object{ $_ -notin $termsToRemove }

Run the command $updatedTerms to show the updated list of terms. The output of the command looks like this
(the specified terms have been removed):
aarskog's syndrome
abasia
abderhalden-kaufmann-lignac
abdominalgia
abduction contracture
abetalipo proteinemia
abiotrophy
ablation
ablepharia
abocclusion
abolition
aborter
abortion
abortus
aboulomania
abrami's disease

Now save the dictionary locally and add a few more terms. You could add the terms right here in PowerShell, but
you'll still need to export the file locally to ensure it's saved with Unicode encoding and contains the BOM.
Save the dictionary locally by running the following:

Set-Content $updatedTerms -Path "C:\myPath\terms.txt"

Now simply open the file, add your additional terms, and save with Unicode encoding (UTF -16). Now you'll upload
the updated terms and update the dictionary in place.

PS> Set-DlpKeywordDictionary -Identity "Diseases" -FileData (Get-Content -Path "C:myPath\terms.txt" -Encoding


Byte -ReadCount 0)

Now the dictionary has been updated in place. Note that the Identity field takes the name of the dictionary. If you
wanted to also change the name of your dictionary using the set- cmdlet, you would just need to add the -Name
parameter to what's above with your new dictionary name.

Using keyword dictionaries in custom sensitive information types and


DLP policies
Keyword dictionaries can be used as part of the match requirements for a custom sensitive information type, or as
a sensitive information type themselves. Both require Create a custom sensitive information type in Office 365
Security & Compliance Center PowerShell. Follow the instructions in the linked article to create a sensitive
information type. Once you have the XML, you'll need the GUID identifier for the dictionary to use it.

<Entity id="9e5382d0-1b6a-42fd-820e-44e0d3b15b6e" patternsProximity="300" recommendedConfidence="75">


<Pattern confidenceLevel="75">
<IdMatch idRef=". . ."/>
</Pattern>
</Entity>

To get the identity of your dictionary, run this command and copy the Identity property value:

Get-DlpKeywordDictionary -Name "Diseases"

The output of the command looks like this:


RunspaceId : 138e55e7-ea1e-4f7a-b824-79f2c4252255
Identity : 8d2d44b0-91f4-41f2-94e0-21c1c5b5fc9f
Name : Diseases
Description : Names of diseases and injuries from ICD-10-CM lexicon
KeywordDictionary : aarskog's syndrome, abandonment, abasia, abderhalden-kaufmann-lignac, abdominalgia,
abduction contracture, abetalipo
proteinemia, abiotrophy, ablatio, ablation, ablepharia, abocclusion, abolition, aborter,
abortion, abortus, aboulomania,
abrami's disease, abramo
IsValid : True
ObjectState : Unchanged

Paste the identity into your custom sensitive information type's XML and upload it. Now your dictionary will
appear in your list of sensitive information types and you can use it right in your policy, specifying how many
keywords are required to match.

<Entity id="d333c6c2-5f4c-4131-9433-db3ef72a89e8" patternsProximity="300" recommendedConfidence="85">


<Pattern confidenceLevel="85">
<IdMatch idRef="8d2d44b0-91f4-41f2-94e0-21c1c5b5fc9f" />
</Pattern>
</Entity>
<LocalizedStrings>
<Resource idRef="d333c6c2-5f4c-4131-9433-db3ef72a89e8">
<Name default="true" langcode="en-us">Diseases</Name>
<Description default="true" langcode="en-us">Detects various diseases</Description>
</Resource>
</LocalizedStrings>
Document Fingerprinting
9/24/2018 • 5 minutes to read • Edit Online

Information workers in your organization handle many kinds of sensitive information during a typical day. In the
Security & Compliance Center, Document Fingerprinting makes it easier for you to protect this information by
identifying standard forms that are used throughout your organization. This topic describes the concepts behind
Document Fingerprinting and how to create one by using PowerShell.

Basic scenario for Document Fingerprinting


Document Fingerprinting is a Data Loss Prevention (DLP ) feature that converts a standard form into a sensitive
information type, which you can use in the rules of your DLP policies. For example, you can create a document
fingerprint based on a blank patent template and then create a DLP policy that detects and blocks all outgoing
patent templates with sensitive content filled in. Optionally, you can set up policy tips to notify senders that they
might be sending sensitive information, and the sender should verify that the recipients are qualified to receive the
patents. This process works with any text-based forms used in your organization. Additional examples of forms that
you can upload include:
Government forms
Health Insurance Portability and Accountability Act (HIPAA) compliance forms
Employee information forms for Human Resources departments
Custom forms created specifically for your organization
Ideally, your organization already has an established business practice of using certain forms to transmit sensitive
information. After you upload an empty form to be converted to a document fingerprint and set up a
corresponding policy, the DLP detects any documents in outbound mail that match that fingerprint.

How Document Fingerprinting works


You've probably already guessed that documents don't have actual fingerprints, but the name helps explain the
feature. In the same way that a person's fingerprints have unique patterns, documents have unique word patterns.
When you upload a file, DLP identifies the unique word pattern in the document, creates a document fingerprint
based on that pattern, and uses that document fingerprint to detect outbound documents containing the same
pattern. That's why uploading a form or template creates the most effective type of document fingerprint. Everyone
who fills out a form uses the same original set of words and then adds his or her own words to the document. As
long as the outbound document isn't password protected and contains all the text from the original form, DLP can
determine if the document matches the document fingerprint.
The following example shows what happens if you create a document fingerprint based on a patent template, but
you can use any form as a basis for creating a document fingerprint.
Example of a patent document matching a document fingerprint of a patent template
The patent template contains the blank fields "Patent title," "Inventors," and "Description" and descriptions for each
of those fields—that's the word pattern. When you upload the original patent template, it's in one of the supported
file types and in plain text. DLP converts this word pattern into a document fingerprint, which is a small Unicode
XML file containing a unique hash value representing the original text, and the fingerprint is saved as a data
classification in Active Directory. (As a security measure, the original document itself isn't stored on the service;
only the hash value is stored, and the original document can't be reconstructed from the hash value.) The patent
fingerprint then becomes a sensitive information type that you can associate with a DLP policy. After you associate
the fingerprint with a DLP policy, DLP detects any outbound emails containing documents that match the patent
fingerprint and deals with them according to your organization's policy.
For example, you might want to set up a DLP policy that prevents regular employees from sending outgoing
messages containing patents. DLP will use the patent fingerprint to detect patents and block those emails.
Alternatively, you might want to let your legal department to be able to send patents to other organizations
because it has a business need for doing so. You can allow specific departments to send sensitive information by
creating exceptions for those departments in your DLP policy, or you can allow them to override a policy tip with a
business justification.
Supported file types
Document Fingerprinting supports the same file types that are supported in transport rules. For a list of supported
file types, see Supported file types for mail flow rule content inspection. One quick note about file types: neither
transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that's a
template file in Word. When you see the word "template" in this and other Document Fingerprinting topics, it refers
to a document that you have established as a standard form, not the template file type.
Limitations of document fingerprinting
Document Fingerprinting won't detect sensitive information in the following cases:
Password protected files
Files that contain only images
Documents that don't contain all the text from the original form used to create the document fingerprint

Use PowerShell to create a classification rule package based on


document fingerprinting
Note that you can currently create a document fingerprint only by using PowerShell in the Security & Compliance
Center. To connect, see Connect to Office 365 Security & Compliance Center PowerShell.
DLP uses classification rule packages to detect sensitive content. To create a classification rule package based on a
document fingerprint, use the New-DlpFingerprint and New-DlpSensitiveInformationType cmdlets. Because
the results of New-DlpFingerprint aren't stored outside the data classification rule, you always run New-
DlpFingerprint and New-DlpSensitiveInformationType or Set-DlpSensitiveInformationType in the same
PowerShell session. The following example creates a new document fingerprint based on the file C:\My
Documents\Contoso Employee Template.docx. You store the new fingerprint as a variable so you can use it with
the New-DlpSensitiveInformationType cmdlet in the same PowerShell session.

$Employee_Template = Get-Content "C:\My Documents\Contoso Employee Template.docx" -Encoding byte -ReadCount 0


$Employee_Fingerprint = New-DlpFingerprint -FileData $Employee_Template -Description "Contoso Employee
Template"

Now, let's create a new data classification rule named "Contoso Employee Confidential" that uses the document
fingerprint of the file C:\My Documents\Contoso Customer Information Form.docx.

$Employee_Template = Get-Content "C:\My Documents\Contoso Customer Information Form.docx" -Encoding byte -


ReadCount 0
$Customer_Fingerprint = New-DlpFingerprint -FileData $Customer_Form -Description "Contoso Customer Information
Form"
New-DlpSensitiveInformationType -Name "Contoso Customer Confidential" -Fingerprints $Customer_Fingerprint -
Description "Message contains Contoso customer information."

You can now use the Get-DlpSensitiveInformationType cmdlet to find all DLP data classification rule packages,
and in this example, "Contoso Customer Confidential" is part of the data classification rule packages list.
Finally, add the "Contoso Customer Confidential" data classification rule package to a DLP policy in the Security &
Compliance Center. This example adds a rule to an existing DLP policy named "ConfidentialPolicy".

New-DlpComplianceRule -Name "ContosoConfidentialRule" -Policy "ConfidentialPolicy" -


ContentContainsSensitiveInformation @{Name="Contoso Customer Confidential"} -BlockAccess $True

You can also use the data classification rule package in transport rules in Exchange Online, as shown in the
following example. To run this command, you first need to Connect to Exchange Online PowerShell. Also note that
it takes time for the rule package to sync from the Security & Compliance Center to the Exchange Admin Center.

New-TransportRule -Name "Notify :External Recipient Contoso confidential" -NotifySender NotifyOnly -Mode
Enforce -SentToScope NotInOrganization -MessageContainsDataClassification @{Name=" Contoso Customer
Confidential"}
DLP now detects documents that match the Contoso Customer Form.docx document fingerprint.
For syntax and parameter information, see:
New -DlpFingerprint
New -DlpSensitiveInformationType
Remove-DlpSensitiveInformationType
Set-DlpSensitiveInformationType
Get-DlpSensitiveInformationType
Overview of importing your organization PST files to
Office 365
10/18/2018 • 19 minutes to read • Edit Online

NOTE
This article is for administrators. Are you trying to import PST files to your own mailbox? See Import email, contacts, and
calendar from an Outlook .pst file

You can use the Import service in the Office 365 Security & Compliance Center to quickly bulk-import PST files to
Exchange Online mailboxes in your Office 365 organization. There are two ways you can import PST files to Office
365:

Network upload - Upload the PST files over the network to a temporary Azure storage location in the
Microsoft cloud. Then you use the Office 365 Import service to import the PST data to mailboxes in your
Office 365 organization.
Drive shipping - Copy the PST files to a BitLocker-encrypted hard drive and then physically ship the
drive to Microsoft. When Microsoft receives the hard drive, data center personnel upload the data to a
temporary Azure storage location in the Microsoft cloud. Then you use the Office 365 Import service to
import the data to mailboxes in your Office 365 organization.

Step-by-step instructions
See one of the following topics for detailed, step-by-step instructions for bulk-importing your organization's PST
files to Office 365.
Use network upload to import PST files to Office 365
Use drive shipping to import PST files to Office 365

How importing PST files works


Here's an illustration and description of the complete PST import process. The illustration shows the primary
workflow and highlights the differences between the network upload and drive shipping methods.
1. Download the PST import tools and key to private Azure storage location - The first step is to
download the tool and access key used to upload the PST files or copy them to a hard drive. You obtain
these from the Import page in the Office 365 Security & Compliance Center. The key provides you (or
Microsoft data center personnel in the case of drive shipping) with the necessary permissions to upload PST
files to a private and secure Azure storage location. This access key is unique to your organization and helps
prevent unauthorized access to your PST files after they're uploaded to the Microsoft cloud. Note that
importing PST files to Office 365 doesn't require your organization to have a separate Azure subscription.
2. Upload or copy the PST files - The next step depends on whether you're using network upload or drive
shipping to import PST files. In both cases, you'll use the tool and secure storage key that you obtained in
the previous step.
Network uploadThe AzCopy.exe tool (downloaded in step 1) is used to upload and store your PST
files in an Azure storage location in the Microsoft cloud. Note that the Azure storage location that you
upload your PST files to resides in the same regional Microsoft datacenter where your Office 365
organization is located.
To upload them, the PST files that you want to import to Office 365 have to be located in a file share
or file server in your organization.
Drive shippingThe WAImportExport.exe tool (downloaded in step 1) is used to copy your PST files
to the hard drive. This tool encrypts the hard drive with BitLocker and then copies the PSTs to the
hard drive. Like network upload, the PST files that you want to copy to the hard drive have to be
located in a file share or file server in your organization.
3. Create a PST import mapping file - After the PST files have been uploaded to the Azure storage location
or copied to a hard drive, the next step is to create a comma separated value (CSV ) file that specifies which
user mailboxes the PST files will be imported to (and a PST file can be imported to a user's primary mailbox
or their archive mailbox). The Office 365 Import service will use the information to import the PST files.
4. Create a PST import job - The next step is to create a PST import job on the Import page in the Security
& Compliance Center and submit the PST import mapping file created in the previous step. For network
upload (because the PST files have been uploaded to Azure) Office 365 analyzes the data in the PST files
and then gives you an opportunity to set filters that control what data actually gets imported to the
mailboxes specified in the PST import mapping file.
For drive shipping, a few additional things happen at this point in the process.
You physically ship the hard drive to a Microsoft data center (the shipping address for the Microsoft
data center is displayed when the import job is created)
When Microsoft receives the hard drive, data center personnel will upload the PSTs files on the hard
drive to the Azure storage location for your organization. As previously explained, your PST files are
uploaded to a Azure storage location that resides in the same regional Microsoft datacenter where
your Office 365 organization is located.

NOTE
The PST files on the hard drive are uploaded to Azure within 7 to 10 business days after Microsoft receives the
hard drive.

Like the network upload process, Office 365 then analyzes the data in the PST files and gives you an
opportunity to set filters that control what data actually gets imported to the mailboxes specified in
the PST import mapping file.
Microsoft ships the hard drive back to you.
5. Filter the PST data that will be imported to mailboxes - After the import job is created (and after the
PST files from a drive shipping job are uploaded to the Azure storage location) Office 365 analyzes the data
in the PST files (safely and securely) by identifying the age of the items and the different message types
included in the PST files. When the analysis is completed and the data is ready to import, you have the
option to import all the data contained in the PST files or you can trim the data that's imported by setting
filters that control what data gets imported.
6. Start the PST import job - After the import job is started, Office 365 uses the information in the PST
import mapping file to import the PSTs files from the he Azure storage location to user mailboxes. Status
information about the import job (including information about each PST file being imported) is displayed on
the Import page in the Security & Compliance Center. When the import job is finished, the status for the
job is set to Complete.

Why import email data to Office 365?


Importing PST files to user mailboxes is one way to migrate your organization's email to Office 365.
You can use the Intelligent Import feature to filter the items in PST files that actually get imported to the
target mailboxes. This lets you trim the data that's imported by setting filters that control what data gets
imported.
Importing email data to Office 365 helps address compliance needs of your organization by letting you:
Enable archive mailboxes and unlimited archiving to give users additional mailbox storage space.
Place mailboxes on Litigation Hold to retain content.
Use the Content Search tool to search for mailbox content.
Use eDiscovery cases to mange your organization's legal investigations
Use retention policies in the Security & Compliance Center to control how long mailbox content is
retained, and then delete content after the retention period expires.
Importing data to Office 365 helps protect against data loss. Email data that's imported to Office 365
inherits the high availability features of Exchange Online.
Email data in Office 365 is available to users from all devices because it's stored in the cloud.

Importing SharePoint data to Office 365


You can also import files and documents to SharePoint sites and OneDrive accounts in your Office 365
organization. For more information, see the following articles:
Migrate to SharePoint Online
Introducing the SharePoint Migration Tool
Migrate to SharePoint Online using PowerShell
Migrate your file share content to SharePoint Online using the Azure Data Box

Frequently asked questions about importing PST files to Office 365


Here are some frequently asked questions about using the Office 365 Import service to bulk-import PST files to
Office 365 mailboxes.
Using network upload to import PST files
Using drive shipping to import PST files
Using network upload to import PST files
What permissions are required to create import jobs in the Office 365 Import Service?
You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Office 365
mailboxes. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox
Import Export role to the Organization Management role group. Or you can create a new role group, assign the
Mailbox Import Export role, and then add yourself or other users as a member. For more information, see the "Add
a role to a role group" or the "Create a role group" sections in Manage role groups in Exchange Online.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be
true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the
Organization Management and Recipient Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For
the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the
new role group, and then add members.
Where is network upload available?
Network upload is currently available in the United States, Canada, Brazil, the United Kingdom, Europe, India, East
Asia, Southeast Asia, Japan, Republic of Korea, and Australia. Network upload will be available in more regions
soon.
What is the pricing for importing PST files by using network upload?
Using network upload to import PST files is free.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Office 365 admin center. Although an import job might still be listed on
the Import data to Office 365 page, the list of PST files might be empty when you view the details of older
import jobs.
What version of the PST file format is supported for importing to Office 365?
There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the
Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a
double-byte character set (DBCS ), can also be imported to Office 365. For more information about importing
ANSI PST files, see Step 4 in Use network upload to import PST files to Office 365.
Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
After I upload my PST files to the Azure storage area, how long are they kept in Azure before they're
deleted?
When you use the network upload method to import PST files, you upload them to an Azure blob container named
ingestiondata. If there are no import jobs in progress on the Import page in the Security & Compliance Center),
then all PST files in the ingestiondata container in Azure are deleted 30 days after the most recent import job was
created in the Security & Compliance Center. That also means you have to create a new import job in the Security
& Compliance Center (described in Step 5 in the network upload instructions) within 30 days of uploading PST
files to Azure.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Security & Compliance Center. Although an import job might still be
listed on the Import page in the Security & Compliance Center, the list of PST files might be empty when you view
the details of older import jobs.
How long does it take to import a PST file to a mailbox?
It depends on the capacity of your network, but it typically takes several hours for each terabyte (TB ) of data to be
uploaded to the Azure storage area for your organization. After the PST files are copied to the Azure storage area,
a PST file is imported to an Office 365 mailbox at a rate of at least 24 GB per day. If this rate doesn't meet your
needs, you might consider other methods for migrating email data to Office 365. For more information, see Ways
to migrate multiple email accounts to Office 365.
If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other
words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same
mailbox, they will be simultaneously imported.
Is there a message size limit when importing PST files?
Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped during the import
process.
Are message properties, such as when the message was sent or received, the list of recipients and other
properties, preserved when PST files are imported to an Office 365 mailbox?
Yes. The original message metadata isn't changed during the import process.
Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a
mailbox?
Yes. You can't import a PST file that has 300 or more levels of nested folders.
Can I use network upload to import PST files to an inactive mailbox in Office 365?
Yes, this capability is now available.
Can I use network upload to import PST files to an online archive mailbox in an Exchange hybrid
deployment?
Yes, this capability is now available.
Can I use network upload to import PST files to public folders in Exchange Online?
No, you can't import PST files to public folders.
Using drive shipping to import PST files
What permissions are required to create import jobs in the Office 365 Import Service?
You have to be assigned the Mailbox Import Export role to import PST files to Office 365 mailboxes. By default,
this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the
Organization Management role group. Or you can create a new role group, assign the Mailbox Import Export role,
and then add yourself or other users as a member. For more information, see the "Add a role to a role group" or
the "Create a role group" sections in Manage role groups in Exchange Online.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be
true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the
Organization Management and Recipient Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For
the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the
new role group, and then add members.

Where is drive shipping available?


Drive shipping is currently available in the United States, Canada, Brazil, the United Kingdom, Europe, India, East
Asia, Southeast Asia, Japan, Republic of Korea, and Australia. Drive shipping will be available in more regions soon.
What commercial licensing agreements support drive shipping?
Drive shipping to import PST files to Office 365 is available through a Microsoft Enterprise Agreement (EA). Drive
shipping isn't available through a Microsoft Products and Services Agreement (MPSA).
What is the pricing for using drive shipping to import PST files to Office 365?
The cost to use drive shipping to import PST files to Office 365 mailboxes is $2 USD per GB of data. For example,
if you ship a hard drive that contains 1,000 GB (1 TB ) of PST files, the cost is $2,000 USD. You can work with a
partner to pay the import fee. For information about finding a partner, see Find your Office 365 partner or reseller.
What kind of hard drives are supported for drive shipping?
Only 2.5 inch solid-state drives (SSDs) or 2.5 or 3.5 inch SATA II/III internal hard drives are supported for use with
the Office 365 Import service. You can use hard drives up to 10 TB. For import jobs, only the first data volume on
the hard drive will be processed. The data volume must be formatted with NTFS. When copying data to a hard
drive, you can attach it directly using a 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III connector or you can attach it
externally using an external 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III USB adaptor.

IMPORTANT
External hard drives that come with an built-in USB adaptor aren't supported by the Office 365 Import service. Additionally,
the disk inside the casing of an external hard drive can't be used. Please don't ship external hard drives.

How many hard drives can I ship for a single import job?
You can ship a maximum of 10 hard drives for a single import job.
After I ship my hard drive, how long does it take to get to the Microsoft data center?
That depends on a few things, such as your proximity to the Microsoft data center and what kind of shipping option
you used to ship your hard drive (such as, next-day delivery, two-day delivery, or ground-delivery). With most
shippers, you can use the tracking number to track the status of your delivery.
After my hard drive arrives at the Microsoft data center, how long does it take to upload my PST files to
Azure?
After your hard drive is received at the Microsoft data center, it will take between 7 to 10 business days to upload
the PST files to the Microsoft Azure storage area for your organization. The PST files will be uploaded to a Azure
blob container named ingestiondata .
How long does it take to import a PST file to a mailbox?
After the PST files are uploaded to the Azure storage area, Office 365 analyzes the data in the PST files (in a safe
and secure manner) to identify the age of the items and the different message types included in the PST files.
When this analysis is complete, you'll have the option to import all the data in the PST files or set filters to that
control what data gets imported. After you start the import job, a PST file is imported to an Office 365 mailbox at a
rate of at least 24 GB per day. If this rate doesn't meet your needs, you might consider other methods for importing
email data to Office 365. For more information, see Ways to migrate multiple email accounts to Office 365.
If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other
words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same
mailbox, they will be simultaneously imported.
After Microsoft uploads my PST files to Azure, how long are they kept in Azure before they're deleted?
All PST files in the Azure storage location for your organization (in blob container named ingestiondata ), are
deleted 30 days after the most recent import job was created on the Import page in the Security & Compliance
Center.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Security & Compliance Center. Although an import job might still be
listed on the Import page in the Security & Compliance Center, the list of PST files might be empty when you view
the details of older import jobs.
What version of the PST file format is supported for importing to Office 365?
There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the
Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a
double-byte character set (DBCS ), can also be imported to Office 365. For more information about importing
ANSI PST files, see Step 3 in Use drive shipping to import your organization PST files to Office 365.
Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
Is there a message size limit when importing PST files?
Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped during the import
process.
Are message properties, such as when the message was sent or received, the list of recipients and other
properties, preserved when PST files are imported to an Office 365 mailbox?
Yes. The original message metadata isn't changed during the import process
Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a
mailbox?
Yes. You can't import a PST file that has 300 or more levels of nested folders.
Can I use drive shipping to import PST files to an inactive mailbox in Office 365?
Yes, this capability is now available.
Can I use drive shipping to import PST files to an online archive mailbox in an Exchange hybrid
deployment?
Yes, this capability is now available.
Can I use drive shipping to import PST files to public folders in Exchange Online?
No, you can't import PST files to public folders.
Can Microsoft wipe my hard drive before they ship it back to me?
No, Microsoft can't wipe hard drives before shipping them back to customers. Hard drives are returned to you in
the same state they were in when they were received by Microsoft.
Can Microsoft shred my hard drive instead of shipping it back to me?
No, Microsoft can't destroy your hard drive. Hard drives are returned to you in the same state they were in when
they were received by Microsoft.
What courier services are supported for return shipping?
If you're a customer in the United States or Europe, Microsoft uses FedEx to return your hard drive. For all other
regions, Microsoft uses DHL.
What are the return shipping costs?
Return shipping costs vary, depending on your proximity to the Microsoft data center that you shipped your hard
drive to. Microsoft will bill your FedEx or DHL account to return your hard drive. The cost of return shipping is your
responsibility.
Can I use a custom courier shipping service, such as FedEx Custom Shipping, to ship my hard drive to
Microsoft?
Yes.
If I have to ship my hard drive to another country, is there anything I need to do?
The hard drive that you ship to Microsoft might have to cross international borders. If this is the case, you're
responsible for ensuring that the hard drive and the data it contains are imported and/or exported in accordance
with the applicable laws. Before shipping a hard drive, check with your advisors to verify that your drive and data
can legally be shipped to the specified Microsoft data center. This will help to ensure that it reaches Microsoft in a
timely manner.
Use network upload to import your organization PST files to Office 365
8/21/2018 • 28 minutes to read • Edit Online

NOTE
This article is for administrators. Are you trying to import PST files to your own mailbox? See Import email, contacts, and calendar from an Outlook .pst file

Here are the step-by-step instructions required to use network upload to bulk-import multiple PST files to Office 365 mailboxes. For frequently asked questions about using
network upload to bulk-import PST files to Office 365 mailboxes, see FAQs for using network upload to import PST files.
Step 1: Copy the SAS URL and install Azure AzCopy
Step 2: Upload your PST files to Office 365
(Optional) Step 3: View a list of the PST files uploaded to Office 365
Step 4: Create the PST Import mapping file
Step 5: Create a PST Import job in Office 365
Step 6: Filter data and start the PST Import job
Note that you have to perform Step 1 only once to import PST files to Office 365 mailboxes. After you perform these steps, follow Step 2 through Step 6 each time you want
to upload and import a batch of PST files.

Before you begin


You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Office 365 mailboxes. By default, this role isn't assigned to any role
group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group. Or you can create a new role group, assign the
Mailbox Import Export role, and then add yourself as a member. For more information, see the "Add a role to a role group" or the "Create a role group" sections in
Manage role groups.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the Organization Management and Recipient
Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For the minimum level of privileges required to import PST files,
assign the Mailbox Import Export and Mail Recipients roles to the new role group, and then add members.

The only supported method for importing PST files to Office 365 is to use the Azure AzCopy tool, as described in this topic. You can't use the Azure Storage Explorer to
upload PST files directly to the Azure storage area.
You need to store the PST files that you want to import to Office 365 on a file server or shared folder in your organization. In Step 2, you'll run the Azure AzCopy tool
that will upload the PST files that are stored on this file server or shared folder to Office 365.
This procedure involves copying and saving a copy of a URL that contains an access key. This information will be used in Step 2 to upload your PST files, and in Step 3
if you want to view a list of the PST files uploaded to Office 365. Be sure to take precautions to protect this URL like you would protect passwords or other security-
related information. For example you might save it to a password-protected Microsoft Word document or to an encrypted USB drive. See the More information
section for an example of this combined URL and key.
You can import PST files to an inactive mailbox in Office 365. You do this by specifying the GUID of the inactive mailbox in the Mailbox parameter in the PST Import
mapping file. See Step 4 on the Instructions tab in this topic for information.
In an Exchange hybrid deployment, you can import PST files to a cloud-based archive mailbox for a user whose primary mailbox is on-premises. You do this by doing
the following in the PST Import mapping file:
Specify the email address for the user's on-premises mailbox in the Mailbox parameter.
Specify the TRUE value in the IsArchive parameter.
See Step 4 for more information.
After PST files are imported to an Office 365 mailbox, the retention hold setting for the mailbox is turned on for an indefinite duration. This means that the retention
policy assigned to the mailbox won't be processed until you turn off the retention hold or set a date to turn off the hold. Why do we do this? If messages imported to a
mailbox are old, they might be permanently deleted (purged) because their retention period has expired based on the retention settings configured for the mailbox.
Placing the mailbox on retention hold will give the mailbox owner time to manage these newly-imported messages or give you time to change the retention settings
for the mailbox. See the More info tab in this topic for suggestions about managing the retention hold.
By default, the maximum message size that can be received by an Office 365 mailbox is 35 MB. That's because the default value for the MaxReceiveSize property for a
mailbox is set to 35 MB. However, the limit for the maximum message receive size in Office 365 is 150 MB. So if you import a PST file that contains an item larger
than 35 MB, the Office 365 Import service we will automatically change the value of the MaxReceiveSize property on the target mailbox to 150 MB. This allows
messages up to 150 MB to be imported to user mailboxes.

TIP
To identify the message receive size for a mailbox, you can run this command in Exchange Online PowerShell: Get-Mailbox <user mailbox> | FL MaxReceiveSize .

Step 1: Copy the SAS URL and install Azure AzCopy


The first step is to download and install the Azure AzCopy tool, which is the tool that you'll run in Step 2 to upload PST files to Office 365. You'll also copy the SAS URL for
your organization. This URL is a combination of the network URL for the Azure storage location in the Microsoft cloud for your organization and a Shared Access Signature
(SAS) key. This key provides you with the necessary permissions to upload PST files to your Azure storage location. Be sure to take precautions to protect the SAS URL. It's
unique to your organization and will be used in Step 2.
Important: We recommend that you use Azure AzCopy version 7.1.0 to import PST files by using the network upload method. Version 7.1.0 is downloaded in step 6b in the
following procedure.
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance > Import.
Note: You have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center. See the Before you begin section for
more information.
3. On the Import page, click New import job.
The import job wizard is displayed.
4. Type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't use uppercase letters or include spaces
in the name.
5. On the Do you want to upload or ship data? page, click Upload your data and then click Next.

6. On the Import data page, do the following two things:

a. In step 2, click Show network upload SAS URL. After the SAS URL is displayed, click Copy to clipboard and then paste it and save it to a file so you can access it
later.
b. In step 3, click Download Azure AzCopy to download and install the Azure AzCopy tool. As previously stated, version 7.1.0 will be downloaded. In the pop-up
window, click Run to install AzCopy.
Note: You can leave the Import data page open (in case you need to copy the SAS URL again) or click Cancel to close it.

Step 2: Upload your PST files to Office 365


Now you're ready to use the AzCopy.exe tool to upload PST files to Office 365. This tool uploads and stores them in an Azure storage location in the Microsoft cloud. As
previously explained, the Azure storage location that you upload your PST files to resides in the same regional Microsoft datacenter where your Office 365 organization is
located. To complete this step, the PST files have to be located in a file share or file server in your organization. This is known as the source directory in the following
procedure. Each time you run the AzCopy tool, you can specify a different source directory.
1. Open a Command Prompt on your local computer.
2. Go to the directory where you installed the AzCopy.exe tool in Step 1. If you installed the tool in the default location, go to
%ProgramFiles(x86)%\Microsoft SDKs\Azure\AzCopy .

3. Run the following command to upload the PST files to Office 365.

AzCopy.exe /Source:<Location of PST files> /Dest:<SAS URL> /V:<Log file location> /Y

The following table describes the parameters and their required values. Note that the information you obtained in the previous step is used in the values for these
parameters.
PARAMETER DESCRIPTION EXAMPLE

/Source: Specifies the source directory in your organization that /Source:"\\FILESERVER01\PSTs"


contains the PST files that will be uploaded to Office 365.
Be sure to surround the value of this parameter with
double-quotation marks (" ").

/Dest: Specifies the SAS URL that you obtained in Step 1. /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-
Be sure to surround the value of this parameter with 31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt
double-quotation marks (" "). Or
Tip: (Optional) You can specify a subfolder in the Azure /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata/PSTFiles
31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt
storage location to upload the PST files to. You do this by
adding a subfolder location (after "ingestiondata") in the
SAS URL. The first example doesn't specify a subfolder; that
means the PSTs will be uploaded to the root (named
ingestiondata ) of the Azure storage location. The second
example uploads the PST files to a subfolder (named
PSTFiles ) in the root of the Azure storage location.

/V: Outputs verbose status messages into a log file. By default, /V:"c:\Users\Admin\Desktop\Uploadlog.log"
the verbose log file is named AzCopyVerbose.log in
%LocalAppData%\Microsoft\Azure\AzCopy. If you specify
an existing file location for this option, the verbose log will
be appended to that file.
Be sure to surround the value of this parameter with
double-quotation marks (" ").

/S This optional switch specifies the recursive mode so that the /S


AzCopy tool will copy PSTs files that are located in
subfolders in the source directory that is specified by the
/Source: parameter.
Note: If you include this switch, PST files in subfolders will
have a different file pathname in the Azure storage location
after they're uploaded. You'll have to specify the exact file
pathname in the CSV file that you create in Step 4.

/Y This required switch allows the use of write-only SAS tokens /Y


when you upload the PST files to the Azure storage
location. The SAS URL you obtained in step 1 (and specified
in /Dest: parameter) is a write-only SAS URL, which is
why you must include this switch. Note that a write-only
SAS URL will not prevent you from using the Azure Storage
Explorer to view a list of the PST files uploaded to the Azure
storage location.

Here's an example of the syntax for the AzCopy.exe tool using actual values for each parameter:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D" /V:"c:\Users\Admin\Desktop\AzCopy1.log"
/Y

After you run the command, status messages are displayed that show the progress of uploading the PST files. A final status message shows the total number of files that were
successfully uploaded.
Tip: After you successfully run the AzCopy.exe command and verify that all the parameters are correct, save a copy of the command line syntax to the same (secured) file
where you copied the information you obtained in Step 1. Then you can copy and paste this command in a Command Prompt each time that you want to run the AzCopy.exe
tool to upload PST files to Office 365. The only value you might have to change are the ones for the /Source: parameter. This depends on the source directory where the PST
files are located.

(Optional) Step 3: View a list of the PST files uploaded to Office 365
As an optional step, you can install and use the Microsoft Azure Storage Explorer (which is a free, open source tool) to view the list of the PST files that you've uploaded to the
Azure blob. There are two good reasons to do this:
Verify that PST files from the shared folder or file server in your organization were successfully uploaded to the Azure blob.
Verify the filename (and the subfolder pathname if you included one) for each PST file uploaded to the Azure blob. This is really helpful when you're creating the PST
mapping file in the next step because you have to specify both the folder pathname and filename for each PST file. Verifying these names can help reduce potential
errors in your PST mapping file.
The Microsoft Azure Storage Explorer is in Preview.
Important: You can't use the Azure Storage Explorer to upload or modify PST files. The only supported method for importing PST files to Office 365 is to use AzCopy. Also,
you can't delete PST files that you've uploaded to the Azure blob. If you try to delete a PST file, you'll receive an error about not having the required permissions. Note that all
PST files are automatically deleted from your Azure storage area. If there are no import jobs in progress, then all PST files in the ** ingestiondata ** container are deleted 30
days after the most recent import job was created.
To install the Azure Storage Explorer and connect to your Azure storage area:
1. Download and install the Microsoft Azure Storage Explorer tool.
2. Start the Microsoft Azure Storage Explorer, right-click Storage Accounts in the left pane, and then click Connect to Azure storage.

3. Click Use a shared access signature (SAS) URI or connection string and click Next.
4. Click Use a SAS URI, paste the SAS URL that you obtained in Step 1 into the box under URI, and then click Next.
5. On the Connection summary page, you can review the connection information, and then click Connect.
The ingestiondata container is opened; it contains the PST files that you uploaded in Step 2. The ingestiondata container is located under Storage Accounts >
(SAS-Attached Services) > Blob Containers.

6. When you're finished using the Microsoft Azure Storage Explorer, right-click ingestiondata, and then click Detach to disconnect from your Azure storage area.
Otherwise, you'll receive an error the next time you try to attach.

Step 4: Create the PST Import mapping file


After the PST files have been uploaded to the Azure storage location for your Office 365 organization, the next step is to create a comma separated value (CSV) file that
specifies which user mailboxes the PST files will be imported to. You'll submit this CSV file in the next step when you create a PST Import job.
1. Download a copy of the PST Import mapping file.
2. Open or save the CSV file to your local computer. The following example shows a completed PST Import mapping file (opened in NotePad). It's much easier to use
Microsoft Excel to edit the CSV file.

Workload,FilePath,Name,Mailbox,IsArchive,TargetRootFolder,ContentCodePage,SPFileContainer,SPManifestContainer,SPSiteUrl
Exchange,,annb.pst,annb@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,annb_archive.pst,annb@contoso.onmicrosoft.com,TRUE,,,,,
Exchange,,donh.pst,donh@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,donh_archive.pst,donh@contoso.onmicrosoft.com,TRUE,,,,,
Exchange,PSTFiles,pilarp.pst,pilarp@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,PSTFiles,pilarp_archive.pst,pilarp@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,PSTFiles,tonyk.pst,tonyk@contoso.onmicrosoft.com,FALSE,,,,,
Exchange,PSTFiles,tonyk_archive.pst,tonyk@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,PSTFiles,zrinkam.pst,zrinkam@contoso.onmicrosoft.com,FALSE,,,,,
Exchange,PSTFiles,zrinkam_archive.pst,zrinkam@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,

The first row, or header row, of the CSV file lists the parameters that will be used by the PST Import service to import the PST files to user mailboxes. Each parameter
name is separated by a comma. Each row under the header row represents the parameter values for importing a PST file to a specific mailbox. You will need a row for
each PST file that you want to import to a user mailbox. Be sure to replace the placeholder data in the mapping file with your actual data.
Note: Don't change anything in the header row, including the SharePoint parameters; they will be ignored during the PST Import process.
3. Use the information in the following table to populate the CSV file with the required information.

PARAMETER DESCRIPTION EXAMPLE

Workload Specifies the Office 365 service that data will be imported Exchange
to. To import PST files to user mailboxes, use Exchange .

FilePath Specifies the folder location in the Azure storage location (leave blank)
that you uploaded the PST files to in Step 2. Or
If you didn't include an optional subfolder name in the SAS PSTFiles
URL in the /Dest: parameter in Step 2, leave this
parameter blank in the CSV file. If you included a subfolder
name, specify it in this parameter (see the second example).
The value for this parameter is case sensitive.
Either way, don't include "ingestiondata" in the value for the
FilePath parameter.

Important: The case for the file path name must be the
same as the case you used if you included an optional
subfolder name in the SAS URL in the /Dest: parameter
in Step 2. For example, if you used PSTFiles for the
subfolder name in Step 2 and then use pstfiles in the
FilePath parameter in CSV file, the import for the PST file
will fail. Be sure to use the same case in both instances.
PARAMETER DESCRIPTION EXAMPLE

Name Specifies the name of the PST file that will be imported to annb.pst
the user mailbox. The value for this parameter is case
sensitive.

Important: The case for the PST file name in the CSV file
must be the same as the PST file that was uploaded to the
Azure storage location in Step 2. For example, if you use
annb.pst in the Name parameter in the CSV file, but the
name of the actual PST file is AnnB.pst , the import for
that PST file will fail. Be sure that the name of the PST in the
CSV file uses the same case as the actual PST file.

Mailbox Specifies the email address of the mailbox that the PST file annb@contoso.onmicrosoft.com
will be imported to. Note that you can't specify a public Or
folder because the PST Import Service doesn't support 2d7a87fe-d6a2-40cc-8aff-1ebea80d4ae7
importing PST files to public folders.
To import a PST file to an inactive mailbox, you have to
specify the mailbox GUID for this parameter. To obtain this
GUID, run the following PowerShell command in Exchange
Online:
Get-Mailbox <identity of inactive mailbox> -
InactiveMailboxOnly | FL Guid

Note: In some cases, you might have multiple mailboxes


with the same email address, where one mailbox is an active
mailbox and the other mailbox is in a soft-deleted (or
inactive) state. In these situations, you have to specify the
mailbox GUID to uniquely identify the mailbox to import
the PST file to. To obtain this GUID for active mailboxes, run
the following PowerShell command:
Get-Mailbox <identity of active mailbox> | FL Guid .
To obtain the GUID for soft-deleted (or inactive) mailboxes,
run this command
Get-Mailbox <identity of soft-deleted or inactive
mailbox> -SoftDeletedMailbox | FL Guid
.

IsArchive Specifies whether or not to import the PST file to the user's FALSE
archive mailbox. There are two options: Or
TRUE
FALSE - Imports the PST file to the user's primary mailbox.
TRUE - Imports the PST file to the user's archive mailbox.
This assumes that the user's archive mailbox is enabled.

If you set this parameter to TRUE and the user's archive


mailbox isn't enabled, the import for that user will fail. Note
that if an import fails for one user (because their archive
isn't enabled and this property is set to TRUE ), the other
users in the import job won't be affected.
If you leave this parameter blank, the PST file is imported to
the user's primary mailbox.

Note: To import a PST file to a cloud-based archive mailbox


for a user whose primary mailbox is on-premises, just
specify TRUE for this parameter and specify the email
address for the user's on-premises mailbox for the
Mailbox parameter.

TargetRootFolder Specifies the mailbox folder that the PST file is imported to. (leave blank)
If you leave this parameter blank, the PST will be imported Or
to a new folder named Imported located at the root level /
of the mailbox (the same level as the Inbox folder and the Or
other default mailbox folders). /ImportedPst
If you specify / , items in the PST file will be imported
directly in to the user's Inbox folder.

If you specify /<foldername> , items in the PST file will be


imported to a folder named <foldername> . For example, if
you use /ImportedPst , items would be imported to a
folder named ImportedPst. This folder will be located in
the user's mailbox at the same level as the Inbox folder.

Tip: Consider running a few test batches to experiment


with this parameter so you can determine the best folder
location to import PSTs files to.

ContentCodePage This optional parameter specifies a numeric value for the (leave blank)
code page to use for importing PST files in the ANSI file Or
format. This parameter is used for importing PST files from 932 (which is the code page identifier for ANSI/OEM
Chinese, Japanese, and Korean (CJK) organizations because Japanese)
these languages typically use a double byte character set
(DBCS) for character encoding. If this parameter isn't used
to import PST files for languages that use DBCS for mailbox
folder names, the folder names are often garbled after
they're imported.

For a list of supported values to use for this parameter, see


Code Page Identifiers.

Note: As previously stated, this is an optional parameter


and you don't have to include it in the CSV file. Or you can
include it and leave the value blank for one or more rows.

SPFileContainer For PST Import, leave this parameter blank. Not applicable

SPManifestContainer For PST Import, leave this parameter blank. Not applicable
PARAMETER DESCRIPTION EXAMPLE

SPSiteUrl For PST Import, leave this parameter blank. Not applicable

Step 5: Create a PST Import job in Office 365


The next step is to create the PST Import job in the Import service in Office 365. As previously explained, you will submit the PST Import mapping file that you created in Step
4. After you create the new job, Office 365 analyzes the data in the PST files and then gives you an opportunity to filter the data that actually gets imported to the mailboxes
specified in the PST import mapping file (see Step 6).
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance and then click Import.
3. On the Import page, click New import job.
Note: You have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center to create a new import job. See the
Before you begin section for more information.
4. Type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't use uppercase letters or include spaces
in the name.
5. On the Do you want to upload or ship data? page, click Upload your data and then click Next.

6. In step 4 on the Import data page, click the I'm done uploading my files and I have access to the mapping file check boxes, and then click Next.

7. On the Select the mapping file page, click Select mapping file to submit the PST Import mapping file that you created in Step 4.

8. After the name of the CSV file appears under Mapping file name, click Validate to check your CSV file for errors.
The CSV file has to be successfully validated to create a PST Import job. Note the file name is changed to green after it's successfully validated. If the validation fails,
click the View log link. A validation error report is opened, with a error message for each row in the file that failed.
9. After the PST mapping file is successfully validated, read the terms and conditions document, and then click the checkbox.
10. Click Save to submit the job, and then click Close after the job is successfully created.
A status flyout page is displayed, with a status of Analysis in progress and the new import job is displayed in the list on the Import page.
11. Click Refresh to update the status information that's displayed in the Status column. When the analysis is complete and the data is ready to be imported, the status is
changed to Analysis completed.
You can click the import job to display the status flyout page, which contains more detailed information about the import job such as the status of each PST file listed in
the mapping file.

Step 6: Filter data and start the PST Import job


After you create the import job in Step 5, Office 365 analyzes the data in the PST files (in a safe and secure manner) by identifying the age of the items and the different
message types included in the PST files. When the analysis is completed and the data is ready to import, you have the option to import all the data contained in the PST files
or you can trim the data that's imported by setting filters that control what data gets imported.
1. On the Import page in the Security & Compliance Center, click Ready to import to Office 365 for the import job that you created in Step 5.

A fly out page is displayed with information about the PST files and other information about the import job.
2. On the flyout page, click Import to Office 365.
The Filter your data page is displayed. It contains the data insights resulting from the analysis performed on the PST files by Office 365, including information about
the age of the data. At this point, you have the option to filter the data that will be imported or import all the data as is.

3. Do one of the following:


a. To trim the data that you import, click Yes, I want to filter it before importing.
For detailed step-by-step instructions about filtering the data in the PST files and then starting the import job, see Filter data when importing PST files to Office 365.
Or
b. To import all data in the PST files, click No, I want to import everything, and click Next.
4. If you chose to import all the data, click Import data to start the import job.
The status of the import job is display on the Import page. Click Refresh to update the status information that's displayed in the Status column. Click the import job
to display the status flyout page, which displays status information about each PST file being imported.

How the import process works


You can use the network upload option and the Office 365 Import service to bulk-import PST files to user mailboxes. Network upload means that you upload the PST files a
temporary storage area in the Microsoft cloud. Then the Office 365 Import service copies the PST files from the storage area to the target user mailboxes.
Here's an illustration and description of the network upload process to import PST files to mailboxes in Office 365.

1. Download the PST import tool and key to private Azure storage location - The first step is to download the Azure AzCopy command-line tool and an access key
used to upload the PST files to an Azure storage location in the Microsoft cloud . You obtain these from the Import page in the Office 365 Security & Compliance
Center. The key (called a secure access signature (SAS) key, provides you with the necessary permissions to upload PST files to a private and secure Azure storage
location. This access key is unique to your organization and helps prevent unauthorized access to your PST files after they're uploaded to the Microsoft cloud. Note that
importing PST files to Office 365 doesn't require your organization to have a separate Azure subscription.
2. Upload the PST files to the Azure storage location - The next step is to use the AzCopy.exe tool (downloaded in step 1) to upload and store your PST files in an
Azure storage location that resides in the same regional Microsoft datacenter where your Office 365 organization is located. To upload them, the PST files that you
want to import to Office 365 have to be located in a file share or file server in your organization.
Note that there's an optional step that you can perform to view the list of PST files after they're uploaded to the Azure storage location.
3. Create a PST import mapping file - After the PST files have been uploaded to the Azure storage location, the next step is to create a comma separated value (CSV)
file that specifies which user mailboxes the PST files will be imported to, note that a PST file can be imported to a user's primary mailbox or their archive mailbox. The
Office 365 Import service will use the information in the CSV file to import the PST files.
4. Create a PST import job - The next step is to create a PST import job on the Import page in the Security & Compliance Center and submit the PST import mapping
file created in the previous step. After you create the import job, Office 365 analyzes the data in the PST files and then gives you an opportunity to set filters that
control what data actually gets imported to the mailboxes specified in the PST import mapping file.
5. Filter the PST data that will be imported to mailboxes - After the import job is created and started, Office 365 analyzes the data in the PST files (safely and
securely) by identifying the age of the items and the different message types included in the PST files. When the analysis is completed and the data is ready to import,
you have the option to import all the data contained in the PST files or you can trim the data that's imported by setting filters that control what data gets imported.
6. Start the PST import job - After the import job is started, Office 365 uses the information in the PST import mapping file to import the PSTs files from the he Azure
storage location to user mailboxes. Status information about the import job (including information about each PST file being imported) is displayed on the Import
page in the Security & Compliance Center. When the import job is finished, the status for the job is set to Complete.

More information
Why import PST files to Office 365?
It's a good way to import your organization's archival messaging data to Office 365.
The data is available to the user from all devices because it's stored in the cloud.
It helps address compliance needs of your organization by letting you apply Office 365 compliance features to the data from the PST files that you imported.
This includes:
Enabling archive mailboxes and auto-expanding archiving to give users additional mailbox storage space to store the data that you imported.
Placing mailboxes on Litigation Hold to retain the data that you imported.
Using Microsoft eDiscovery tools to search the data that you imported.
Using Office 365 retention policies to control how long the data that you imported will be retained, and what action to take after the retention period expires.
Searching the Office 365 audit log for mailbox-related events that affect the data that you imported.
Importing data to inactive mailboxes to archive data for compliance purposes.
Using data loss prevention policies to prevent sensitive data from leaking outside your organization.
Here's an example of the Shared Access Signature (SAS) URL that's obtained in Step 1. This example also contains the syntax for the command that you run in the
AzCopy.exe tool to upload PST files to Office 365. Be sure to take precautions to protect the SAS URL just like you would protect passwords or other security-related
information.
SAS URL: https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-
31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D

AzCopy.exe /Source:<Location of PST files> /Dest:<SAS URL> /V:<Log file location> /Y

EXAMPLES

This example uploads PST files to the root of the Azure storage location:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D"
/V:"c:\Users\Admin\Desktop\AzCopy1.log" /Y

This example uploads PST files to a subfolder named PSTFiles in the Azure storage location:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata/PSTFiles?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D"
/V:"c:\Users\Admin\Desktop\AzCopy1.log" /Y

``
As previously explained, the Office 365 Import service turns on the retention hold setting (for an indefinite duration) after PST files are imported to a mailbox. This
means the RetentionHoldEnabled property is set to True so that the retention policy assigned to the mailbox won't be processed. This gives the mailbox owner time to
manage the newly-imported messages by preventing a deletion or archive policy from deleting or archiving older messages. Here are some steps you can take to
manage this retention hold:
After a certain period of time, you can turn off the retention hold by running the Set-Mailbox -RetentionHoldEnabled $false command. For instructions, see Place
a mailbox on retention hold.
You can configure the retention hold so that it's turned off on some date in the future. You do this by running the Set-Mailbox -EndDateForRetentionHold <date>
command. For example, assuming that today's date is July 1, 2016 and you want the retention hold turned off in 30 days, you would run the following
command: Set-Mailbox -EndDateForRetentionHold 8/1/2016 . In this scenario, you would leave the RetentionHoldEnabled property set to True . For more
information, see Set-Mailbox.
You can change the settings for the retention policy that's assigned to the mailbox so that older items that were imported won't be immediately deleted or
moved to the user's archive mailbox. For example, you could lengthen the retention age for a deletion or archive policy that's assigned to the mailbox. In this
scenario, you would turn off the retention hold on the mailbox after you changed the settings of the retention policy. For more information, see Set up an archive
and deletion policy for mailboxes in your Office 365 organization.
Use drive shipping to import your organization PST files to Office 365
8/21/2018 • 34 minutes to read • Edit Online

This article is for administrators. Are you trying to import PST files to your own mailbox? See Import email, contacts, and calendar from an
Outlook .pst file
Use the Office 365 Import service and drive shipping to bulk-import PST files to user mailboxes. Drive shipping means that you copy the PST files to a hard
disk drive and then physically ship the drive to Microsoft. When Microsoft receives your hard drive, data center personnel will copy the data from the hard
drive to a storage area in the Microsoft cloud. Then you have the opportunity to trim the PST data that's actually imported to the target mailboxes by setting
filters that control what data gets imported. After you start the import job, the Import service imports the PST data from the storage area to user mailboxes.
Using drive shipping to import PST files to user mailboxes is one way to migrate your organization's email to Office 365.
Here are the steps required to use drive shipping to import PST files to Office 365 mailboxes:
Step 1: Download the secure storage key and PST Import tool
Step 2: Copy the PST files to the hard drive
Step 3: Create the PST Import mapping file
Step 4: Create a PST Import job in Office 365
Step 5: Ship the hard drive to Microsoft
Step 6: Filter data and start the PST Import job

IMPORTANT
You have to perform Step 1 once to down load the secure storage key and the import tool. After you perform these steps, follow Step 2 through Step 6 each time you want to
ship a hard drive to Microsoft.

For frequently asked questions about using drive shipping to import PST files to Office 365, see FAQs for using drive shipping to import PST files.

Before you begin


You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Office 365 mailboxes. By default, this role isn't
assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group. Or you can
create a new role group, assign the Mailbox Import Export role, and then add yourself as a member. For more information, see the "Add a role to a role
group" or the "Create a role group" sections in Manage role groups.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the Organization Management and
Recipient Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For the minimum level of privileges
required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the new role group, and then add members.

You need to store the PST files that you want to copy to a hard drive on a file server or shared folder in your organization. In Step 2, you'll run the Azure
Import Export tool (WAImportExport.exe) that will copy the PST files that are stored on this file server or shared folder to the hard drive.
Only 2.5 inch solid-state drives (SSDs) or 2.5 or 3.5 inch SATA II/III internal hard drives are supported for use with the Office 365 Import service. You
can use hard drives up to 10 TB. For import jobs, only the first data volume on the hard drive will be processed. The data volume must be formatted with
NTFS. When copying data to a hard drive, you can attach it directly using a 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III connector or you can attach it
externally using an external 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III USB adaptor.

IMPORTANT
External hard drives that come with an built-in USB adaptor aren't supported by the Office 365 Import service. Additionally, the disk inside the casing of an external
hard drive can't be used. Please don't ship external hard drives.

The hard drive that you copy the PST files to must be encrypted with BitLocker. The WAImportExport.exe tool that you run in Step 2 will help you set up
BitLocker. It also generates a BitLocker encryption key that Microsoft data center personnel will use to access the drive to upload the PST files to the
Azure storage area in the Microsoft cloud.
Drive shipping is available through a Microsoft Enterprise Agreement (EA). Drive shipping isn't available through a Microsoft Products and Services
Agreement (MPSA).
The cost to import PST files to Office 365 mailboxes using drive shipping is $2 USD per GB of data. For example, if you ship a hard drive that contains
1,000 GB (1TB) of PST files, the cost is $2,000 USD. You can work with a partner to pay the import fee. For information about finding a partner, see Find
your Office 365 partner or reseller.
You or your organization must have an account with FedEx or DHL.
Organizations in the United States, Brazil, and Europe must have FedEx accounts.
Organizations in East Asia, Southeast Asia, Japan, Republic of Korea, and Australia must have DHL accounts.
Microsoft will use (and charge) this account to return the hard drive back to you.
The hard drive that you ship to Microsoft might have to cross international borders. If this is the case, you're responsible for ensuring that the hard drive
and the data it contains are imported and/or exported in accordance with the applicable laws. Before shipping a hard drive, check with your advisors to
verify that your drive and data can legally be shipped to the identified Microsoft data center. This will help to ensure that it reaches Microsoft in a timely
manner.
This procedure involves copying and saving a secure storage key and a BitLocker encryption key. Be sure to take precautions to protect these keys like
you would protect passwords or other security-related information. For example, you might save them to a password-protected Microsoft Word
document or save them to an encrypted USB drive. See the More information section for an example of these keys.
After PST files are imported to an Office 365 mailbox, the retention hold setting for the mailbox is turned on for an indefinite duration. This means that
the retention policy assigned to the mailbox won't be processed until you turn off the retention hold or set a date to turn off the hold. Why do we do
this? If messages imported to a mailbox are old, they might be permanently deleted (purged) because their retention period has expired based on the
retention settings configured for the mailbox. Placing the mailbox on retention hold will give the mailbox owner time to manage these newly-imported
messages or give you time to change the retention settings for the mailbox. See the More information section for suggestions about managing the
retention hold.
By default, the maximum message size that can be received by an Office 365 mailbox is 35 MB. That's because the default value for the MaxReceiveSize
property for a mailbox is set to 35 MB. However, the limit for the maximum message receive size in Office 365 is 150 MB. So if you import a PST file
that contains an item larger than 35 MB, the Office 365 Import service we will automatically change the value of the MaxReceiveSize property on the
target mailbox to 150 MB. This allows messages up to 150 MB to be imported to user mailboxes.

TIP
To identify the message receive size for a mailbox, you can run this command in Exchange Online PowerShell: Get-Mailbox <user mailbox> | FL MaxReceiveSize .

You can import PST files to an inactive mailbox in Office 365. You do this by specifying the GUID of the inactive mailbox in the Mailbox parameter in
the PST Import mapping file. See Step 3: Create the PST Import mapping file for more information.
In an Exchange hybrid deployment, you can import PST files to a cloud-based archive mailbox for a user whose primary mailbox is on-premises. You do
this by doing the following in the PST Import mapping file:
Specify the email address for the user's on-premises mailbox in the Mailbox parameter.
Specify the TRUE value in the IsArchive parameter.
See Step 3: Create the PST Import mapping file for more information.

Step 1: Download the secure storage key and PST Import tool
The first step is to download the secure storage key and the tool and that you will use in Step 2 to copy PST files to the hard drive.

IMPORTANT
You have to use Azure Import/Export tool version 1 (WAimportExportV1) to successfully import PST files by using the drive shipping method. Version 2 of the Azure
Import/Export tool isn't supported and using it will result in incorrectly preparing the hard drive for the import job. Be sure to download the Azure Import/Export tool from the
Security & Compliance Center by following the procedures in this step.

1. Go to https://protection.office.com/ and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance > Import.

NOTE
As previously stated, you have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center.

3. On the Import page, click New import job.


4. In the import job wizard, type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't
use uppercase letters or include spaces in the name.
5. On the Choose import job type page, click Ship hard drives to one of our physical locations and then click Next.
6. On the Import data page, do the following two things:

a. In step 2, click Copy the secure storage key. After the storage key is displayed, click Copy to clipboard and then paste it and save it to a file so you
can access it later.
b. In step 3, Download the Azure Import/Export tool to download and install the Azure Import/Export (version 1) tool.
In the pop-up window, click Save > Save as to save the WaImportExportV1.zip file to a folder on your local computer.
Extract the WaImportExportV1.zip file.
7. Click Cancel to close the wizard.
You'll come back to the Import page in the Security & Compliance Center when you create the import job in Step 4.

Step 2: Copy the PST files to the hard drive


The next step is to use the WAImportExport.exe tool to copy PST files to the hard drive. This tool encrypts the hard drive with BitLocker, copies the PSTs to the
hard drive, and creates a journal file that stores information about the copy process. To complete this step, the PST files have to be located in a file share or file
server in your organization. This is known as the source directory in the following procedure.

IMPORTANT
After you run the WAImportExport.exe tool the first time for a hard drive, you have to use a different syntax each time after that. This syntax is explained in step 4 of this
procedure to copy PST files to the hard drive.

1. Open a Command Prompt on your local computer.

TIP
If you run the command prompt as an administrator (by selecting "Run as administrator" when you open it) error messages will be displayed in the command prompt
window. This can help you troubleshoot problems running the WAImportExport.exe tool.
2. Go to the directory where you installed the WAImportExport.exe tool in Step 1.
3. Run the following command the first time that you use the WAImportExport.exe to copy PST files to a hard drive.

WAImportExport.exe PrepImport /j:<Name of journal file> /t:<Drive letter> /id:<Name of session> /srcdir:<Location of PST files> /dstdir:<PST file
path> /sk:<Storage account key> /encrypt /logdir:<Log file location>

The following table describes the parameters and their required values.

PARAMETER DESCRIPTION EXAMPLE

/j: Specifies the name of the journal file. This file is saved /j:PSTHDD1.jrn
to the same folder where the WAImportExport.exe
tool is located. Each hard drive you ship to Microsoft
must have one journal file. Every time you run the
WAImportTool.exe to copy PST files to a hard drive,
information will be appended to the journal file for
that drive.
Microsoft data center personnel will use the
information in the journal file to associate the hard
drive with the import job that you create in Step 4,
and to upload the PST files to the Azure storage area
in the Microsoft cloud.

/t: Specifies the drive letter of the hard drive when it's /t:h
connected to your local computer.

/id: Specifies the name of the copy session. A session is /id:driveship1


defined as each time you run the WAImportExport.exe
tool to copy files to the hard drive. The PST files are
copied to a folder named with the session name
specified by this parameter.

/srcdir: Specifies the source directory in your organization /srcdir:"\\FILESERVER01\PSTs"


that contains the PST files that will be copied during
the session. Be sure to surround the value of this
parameter with double-quotation marks (" ").

/dstdir: Specifies the destination directory in the Azure /dstdir:"ingestiondata/"


storage area in the Microsoft cloud where the PSTs Or
will be uploaded. You must use the value /dstdir:"ingestiondata/FILESERVER01/PSTs"
ingestiondata/ . Be sure to surround the value of
this parameter with double-quotation marks (" ").
Optionally, you can also add an additional file path to
the value of this parameter. For example, you can use
the file path of the source directory on the hard drive
(converted to a URL format) , which is specified in the
/srcdir: parameter. For example,
\\FILESERVER01\PSTs is changed to
FILESERVER01/PSTs . In this case, you still must
include ingestiondata in the file path. So in this
example, the value for the /dstdir: parameter
would be "ingestiondata/FILESERVER01/PSTs" .
One reason to add the additional file path is if you
have PSTs files with the same filename.
> [!NOTE]> If you include the optional pathname, the
namespace for a PST file after it's uploaded to the
Azure storage area will include the pathname and the
name of the PST file; for example,
FILESERVER01/PSTs/annb.pst . If you don't include a
pathname, the namespace is only the PST filename;
for example annb.pst .

/sk: Specifies the storage account key that you obtained in "yaNIIs9Uy5g25Yoak+LlSHfqVBGOeNwjqtBEBGqRMoidq6/e5k/VPkjOXdDIXJHxHvNo
Step 1. Be sure to surround the value of this
parameter with double-quotation marks (" ").

/encrypt This switch turns on BitLocker for the hard drive. This /encrypt
parameter is required the first time you run the
WAImportExport.exe tool.
The BitLocker encryption key is copied to the journal
file and the log file that is created if you use the
/logfile: parameter. As previously explained, the
journal file is saved to the same folder where the
WAImportExport.exe tool is located.

/logdir: This optional parameter specifies a folder to save log /logdir:"c:\users\admin\desktop\PstImportLogs"


files to. If not specified, the log files are save to the
same folder where the WAImportExport.exe tool is
located. Be sure to surround the value of this
parameter with double-quotation marks (" ").

Here's an example of the syntax for the WAImportExport.exe tool using actual values for each parameter:
WAImportExport.exe PrepImport /j:PSTHDD1.jrn /t:f /id:driveship1 /srcdir:"\\FILESERVER01\PSTs" /dstdir:"ingestiondata/"
/sk:"yaNIIs9Uy5g25Yoak+LlSHfqVBGOeNwjqtBEBGqRMoidq6/e5k/VPkjOXdDIXJHxHvNoNoFH5NcVUJXHwu9ZxQ==" /encrypt
/logdir:"c:\users\admin\desktop\PstImportLogs"

After you run the command, status messages are displayed that show the progress of copying the PST files to the hard drive. A final status message
shows the total number of files that were successfully copied.
4. Run this command each subsequent time you run the WAImportExport.ext tool to copy PST files to the same hard drive.

WAImportExport.exe PrepImport /j:<Name of journal file> /id:<Name of new session> /srcdir:<Location of PST files> /dstdir:<PST file path>

Here's an example of the syntax for running subsequent sessions to copy PST files to the same hard drive.

WAImportExport.exe PrepImport /j:PSTHDD1.jrn /id:driveship2 /srcdir:"\\FILESERVER01\PSTs\SecondBatch" /dstdir:"ingestiondata/"

Step 3: Create the PST Import mapping file


After Microsoft data center personnel upload the PST files from the hard drive to the Azure storage area, the Import service will use the information in the PST
Import mapping file, which is a comma separated value (CSV) file, that specifies which user mailboxes the PST files will be imported to. You will submit this
CSV file in the next step when you create a PST Import job.
1. Download a copy of the PST Import mapping file.
2. Open or save the CSV file to your local computer. The following example shows a completed PST Import mapping file (opened in NotePad). It's much
easier to use Microsoft Excel to edit the CSV file.

Workload,FilePath,Name,Mailbox,IsArchive,TargetRootFolder,ContentCodePage,SPFileContainer,SPManifestContainer,SPSiteUrl
Exchange,FILESERVER01/PSTs,annb.pst,annb@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,FILESERVER01/PSTs,annb_archive.pst,annb@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,FILESERVER01/PSTs,donh.pst,donh@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,FILESERVER01/PSTs,donh_archive.pst,donh@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,FILESERVER01/PSTs,pilarp.pst,pilarp@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,FILESERVER01/PSTs,pilarp_archive.pst,pilarp@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,,tonyk.pst,tonyk@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,tonyk_archive.pst,tonyk@contoso.onmicrosoft.com,TRUE,,,,,
Exchange,,zrinkam.pst,zrinkam@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,zrinkam_archive.pst,zrinkam@contoso.onmicrosoft.com,TRUE,,,,,

The first row, or header row, of the CSV file lists the parameters that will be used by the PST Import service to import the PST files to user mailboxes.
Each parameter name is separated by a comma. Each row under the header row represents the parameter values for importing a PST file to a specific
mailbox. You will need a row for each PST file that was copied to the hard drive. Be sure to replace the placeholder data in the mapping file with your
actual data.

NOTE
Don't change anything in the header row, including the SharePoint parameters; they will be ignored during the PST Import process.

3. Use the information in the following table to populate the CSV file with the required information.

PARAMETER DESCRIPTION EXAMPLE

Workload Specifies the Office 365 service that data will be Exchange
imported to. To import PST files to user mailboxes,
use Exchange .
PARAMETER DESCRIPTION EXAMPLE

FilePath Specifies the folder location in the Azure storage area (leave blank)
that PST files will be copied to when the hard drive is Or
shipped to Microsoft. FILESERVER01/PSTs
What you add in this column in the CSV file depends
on what you specified in for the /dstdir: parameter
in the previous step.
If you used /dstdir:"ingestiondata/" , then leave
this parameter blank in the CSV file.
If you included an optional pathname for the value of
the /dstdir: parameter (for example,
/dstdir:"ingestiondata/FILESERVER01/PSTs" ,
then use that pathname (not including
"ingestiondata") for this parameter in the CSV file. The
value for this parameter is case sensitive.
Either way, don't include "ingestiondata" in the value
for the FilePath parameter. Leave this parameter
blank or specify only the optional pathname.
> [!IMPORTANT]> The case for the file path name
must be the same case that you specified in the
/dstdir: parameter in the previous step . For
example, if you used
"ingestiondata/FILESERVER01/PSTs" for the
subfolder name in the previous step, but then used
fileserver01/psts in the FilePath parameter in
CSV file, the import for the PST file will fail. Be sure to
use the same case in both instances.

Name Specifies the name of the PST file that will be imported annb.pst
to the user mailbox. The value for this parameter is
case sensitive.
> [!IMPORTANT]> The case for the PST file name in
the CSV file must be the same as the PST file that was
uploaded to the Azure storage location in Step 2. For
example, if you use annb.pst in the Name
parameter in the CSV file, but the name of the actual
PST file is AnnB.pst , the import for that PST file will
fail. Be sure that the name of the PST in the CSV file
uses the same case as the actual PST file.

Mailbox Specifies the email address of the mailbox that the PST annb@contoso.onmicrosoft.com
file will be imported to. Note that you can't specify a Or
public folder because the PST Import Service doesn't 2d7a87fe-d6a2-40cc-8aff-1ebea80d4ae7
support importing PST files to public folders.
To import a PST file to an inactive mailbox, you have
to specify the mailbox GUID for this parameter. To
obtain this GUID, run the following PowerShell
command in Exchange Online:
Get-Mailbox <identity of inactive mailbox> -
InactiveMailboxOnly | FL Guid
> [!NOTE]> In some cases, you might have multiple
mailboxes with the same email address, where one
mailbox is an active mailbox and the other mailbox is
in a soft-deleted (or inactive) state. In these situations,
you have to specify the mailbox GUID to uniquely
identify the mailbox to import the PST file to. To
obtain this GUID for active mailboxes, run the
following PowerShell command:
Get-Mailbox <identity of active mailbox> | FL
Guid
. To obtain the GUID for soft-deleted (or inactive)
mailboxes, run this command:
Get-Mailbox <identity of soft-deleted or
inactive mailbox> -SoftDeletedMailbox | FL
Guid
.
PARAMETER DESCRIPTION EXAMPLE

IsArchive Specifies whether or not to import the PST file to the FALSE
user's archive mailbox. There are two options: Or
FALSE Imports the PST file to the user's primary TRUE
mailbox.
TRUE Imports the PST file to the user's archive
mailbox. This assumes that the user's archive mailbox
is enabled. If you set this parameter to TRUE and the
user's archive mailbox isn't enabled, the import for
that user will fail. Note that if an import fails for one
user (because their archive isn't enabled and this
property is set to TRUE ), the other users in the
import job won't be affected.
If you leave this parameter blank, the PST file is
imported to the user's primary mailbox.
Note: To import a PST file to a cloud-based archive
mailbox for a user whose primary mailbox is on-
premises, just specify TRUE for this parameter and
specify the email address for the user's on-premises
mailbox for the Mailbox parameter.

TargetRootFolder Specifies the mailbox folder that the PST file is (leave blank)
imported to. Or
If you leave this parameter blank, the PST will be /
imported to a new folder named Imported located at Or
the root level of the mailbox (the same level as the /ImportedPst
Inbox folder and the other default mailbox folders).
If you specify / , items in the PST file will be imported
directly in to the user's Inbox folder.
If you specify /<foldername> , items in the PST file
will be imported to a folder named <foldername> .
For example, if you use /ImportedPst , items would
be imported to a folder named ImportedPst. This
folder will be located in the user's mailbox at the same
level as the Inbox folder.

ContentCodePage This optional parameter specifies a numeric value for (leave blank)
the code page to use for importing PST files in the Or
ANSI file format. This parameter is used for importing 932 (which is the code page identifier for ANSI/OEM
PST files from Chinese, Japanese, and Korean (CJK) Japanese)
organizations because these languages typically use a
double byte character set (DBCS) for character
encoding. If this parameter isn't used to import PST
files for languages that use DBCS for mailbox folder
names, the folder names are often garbled after
they're imported.
For a list of supported values to use for this
parameter, see Code Page Identifiers.
> [!NOTE]> As previously stated, this is an optional
parameter and you don't have to include it in the CSV
file. Or you can include it and leave the value blank for
one or more rows.

SPFileContainer For PST Import, leave this parameter blank. Not applicable

SPManifestContainer For PST Import, leave this parameter blank. Not applicable

SPSiteUrl For PST Import, leave this parameter blank. Not applicable

Step 4: Create a PST Import job in Office 365


The next step is to create the PST Import job in the Import service in Office 365. As previously explained, you will submit the PST Import mapping file that you
created in Step 3. After you create the new job, the Import service will use the information in the mapping file to import the PST files to the specified user
mailbox after the PST files are copied from the hard drive to the Azure storage area and you create and start the import job.
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance and then click Import.
3. On the Import page, click New import job.

NOTE
As previously stated, you have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center.

4. Type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't use uppercase letters or
include spaces in the name.
5. On the Choose import job type page, click Ship hard drives to one of our physical locations and then click Next.
6. In step 6, click the I've prepared my hard drives and have access to the necessary drive journal files and I have access to the mapping file
check boxes, and then click Next.

7. On the Select the drive file page, click Select drive file, and then go to the same folder where the WAImportExport.exe tool is located. The journal file
that was created in Step 2 was copied to this folder.

8. Select the journal file; for example, PSTHDD1.jrn .

TIP
When you ran the WAImportExport.exe tool in Step 2, the name of the journal file was specified by the /j: parameter.

9. After the name of the drive file appears under Drive file name, click Validate to check your drive file for errors.
The drive file has to be successfully validated to create a PST Import job. Note the file name is changed to green after it's successfully validated. If the
validation fails, click the View log link. A validation error report is opened, with a error message with information about why the file failed.

NOTE
You must add and validate a journal file for each hard drive you ship to Microsoft.

10. After adding and validating a journal file for each hard drive that you'll ship to Microsoft, click Next.
11. Click Select mapping file to submit the PST Import mapping file that you created in Step 3.

12. After the name of the CSV file appears under Mapping file name, click Validate to check your CSV file for errors.

The CSV file has to be successfully validated to create a PST Import job. Note the file name is changed to green after it's successfully validated. If the
validation fails, click the View log link. A validation error report is opened, with a error message for each row in the file that failed.
13. After the PST mapping file is successfully validated, click Next.
14. On the Provide contact information page, type your contact information in the applicable boxes.
Note that the address for the Microsoft location that you will ship your hard drives to is displayed. This address is auto-generated based on your Office
365 data center location. Copy this address to a file or take a screenshot.
15. Read the terms and conditions document, click the checkbox, and then click Save to submit the import job.
When the import job is successfully created, a status page is displayed that explains the next steps of the drive shipping process.
16. On the Import page, click Refresh to displayed the new drive shipping import job in the list of import jobs. Note that the status is set to Waiting for
tracking number. You can also click the import job to display the status flyout page, which contains more detailed information about the import job.

Step 5: Ship the hard drive to Microsoft


The next step is to ship the hard drive to Microsoft, and then provide the tracking number for the shipment and return shipment information for the drive
shipping job. After the drive is received by Microsoft, it will take between 7 and 10 business days for data center personnel to upload your PST files to the
Azure storage area for your organization.

NOTE
If you don't provide the tracking number and return shipment information within 14 days of creating the import job, the import job will be expired. If this happens, you'll have
to create a new drive shipping import job (see Step 4: Create a PST Import job in Office 365) and re-submit the drive file and the PST import mapping file.

Ship the hard drive


Keep the following things in mind when you ship hard drives to Microsoft:
Don't ship the SATA-to-USB adapter; you only have to ship the hard drive.
Package the hard drive properly; for example, use an anti-static bag or bubble wrap.
Use a delivery carrier of your choice to ship the hard drive to Microsoft.
Ship the hard drive to the address for the Microsoft location that was displayed when you created the import job in Step 4. Be sure to include "Office
365 Import Service" in the ship-to address.
After you ship the hard drive, be sure to write down the name of the delivery carrier and the tracking number. You'll provide these in the next step.
Enter the tracking number and other shipping information
After you've shipped the hard drive to Microsoft, complete the following procedure on the Import service page.
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane, click Data governance and then click Import.
3. On the Import page, click the job for the drive shipment that you want to enter the tracking number for.
4. On the status flyout page, click Enter tracking number.
5. Provide the following shipping information:
6. Delivery carrier Type the name of the delivery carrier that you used to ship the hard drive to Microsoft.
7. Tracking number Type the tracking number for the hard drive shipment.
8. Return carrier account number Type your organization's account number for the carrier that listed under Return carrier. Microsoft will use (and
charge) this account to ship your hard drive back to you. Note that organizations in the USA and Europe, must have an account with FedEx.
Organizations in Asia and the rest of the world, must have an account with DHL.
9. Click Save to save this information for the import job.
On the Import page, click Refresh to update the information for your drive shipping import job. Notice that status is now set to Drives in transit.

Step 6: Filter data and start the PST Import job


After your hard drive is received by Microsoft, the status for the import job on the Import page will change to Drives received. Data center personnel will use
the information in the journal file to upload your PST files to the Azure storage area for your organization. At this point, the status will change to Import in-
progress. As previously stated, it will take between 7 to 10 business days after receiving your hard drive to upload the PST files.
After PST files are uploaded to Azure, the status is changed to Analysis in progress. This indicates that Office 365 is analyzing the data in the PST files (in a
safe and secure manner) to identify the age of the items and the different message types included in the PST files. When the analysis is completed and the data
is ready to import, the status for the import job is changed to Analysis completed. At this point, you have the option to import all the data contained in the
PST files or you can trim the data that's imported by setting filters that control what data gets imported.
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane, click Data governance > Import.
3. On the Import page, click Ready to import to Office 365 for the import job that you created in Step 4.
A fly out page is displayed with information about the PST files and other information about the import job.
4. Click Import to Office 365.
5. The Filter your data page is displayed. It contains the data insights resulting from the analysis performed on the PST files by Office 365, including
information about the age of the data. At this point, you have the option to filter the data that will be imported or import all the data as is.

6. Do one of the following:


a. To trim the data that you import, click Yes, I want to filter it before importing.
For detailed step-by-step instructions about filtering the data in the PST files and then starting the import job, see Filter data when importing PST files
to Office 365.
Or
b. To import all data in the PST files, click No, I want to import everything, and click Next.
7. If you chose to import all the data, click Import data to start the import job.
The status of the import job is displayed on the Import page. Click Refresh to update the status information that's displayed in the Status column.
Click the import job to display the status flyout page, which displays status information about each PST file being imported. When the import is
complete and PST files have been imported to user mailboxes, the status will be changed to Completed.

View a list of the PST files uploaded to Office 365


You can install and use the Microsoft Azure Storage Explorer (which is a free, open source tool) to view the list of the PST files that we're uploaded (by
Microsoft data center personnel) to the Azure storage area for your organization. You can do this to verify that PST files from the hard drives that you sent to
Microsoft were successfully uploaded to the Azure storage area.
The Microsoft Azure Storage Explorer is in Preview.
Important: You can't use the Azure Storage Explorer to upload or modify PST files. The only supported method for importing PST files to Office 365 is to use
AzCopy. Also, you can't delete PST files that you've uploaded to the Azure blob. If you try to delete a PST file, you'll receive an error about not having the
required permissions. Note that all PST files are automatically deleted from your Azure storage area. If there are no import jobs in progress, then all PST files
in the ** ingestiondata ** container are deleted 30 days after the most recent import job was created.
To install the Azure Storage Explorer and connect to your Azure storage area:
1. Perform the following steps to get the Shared Access Signature (SAS) URL for your organization. This URL is a combination of the network URL for the
Azure storage location in the Microsoft cloud for your organization and an SAS key. This key provides you with the necessary permissions to access
your organization's Azure storage location.
2. Go to https://protection.office.com/ and sign in using the credentials for an administrator account in your Office 365 organization.
3. In the left pane of the Security & Compliance Center, click Data governance > Import.
4. On the Import page, click New import job.
5. In the import job wizard, type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't
use uppercase letters or include spaces in the name.
6. On the Choose import job type page, click Upload your data and then click Next.
7. In step 2, click Show network upload SAS URL.
8. After the URL is displayed, copy it and save it to a file. Be sure to copy the entire URL.

IMPORTANT
Be sure to take precautions to protect the SAS URL. This can be used by anyone to access the Azure storage area for your organization.
9. Click Cancel to close the import job wizard.
10. Download and install the Microsoft Azure Storage Explorer tool.
11. Start the Microsoft Azure Storage Explorer, right-click Storage Accounts in the left pane, and then click Connect to Azure storage.

12. Click Use a shared access signature (SAS) URI or connection string and click Next.
13. Click Use a SAS URI, paste the SAS URL that you obtained in step 1 in to in the box under URI, and then click Next.
14. On the Connection summary page, you can review the connection information, and then click Connect.
The ingestiondata container is opened; it contains the PST files from your hard drive. The ingestiondata container is located under Storage
Accounts > (SAS-Attached Services) > Blob Containers.

15. When you're finished using the Microsoft Azure Storage Explorer, right-click ingestiondata, and then click Detach to disconnect from your Azure
storage area. Otherwise, you'll receive an error the next time you try to attach.

Troubleshooting tips
What happens if the import job fails because of errors in the PST Import CSV mapping file? If an import job fails because of errors in the
mapping file, you don't have to re-ship the hard drive to Microsoft in order to create a new import job. That's because the PST files from the hard drive
that you submitted for the drive shipping import job have already been uploaded to the Azure storage area for your organization. In this case, you just
have to fix the errors in the PST Import CSV mapping file, and then create a new "network upload" import job and submit the revised CSV mapping file.
To create and start a new network upload import job, see Step 5: Create a PST Import job in Office 365 and Step 6: Filter data and start the PST Import
job in the topic "Use network upload to import PST files to Office 365."

NOTE
To help you troubleshoot the PST Import CSV mapping file, use the Azure Storage Explorer tool to view the folder structure in the ingestiondata container for the PST
files from your hard drive that were uploaded to the Azure storage area. Mapping file errors are typically caused by an incorrect value in the FilePath parameter. This
parameter specifies the location of a PST file in the Azure storage area. See the description of the FilePath parameter in table in Step 3. As previously explained, the
location of PST files in the Azure storage area was specified by the /dstdir: parameter when you ran the WAImportExport.exe tool in Step 2.

More information
Drive shipping is an effective way to import large amounts of archival messaging data to Office 365 to take advantage of the compliance features that
are available to your organization. After archival data is imported to user mailboxes, you can:
Enable archive mailboxes and auto-expanding archiving to give users additional mailbox storage space for the data.
Place mailboxes on Litigation Hold to retain the data.
Use Microsoft eDiscovery tools to search the data.
Apply Office 365 retention policies to control how long the data is retained, and what action to take after the retention period expires.
Search the Office 365 audit log for events related to this data.
Import data to inactive mailboxes to archive data for compliance purposes.
Protect your organization against data loss of sensitive information.
Here's an example of the secure storage account key and a BitLocker encryption key. This example also contains the syntax for the WAImportExport.exe
command that you run to copy PST files to a hard drive. Be sure to take precautions to protect these just like you would protect passwords or other
security-related information.

Secure storage account key:

yaNIIs9Uy5g25Yoak+LlSHfqVBGOeNwjqtBEBGqRMoidq6/e5k/VPkjOXdDIXJHxHvNoNoFH5NcVUJXHwu9ZxQ==

BitLocker encryption key:

397386-221353-718905-535249-156728-127017-683716-083391

COMMAND SYNTAX

First time:

WAImportExport.exe PrepImport /j:<Name of journal file> /t:<Drive letter> /id:<Name of session> /srcdir:<Location of PST files> /dstdir:<PST file
path> /sk:<Storage account key> /encrypt /logdir:<Log file location>

Subsequent times:

WAImportExport.exe PrepImport /j:<Name of journal file> /id:<Name of new session> /srcdir:<Location of PST files> /dstdir:<PST file path>

EXAMPLES

First time:

WAImportExport.exe PrepImport /j:PSTHDD1.jrn /t:f /id:driveship1 /srcdir:"\\FILESERVER1\PSTs" /dstdir:"ingestiondata/"


/sk:"yaNIIs9Uy5g25Yoak+LlSHfqVBGOeNwjqtBEBGqRMoidq6/e5k/VPkjOXdDIXJHxHvNoNoFH5NcVUJXHwu9ZxQ==" /encrypt
/logdir:"c:\users\admin\desktop\PstImportLogs"

Subsequent times:

WAImportExport.exe PrepImport /j:PSTHDD1.jrn /id:driveship2 /srcdir:"\\FILESERVER1\PSTs\SecondBatch" /dstdir:"ingestiondata/"

As previously explained, the Office 365 Import service turns on the retention hold setting (for an indefinite duration) after PST files are imported to a
mailbox. This means the RentionHoldEnabled property is set to True so that the retention policy assigned to the mailbox won't be processed. This gives
the mailbox owner time to manage the newly-imported messages by preventing a deletion or archive policy from deleting or archiving older messages.
Here are some steps you can take to manage this retention hold:
After a certain period of time, you can turn off the retention hold by running the Set-Mailbox -RetentionHoldEnabled $false command. For
instructions, see Place a mailbox on retention hold.
You can configure the retention hold so that it's turned off on some date in the future. You do this by running the
Set-Mailbox -EndDateForRetentionHold <date> command. For example, assuming that today's date is July 1, 2016 and you want the retention hold
turned off in 30 days, you would run the following command: Set-Mailbox -EndDateForRetentionHold 8/1/2016 . In this scenario, you would leave
the RentionHoldEnabled property set to True . For more information, see Set-Mailbox.
You can change the settings for the retention policy that's assigned to the mailbox so that older items that were imported won't be immediately
deleted or moved to the user's archive mailbox. For example, you could lengthen the retention age for a deletion or archive policy that's assigned
to the mailbox. In this scenario, you would turn off the retention hold on the mailbox after you changed the settings of the retention policy. For
more information, see Set up an archive and deletion policy for mailboxes in your Office 365 organization.
Use the PST Collection tool to find, copy, and delete PST files in your
organization
12/4/2018 • 22 minutes to read • Edit Online

IMPORTANT
The PST Collection tool described in this article isn’t supported under any Microsoft standard support program or service. The tool is provided AS IS without warranty of any kind.
Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out
of the use or performance of the tool and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of
the tool be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary
loss) arising out of the use of or inability to use the tool or documentation, even if Microsoft has been advised of the possibility of such damages.

You can use the Microsoft PST Collection tool to search your organization's network for PST files. The tool helps you get an inventory of PST files that are scattered
throughout your organization. After you find PST files, you can use the PST Collection tool to copy them in a central location. Having PSTs in a one place then allows
you to import them to Exchange Online mailboxes (or a single Exchange Online mailbox), where you can then apply the rich set of compliance features in Office 365.
This includes importing PSTs to users' archive mailboxes, searching for specific messages in the PST files that you imported by using eDiscovery search tools,
retaining messages by using eDiscovery holds and Office 365 retention policies, and managing the life cycle of these messages using the messaging records
management features in Exchange Online. After you're confident that the PST files that you collected have been successfully imported to Office 365, you can use the
tool to delete them from their original location on your network.
Another thing you can do with the PST Collection tool is prevent users from creating new PST files and changing the existing PST files that you find on your network.
These "block" capabilities let you find, collect, and import a known set of PST files to Office 365 and prevent the future proliferation of PST files in your organization.

How the PST Collection tool works


Here's a quick overview of the process of using the PST Collection tool to find, control, collect, and delete PST files in your organization.

1. Step 1: Find PST files on your network - When you run the tool to find PST files, you specify a location, such as an organizational unit that contain Active
Directory objects for client and server computers. You can also search specific machines or network file shares. When you run the tool, a "lightweight"
Collection Agent is installed on the target computers. This agent searches the target computer for PST files and then sends information back to the PST
Collection tool about any PST file it finds. The tool creates log files that contains information about the PST files that were found in the specified locations.
These files are used when you run the tool in later steps.
2. (Optional) Step 2: Control access to PST files - The tool creates a Group Policy Object (GPO) with settings that prevent users from creating or changing
PST files. This GPO is applied to every user in your domain. This optional step helps you "lock down" the PST files that were found in Step 1, so that you can
collect, import, and delete them without having new PST files created or the existing PST files changed.
3. Step 3: Copy the PST files to a collection location - This lets you collect the PST files in one location so that you can import them to Exchange Online
mailboxes by using the Office 365 Import service in Step 4. When you run the tool in the "collect" mode, each Collection Agent copies the PST files from the
target machine the agent is installed on to the collection location.
4. Step 4: Import the PST files to Office 365 - After you've copied the PST files to one location, you're ready to import them to Exchange Online mailboxes.
5. Step 5: Delete the PST files found on your network - After the PST files that you found and collected have been imported to Exchange Online mailboxes in
Office 365, you can use the PST Collection tool to delete the PST files from the original locations where they were found in Step 1.

Before you begin


Follow these steps to download the PST Collection tool to your local computer.
1. Download the PST Collection tool.
2. In the pop-up window, click Save > Save as to save the PSTCollectionTool.zip file to a folder on your local computer.
3. Extract the PSTCollectionTool.zip file to a folder on your local computer; the default folder name is PSTCollectionTool.
To run the PST Collection tool in any mode (Find, Block, Copy, or Delete), you have to be a member of the Domain Administrators group in your Active
Directory domain.

Step 1: Find PST files on your network


The first step is to run the PST Collection tool to find PST files in your organization. You can use the tool to search the following types of locations.
Organizational units (OUs) in an on-premises Active Directory domain. The tool searches all the machines that are contained in the specified OU.
Client and server computers. The tool searches the specified machines.
Network file shares. The tool searches the specified network file shares.
See the description for the Locations parameter in table in the following procedure for examples of the syntax to use for each of these location types.

IMPORTANT
You have to the run the PST Collection tool in the Find mode before you can perform other actions such as blocking, collecting, or deleting PST files.

1. Open a Command Prompt (run as administrator) on your local computer.


2. Go to the PSTCollectionTool folder (or the folder that you extracted the PSTCollectionTool.zip file to).
3. Change to the DataCollectorMaster directory.
4. Run the following command to find PST files in a specified location.

DataCollectorMaster.exe -DataSource Pst -Mode Find -JobName <Name> -Locations <Locations to search for PSTs> -LogLocation <Location to store log files> -
ConfigurationLocation <Location to store configuration files>

The following table describes the parameters and their required values when you run the DataCollectorMaster.exe command to find PST files.

PARAMETER DESCRIPTION EXAMPLES

DataSource Specifies the type of data to search for. Currently, you -DataSource Pst
can use the PST Collection tool to search for PST files.

Mode Specifies the type of operation that the tool will perform. -Mode Find
Use the value Find to locate PST files in the specified
locations. Note that the tool can find and get
information about PST files that are open in Outlook and
PST files that are connected to Outlook profiles.

JobName Specifies the name of the PST Collection job. You will use -JobName PstSearch1
this same job name when you run the PST Collection
tool to block, collect, and delete the PST files that are
found when you run the tool to find PST files. The job
name will also be added to the log and configuration file
names.

Locations Specifies one or more locations to search for PST files. If -Locations
you specify more than one location, use a semi-colon (;) "CN=FILESERVER01,CN=Computers,DC=contoso,DC=com";"CN=FILESERVER02,CN=Com
to separate individual locations. Be sure to surround the
individual values of this parameter with double-
quotation marks (" ").

Here is the required identity value format for the types


of locations that you can search.

OUs - Use the distinguished name (DN) to identify OUs;


for example:
"OU=NorthAmerica,OU=NWRegion,OU=ITServices,DC=contoso,DC=com"
> [!IMPORTANT]> You can't specify the built-in
Computers container (for example,
CN=Computers,DC=contoso,DC=com") because it isn't
an organizational unit.

Machines - Use the DN or the fully qualified domain


name (FQDN) to identify client and server machines on
your network; for example:
DN:
"CN=FILESERVER01,CN=Computers,DC=contoso,DC=com"
Or
FQDN: "FILESERVER01.contoso.com"

Network file shares - Use a UNC name to identify


network file shares; for example,
"\\FILESERVER02\Users"

LogLocation Specifies the folder that the log files will be copied to. If -LogLocation
the folder doesn't exist, it will be created when you run "c:\users\admin\desktop\PSTCollection"
the tool.
PARAMETER DESCRIPTION EXAMPLES

ConfigurationLocation Specifies the folder that the .xml configuration file will be -ConfigurationLocation
copied to. This file contains information about each PST "c:\users\admin\desktop\PSTCollection\Configuration"
file that is found when you run the tool. This file will be
used when you run the tool in Step 3 to copy the PST
files that are found.

ExcludedLocations This optional parameter specifies locations to skip during -ExcludedLocations "SQLSERVER01.contoso.com"
a Find operation. You can exclude specific OUs,
machines, and network file shares. For example, you
could exclude machines, such as machine configured as a
SQL server (or other kinds of application servers), that
users don't have access to. If you specify more than one
location to exclude, use a semi-colon (;) to separate
individual locations. Be sure to surround the individual
values of this parameter with double-quotation marks ("
").

ForceRestart This optional switch lets you run the tool in the Find -ForceRestart
mode for an existing PST Collection job. When you use
the ForceRestart switch, the results from the previous
Find operation for the job will be discarded, and the tool
will re-scan the specified locations and create new log
and configuration files.

Here's an example of the syntax for the DataCollectorMaster.exe command using actual values for each parameter:

DataCollectorMaster.exe -DataSource Pst -Mode Find -JobName PstSearch1 -Locations


"CN=FILESERVER01,CN=Computers,DC=contoso,DC=com";"CN=FILESERVER02,CN=Computers,DC=contoso,DC=com" -LogLocation "c:\users\admin\desktop\PSTCollection" -
ConfigurationLocation "c:\users\admin\desktop\PSTCollection\Configuration"

After you run the command, detailed status messages are displayed that show the progress of finding PST files in the specified locations. After a while, a final
status message shows the total number of PST files that were found, whether the job has completed, and if there were any errors. The same status messages
are copied to the .log file.
Results of running DataCollectorMaster.exe in the Find mode
After you successfully run the PST Collection tool the Find mode, the following files are created and stored in the folders specified by the LogLocation and
ConfigurationLocation parameters.

<JobName>Find<DateTimeStamp>.log - The log file contains the status messages that were displayed. This file is created in the folder specified by the
LogLocation parameter.

<JobName>Find<DateTimeStamp>.csv - The CSV file contains a row for each PST file that was found. The information for each PST includes the
computer where the PST file was found, the full file path location of the PST file, the owner of the PST file, and the size (in kilobytes, KBs) of the PST file. This
file is created in the folder specified by the LogLocation parameter.

TIP
Use the AutoSum tool in Excel to calculate the total size (in KB) of all the PST files listed in the CSV file. Then you can use a conversion calculator to convert the total size to
megabytes (MB) or gigabytes (GB).

<JobName>Find<DateTimeStamp>.xml - The XML file contains information about the parameter values that where used when you ran the tool in the
Find mode. This file also contains information about every PST file that was found. The data in this file is used when you run re-run the tool for the same job to
block, collect, or delete the PST files that were found. This file is created in the folder specified by the ConfigurationLocation parameter.

IMPORTANT
Don't rename, change, or move this file. It's used by the PST Collection tool when you re-run the tool in the Block, Copy, or Delete mode for the same job.

(Optional) Step 2: Control access to PST files


This optional step lets you "lock down" the PST files that were found in Step 1 so that you can collect and import a known set of PST files to Office 365. When you run
the PST Collection tool in the Block mode, the following things happen:
The tool creates a Group Policy Object (GPO) named PST Usage Controls . This GPO is linked to your domain, and applies to all authenticated users in your
organization.
The PST Usage Controls GPO creates registry settings on machines in your organization. Depending on the parameter that you use, you can create a registry
setting to prevent users from creating new PST files and a registry setting that prevents users from changing existing PST files.

NOTE
If controlling access to PST files is too disruptive for your organization, you might consider skipping this step, and performing Step 3 to copy PST files to a central location. Then you
can repeat Step 1 for the same job (by using the ForceRestart parameter) to find additional PSTs files that were created after you copied PSTs files to the collection location. If new
PST files are found, you can copy them to the collection location. When you use the ForceRestart parameter when you re-run the tool in the Find mode, the results from the
previous Find operation for a job will be discarded, and the tool will re-scan the specified locations.

To block access to PST files:


1. Open a Command Prompt (run as administrator) on your local computer.
2. Go to the directory where you downloaded the PST Collection tool to.
3. Run the following command to block access to the PST files found in Step 1.

DataCollectorMaster.exe -DataSource Pst -Mode Block -JobName <Name of job from Step 1> -ConfigurationLocation <Location of configuration files from Step
1> -BlockChangesToFiles -BlockNewFiles

The following table describes the parameters and their required values when you run the DataCollectorMaster.exe command to block the creation and
changing of PST files.

PARAMETER DESCRIPTION EXAMPLES

DataSource Specifies the type of data to search for. Currently, you -DataSource Pst
can use the PST Collection tool to search for PST files.

Mode Specifies the type of operation that the tool will perform. -Mode Block
Use the value Block to prevent users from creating
new PST files and making changes to existing PST files.

JobName Specifies the name of an existing PST Collection job. You -JobName PstSearch1
have to use this same job name that you used when you
ran the tool in the Find mode in Step 1. This job name is
also added to the name of the log file that is created
when you run the tool in the Block mode.

ConfigurationLocation Specifies the folder contains the .xml configuration file -ConfigurationLocation
that was created when you ran the tool in the Find "c:\users\admin\desktop\PSTCollection\Configuration"
mode. Use the same value that you used for this
parameter in Step 1.

LogLocation Specifies the folder that the log file for the Block -LogLocation
operation will be copied to. This is an optional parameter. "c:\users\admin\desktop\PSTCollection"
If you don't include it, the log file is copied to the folder
where you downloaded the PST Collection tool to.
Consider using the same log location that you used
when you ran the tool in the Find mode in Step 1 so
that all the log files are saved in the same folder.

BlockChangesToFiles Use this switch to prevent users from changing a PST -BlockChangesToFiles
file. When you use this switch, the following registry
entry is created:
HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\
<version>\Outlook\PST\PstDisableGrow
and the data value is set to 1. This registry setting is
created on the machines in your organization by the
GPO that's created when you run the PST Collection tool
in the Block mode.

BlockNewFiles Use this switch to prevent users from creating new PST -BlockNewFiles
files, opening and importing PST files to Outlook, and
exporting PST files from Outlook. When you use this
switch, the following registry entry is created:
HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\
<version>\Outlook\DisablePst
and the data value is set to 1. This registry setting is
created on the machines in your organization by the
GPO that's created when you run the PST Collection tool
in the Block mode.

Here's an example of the syntax for the DataCollectorMaster.exe command using actual values for each parameter:

DataCollectorMaster.exe -DataSource Pst -Mode Block -JobName PstSearch1 -ConfigurationLocation "c:\users\admin\desktop\PSTCollection\Configuration" -


LogLocation "c:\users\admin\desktop\PSTCollection" -BlockChangesToFiles -BlockNewFiles

You are prompted to confirm that you want to block new PST files or changes to existing PST files. After you confirm that you want to continue and the
command successfully runs, a message is displayed saying that a new GPO, named "PST Usage Controls", has been created.

Step 3: Copy the PST files to a collection location


The next step is to copy the PST files that where found when you ran the PST Collection tool in the Find mode. This lets you collect the PST files in one location so
that you can later import them to Office 365. Before you copy the PST files to collection location, consider determining the total amount of storage space that is
required. You can do this using the CSV file that was created in Step 1 to calculate the total size of all PST files.

NOTE
After you've imported the PST files to Office 365 and deleted them from their original location, you might want to delete them from the collection location that you copied them to in
this step.

1. Open a Command Prompt (run as administrator) on your local computer.


2. Go to the directory where you downloaded the PST Collection tool to.
3. Run the following command to copy the PST files to a specified location.

DataCollectorMaster.exe -DataSource Pst -Mode Collect -JobName <Name of job from Step 1> -Locations <same locations from Step 1> -ConfigurationLocation
<Location of configuration files from Step 1> -CopyLocation <Location to copy PST files to>

The following table describes the parameters and their required values when you run the DataCollectorMaster.exe command to copy PST files.

PARAMETER DESCRIPTION EXAMPLES

DataSource Specifies the type of data to search for. Currently, you -DataSource Pst
can use the PST Collection tool to search for PST files.

Mode Specifies the type of operation that the tool will perform. -Mode Collect
Use the value Collect to copy that PST files that were
found when you ran to the tool in the Find mode. Note
that the tool is able copy PST files that are open in
Outlook and copy PST files that are connected to
Outlook profiles.

JobName Specifies the name of an existing PST Collection job. You -JobName PstSearch1
have to use this same job name that you used when you
ran the tool in the Find mode in Step 1. This job name is
also added to the name of the log file that is created
when you run the tool in the Collect mode.

Locations Use the same value that you used for the Locations -Locations
parameter in Step 1. You have include this parameter "CN=FILESERVER01,CN=Computers,DC=contoso,DC=com";
"CN=FILESERVER02,CN=Computers,DC=contoso,DC=com"
when you run the tool in the Collect mode if you want
to re-run the tool to delete the PST files from their
source location in Step 5.

ConfigurationLocation Specifies the folder that contains the .xml configuration -ConfigurationLocation "c:\users\admin\desktop
file that was created when you ran the tool in the Find \PSTCollection\Configuration"
mode. Use the same value that you used for this
parameter in Step 1.

CopyLocation Specifies the collection location where you want to copy -CopyLocation "\\FILESERVER03\PSTs"
the PST files to. You can copy files to a file server, a
network file share, or a hard drive. The location must
exist before you run the tool in the Collect mode. The
tool doesn't create the location, and will return an error
saying that it doesn't exist.
Also, you have to write permissions to the collection
location specified by this parameter.

LogLocation Specifies the folder that the log file for the Collect mode -LogLocation
will be copied to. This is an optional parameter. If you "c:\users\admin\desktop\PSTCollection"
don't include it, the log file is copied to the folder where
you downloaded the PST Collection tool to. Consider
using the same log location that you used when you ran
the tool in the Find mode in Step 1 so that all the log
files are saved in the same folder.

ForceRestart This optional switch lets you re-run the tool in the -ForceRestart
Collection mode for an existing PST Collection job. If you
previously ran the tool in the Collect mode, but then ran
the tool again in the Find mode with the ForceRestart
switch to re-scan locations for PST files, you can use this
switch to re-run the tool in Collection mode and re-copy
the PST files there were found when your re-scanned the
locations. When using the ForceRestart switch in
Collection mode, the tool ignores any previous
Collection operations and attempts to copy the PST files
from scratch.

Here's an example of the syntax for the DataCollectorMaster.exe tool using actual values for each parameter:

DataCollectorMaster.exe -DataSource Pst -Mode Collect -JobName PstSearch1 -Locations


"CN=FILESERVER01,CN=Computers,DC=contoso,DC=com";"CN=FILESERVER02,CN=Computers,DC=contoso,DC=com" -ConfigurationLocation
"c:\users\admin\desktop\PSTCollection\Configuration" -CopyLocation "\\FILESERVER03\PSTs" -LogLocation "c:\users\admin\desktop\PSTCollection"

After you run the command, detailed status messages are displayed that show the progress of collecting the PST files that were found in Step 1. After a while, a
final status message shows if there were any errors and the location that the log is copied to. The same status messages are copied to the .log file.
Results of running DataCollectorMaster.exe in the Collect mode
After you successfully run DataCollectorMaster.exe in the Collect mode, the following files are created and stored in the folders specified by the LogLocation and
ConfigurationLocation parameters.

<JobName>Collect<DateTimeStamp>.log - The log file contains the status messages that were displayed. This file is created in the folder specified by the
LogLocation parameter.

<JobName>Collect<DateTimeStamp>.xml - The XML file only contains information about the parameter values that where used by the tool was run in the
Collect mode. The data in this file is used when you run re-run the DataCollectorMaster.exe tool to delete PST files; see Step 5.
Step 4: Import the PST files to Office 365
After you've collected the PST files found in Step 1, the next step is to import them to mailboxes in Office 365. As part or the import process, you'll have to create a
CSV mapping file that contains a row of each PST file that you want import. Information in each row specifies the name of the PST file, the user's email address, and
whether you want to import the PST file to the user's primary or archive mailbox. Use the information in the JobName>Find<DateTimeStamp.csv file (created in
Step) 1 to help you create the CSV mapping file.
For step-by-step instructions to import PST files to Office 365, see one of the following topics:
Use network upload to import PST files to Office 365
Use drive shipping to import PST files to Office 365

Step 5: Delete the PST files found on your network


After the PST files that you found and collected have been imported to Exchange Online mailboxes in Office 365, you can use the PST Collection tool to delete the
PST files from the original source locations where they were found in Step 1.
1. Open a Command Prompt (run as administrator) on your local computer.
2. Go to the directory where you downloaded the PST Collection tool to.
3. Run the following command to delete the PST files.

DataCollectorMaster.exe -DataSource Pst -Mode Delete -JobName <Name of job from Step 1> -ConfigurationLocation <Location of configuration files from Step
1> -CopyLocation <Location to copy PST files to>

The following table describes the parameters and their required values when you run the DataCollectorMaster.exe command to delete PST files.

PARAMETER DESCRIPTION EXAMPLES

DataSource Specifies the type of data to search for. Currently, you -DataSource Pst
can use the PST Collection tool to search for PST files.

Mode Specifies the type of operation that the tool will perform. -Mode Delete
Use the value Delete to delete that PST files that were
found when you ran to the tool in the Find mode.

JobName Specifies the name of an existing PST Collection job. You -JobName PstSearch1
have to use this same job name that you used when you
ran the tool in the Find mode and the Collect mode in
Step 1 and Step 3. This job name is also added to the
name of the log file that is created when you run the
tool in the Delete mode.

ConfigurationLocation Specifies the folder that contains the .xml configuration -ConfigurationLocation "c:\users\admin\
file that was created when you ran the tool in the Collect desktop\PSTCollection\Configuration"
mode. Use the same value that you used for this
parameter in Step 3.

LogLocation Specifies the folder that the log file for the Delete mode -LogLocation
will be copied to. This is an optional parameter. If you "c:\users\admin\desktop\PSTCollection"
don't include it, the log file is copied to the folder where
you downloaded the PST Collection tool to. Consider
using the same log location that you used when you ran
the tool in the Find and Collect modes in Step 1 and
Step 3 so that all the log files are saved in the same
folder.

ForceRestart This optional switch lets you re-run the tool in the -ForceRestart
Delete mode for an existing PST Collection job. If you
previously ran the tool in the Delete mode, but then ran
the tool again in the Find mode with the ForceRestart
switch to re-scan locations for PST files, you can use this
switch to re-run the tool in Delete mode and delete the
PST files there were found when your re-scanned the
locations. When using the ForceRestart switch in
Delete mode, the tool ignores any previous Delete
operations and attempts to delete the PST files again.

Here's an example of the syntax for the DataCollectorMaster.exe tool using actual values for each parameter:

DataCollectorMaster.exe -DataSource Pst -Mode Delete -JobName PstSearch1 -ConfigurationLocation "c:\users\admin\desktop\PSTCollection\Configuration" -


LogLocation "c:\users\admin\desktop\PSTCollection"

After you run the command, detailed status messages are displayed that show the progress of deleting the PST files that were found in Step 1 and collected in
Step 3. After a while, a final status message shows if there were any errors and the location that the log is copied to. The same status messages are copied to
the .log file.
Results of running DataCollectorMaster.exe in the Delete mode
After you successfully run DataCollectorMaster.exe in the Delete mode, the following files are created and stored in the folder specified by the LogLocation and
ConfigurationLocation parameters.
<JobName>Delete<DateTimeStamp>.log - The log file contains the status messages that were displayed. This file is created in the folder specified by the
LogLocation parameter.

<JobName>Delete<DateTimeStamp>.xml - The XML file only contains information about the parameter values that where used by the tool was run in the
Delete mode. It also lists the name and file path of each PST file that was deleted. This file is created in the folder specified by the ConfigurationLocation
parameter.
Filter data when importing PST files to Office 365
9/26/2018 • 6 minutes to read • Edit Online

Use the new Intelligent Import feature in the Office 365 Import service to filter the items in PST files that actually
get imported to the target mailboxes. Here's how it works:
After you create and submit a PST import job, PST files are uploaded to an Azure storage area in the
Microsoft cloud.
Office 365 analyzes the data in the PST files, in a safe and secure manner, by identifying the age of the
mailbox items and the different message types included in the PST files.
When the analysis is complete and the data is ready to import, you have the option to import all data in the
PST files as is or trim the data that's imported by setting filters that control what data gets imported. For
example, you can choose to:
Import only items of a certain age.
Import selected message types.
Exclude messages sent or received by specific people.
After you configure the filter settings, Office 365 imports only the data that meets the filtering criteria to
the target mailboxes specified in the import job.
The following graphic shows the Intelligent Import process, and highlights the tasks you perform and the tasks
performed by Office 365.

Before you begin


The steps in this topic assume that you've created a PST import job in the Office 365 Import service by
using network upload or drive shipping. For step-by-step instructions, see one of the following topics:
Use network upload to import PST files to Office 365
Use drive shipping to import PST files to Office 365
After you create an import job by using network upload, the status for the import job on the Import page in
Office 365 Security & Compliance Center is set to Analysis in progress, which means that Office 365 is
analyzing the data in the PST files that you uploaded. Click Refresh to update the status for the import
job.
For drive shipping import jobs, the data will be analyzed by Office 365 after Microsoft data center
personnel receive your hard drive and upload the PST files to the Azure storage area for your organization.

Filter data that gets imported to mailboxes


After you've created a PST import job, follow these steps to filter the data before you import it to Office 365.
1. Go to https://protection.office.com/ and sign in using the credentials for an administrator account in your
Office 365 organization.
2. In the left pane of the Office 365 Security & Compliance Center, click Data governance > Import.
The import jobs for your organization are listed on the Import page. Note that the Analysis completed
value in the Status column indicates the import jobs that have been analyzed by Office 365 and are ready
for you to import.

3. Click Ready to import to Office 365 for the import job that you want to complete.
A fly out page is displayed with information about the PST files and other information about the import
job.
4. Click Import to Office 365.
The Filter your data page is displayed. It contains data insights about the data in the PST files for the
import job, including information about the age of the data.
5. Based on whether or not you want to trim the data that's imported to Office 365, under Do you want to
filter your data?, do one of the following:
a. Click Yes, I want to filter it before importing to trim the data that you import, and then click Next.
The Import data to Office 365 page page is displayed with detailed data insights from the analysis that
Office 365 performed.

The graph on this page shows the amount of data that will be imported. Information about each message
type found in the PST files is displayed in the graph. You can hover the cursor over each bar to display
specific information about that message type. There is also a drop-down list with different age values based
on the analysis of the PST files. When you select an age in the drop-down list, the graph is updated to show
how much data will be imported for the selected age.
b. To configure addition filters to reduce the amount of data that's imported, click More filtering options.

You can configure these filters:


Age - Select an age so only items that are newer than the specified age will be imported. See the
More information section for a description about how Office 365 determines the age buckets for the
Age filter.
Type - This section shows all the message types that were found in the PST files for the import job.
You can uncheck a box next to a message type that you want to exclude. Note that you can't exclude
the Other message type. See the More information section for a list of mailbox items that are
included in the Other category.
Users - You can exclude messages that are sent or received by specific people. To exclude people
who appear in the From: field, To: field, or the Cc: field of messages, click Exclude users next to that
recipient type. Type the email address (SMTP address) of the person, click Add to add them to the
list of excluded users for that recipient type, and then click Save to save the list of excluded users.

NOTE
Office 365 doesn't show data insights that result from setting the People filter. However, if you set this filter
to exclude messages sent or received by specific people, those messages will be excluded during the actual
import process.

c. Click Apply in the More filtering options fly out page to save your filter settings.
The data insights on the Import data to Office 365 page are updated based on your filter settings,
including the total amount of data that will be imported based on the filter settings. Note that a summary
of the filter settings is also shown. You can click Edit next to a filter to change the setting if necessary.
d. Click Next.
A status page is displayed showing your filter settings. Again, you can edit any of the filter settings.
e. Click Import data to start the import . Note that the total amount of data that will be imported is
displayed.
Or
a. Click No, I want to import everything to import all data in the PST files to Office 365, and then click
Next.
b. On the Import data to Office 365 page, click Import data to start the import. Note that the total
amount of data that will be imported is displayed.
6. On the Import page, click Refresh . The status for the import job is displayed in the Status column.
7. Click the import the job to display more detailed information, such as the status for each PST file and the
filter settings that you configured.

More information
How does Office 365 determine the increments for the age filter? When Office 365 analyzes a PST file, it
looks at the sent or received time stamp of each item (if an item has both a sent and received timestamp,
the oldest date is selected). Then Office 365 looks at the year value for that timestamp and compares it to
the current date to determine the age of the item. These ages are then used as the values in the drop-down
list for the Age filter. For example, if a PST file has messages from 2016, 2015, and 2014, then values in the
Age filter would be 1 year, 2 years, and 3 years.
The following table lists the message types that are included in the Other category in the Type filter on the
More options fly out page (see Step 5b in the previous procedure). Currently, you can't exclude items in
the "Other" category when you import PSTs to Office 365.

MESSAGE CLASS ID MAILBOX ITEMS THAT USE THIS MESSAGE CLASS

IPM.Activity Journal entries

IPM.Document Documents and files (not attached to an email message)

IPM.File (same as IPM.Document)

IPM.Note.IMC.Notification Reports sent by Internet Mail Connect, which is the


Exchange Server gateway to the Internet

IPM.Note.Microsoft.Fax Fax messages

IPM.Note.Rules.Oof.Template.Microsoft Out-of-office auto-reply messages

IPM.Note.Rules.ReplyTemplate.Microsoft Replies sent by an inbox rule

IPM.OLE.Class Exceptions for a recurring series

IPM.Recall.Report Message recall reports

IPM.Remote Remote mail messages

IPM.Report Item status reports


Use network upload to import your organization PST files to Office 365
8/21/2018 • 28 minutes to read • Edit Online

NOTE
This article is for administrators. Are you trying to import PST files to your own mailbox? See Import email, contacts, and calendar from an Outlook .pst file

Here are the step-by-step instructions required to use network upload to bulk-import multiple PST files to Office 365 mailboxes. For frequently asked questions about using
network upload to bulk-import PST files to Office 365 mailboxes, see FAQs for using network upload to import PST files.
Step 1: Copy the SAS URL and install Azure AzCopy
Step 2: Upload your PST files to Office 365
(Optional) Step 3: View a list of the PST files uploaded to Office 365
Step 4: Create the PST Import mapping file
Step 5: Create a PST Import job in Office 365
Step 6: Filter data and start the PST Import job
Note that you have to perform Step 1 only once to import PST files to Office 365 mailboxes. After you perform these steps, follow Step 2 through Step 6 each time you want
to upload and import a batch of PST files.

Before you begin


You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Office 365 mailboxes. By default, this role isn't assigned to any role
group in Exchange Online. You can add the Mailbox Import Export role to the Organization Management role group. Or you can create a new role group, assign the
Mailbox Import Export role, and then add yourself as a member. For more information, see the "Add a role to a role group" or the "Create a role group" sections in
Manage role groups.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the Organization Management and Recipient
Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For the minimum level of privileges required to import PST files,
assign the Mailbox Import Export and Mail Recipients roles to the new role group, and then add members.

The only supported method for importing PST files to Office 365 is to use the Azure AzCopy tool, as described in this topic. You can't use the Azure Storage Explorer to
upload PST files directly to the Azure storage area.
You need to store the PST files that you want to import to Office 365 on a file server or shared folder in your organization. In Step 2, you'll run the Azure AzCopy tool
that will upload the PST files that are stored on this file server or shared folder to Office 365.
This procedure involves copying and saving a copy of a URL that contains an access key. This information will be used in Step 2 to upload your PST files, and in Step 3
if you want to view a list of the PST files uploaded to Office 365. Be sure to take precautions to protect this URL like you would protect passwords or other security-
related information. For example you might save it to a password-protected Microsoft Word document or to an encrypted USB drive. See the More information
section for an example of this combined URL and key.
You can import PST files to an inactive mailbox in Office 365. You do this by specifying the GUID of the inactive mailbox in the Mailbox parameter in the PST Import
mapping file. See Step 4 on the Instructions tab in this topic for information.
In an Exchange hybrid deployment, you can import PST files to a cloud-based archive mailbox for a user whose primary mailbox is on-premises. You do this by doing
the following in the PST Import mapping file:
Specify the email address for the user's on-premises mailbox in the Mailbox parameter.
Specify the TRUE value in the IsArchive parameter.
See Step 4 for more information.
After PST files are imported to an Office 365 mailbox, the retention hold setting for the mailbox is turned on for an indefinite duration. This means that the retention
policy assigned to the mailbox won't be processed until you turn off the retention hold or set a date to turn off the hold. Why do we do this? If messages imported to a
mailbox are old, they might be permanently deleted (purged) because their retention period has expired based on the retention settings configured for the mailbox.
Placing the mailbox on retention hold will give the mailbox owner time to manage these newly-imported messages or give you time to change the retention settings
for the mailbox. See the More info tab in this topic for suggestions about managing the retention hold.
By default, the maximum message size that can be received by an Office 365 mailbox is 35 MB. That's because the default value for the MaxReceiveSize property for a
mailbox is set to 35 MB. However, the limit for the maximum message receive size in Office 365 is 150 MB. So if you import a PST file that contains an item larger
than 35 MB, the Office 365 Import service we will automatically change the value of the MaxReceiveSize property on the target mailbox to 150 MB. This allows
messages up to 150 MB to be imported to user mailboxes.

TIP
To identify the message receive size for a mailbox, you can run this command in Exchange Online PowerShell: Get-Mailbox <user mailbox> | FL MaxReceiveSize .

Step 1: Copy the SAS URL and install Azure AzCopy


The first step is to download and install the Azure AzCopy tool, which is the tool that you'll run in Step 2 to upload PST files to Office 365. You'll also copy the SAS URL for
your organization. This URL is a combination of the network URL for the Azure storage location in the Microsoft cloud for your organization and a Shared Access Signature
(SAS) key. This key provides you with the necessary permissions to upload PST files to your Azure storage location. Be sure to take precautions to protect the SAS URL. It's
unique to your organization and will be used in Step 2.
Important: We recommend that you use Azure AzCopy version 7.1.0 to import PST files by using the network upload method. Version 7.1.0 is downloaded in step 6b in the
following procedure.
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance > Import.
Note: You have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center. See the Before you begin section for
more information.
3. On the Import page, click New import job.
The import job wizard is displayed.
4. Type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't use uppercase letters or include spaces
in the name.
5. On the Do you want to upload or ship data? page, click Upload your data and then click Next.

6. On the Import data page, do the following two things:

a. In step 2, click Show network upload SAS URL. After the SAS URL is displayed, click Copy to clipboard and then paste it and save it to a file so you can access it
later.
b. In step 3, click Download Azure AzCopy to download and install the Azure AzCopy tool. As previously stated, version 7.1.0 will be downloaded. In the pop-up
window, click Run to install AzCopy.
Note: You can leave the Import data page open (in case you need to copy the SAS URL again) or click Cancel to close it.

Step 2: Upload your PST files to Office 365


Now you're ready to use the AzCopy.exe tool to upload PST files to Office 365. This tool uploads and stores them in an Azure storage location in the Microsoft cloud. As
previously explained, the Azure storage location that you upload your PST files to resides in the same regional Microsoft datacenter where your Office 365 organization is
located. To complete this step, the PST files have to be located in a file share or file server in your organization. This is known as the source directory in the following
procedure. Each time you run the AzCopy tool, you can specify a different source directory.
1. Open a Command Prompt on your local computer.
2. Go to the directory where you installed the AzCopy.exe tool in Step 1. If you installed the tool in the default location, go to
%ProgramFiles(x86)%\Microsoft SDKs\Azure\AzCopy .

3. Run the following command to upload the PST files to Office 365.

AzCopy.exe /Source:<Location of PST files> /Dest:<SAS URL> /V:<Log file location> /Y

The following table describes the parameters and their required values. Note that the information you obtained in the previous step is used in the values for these
parameters.
PARAMETER DESCRIPTION EXAMPLE

/Source: Specifies the source directory in your organization that /Source:"\\FILESERVER01\PSTs"


contains the PST files that will be uploaded to Office 365.
Be sure to surround the value of this parameter with
double-quotation marks (" ").

/Dest: Specifies the SAS URL that you obtained in Step 1. /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012
Be sure to surround the value of this parameter with 31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=V
double-quotation marks (" "). Or
Tip: (Optional) You can specify a subfolder in the Azure /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata/PSTFile
31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=V
storage location to upload the PST files to. You do this by
adding a subfolder location (after "ingestiondata") in the
SAS URL. The first example doesn't specify a subfolder; that
means the PSTs will be uploaded to the root (named
ingestiondata ) of the Azure storage location. The second
example uploads the PST files to a subfolder (named
PSTFiles ) in the root of the Azure storage location.

/V: Outputs verbose status messages into a log file. By default, /V:"c:\Users\Admin\Desktop\Uploadlog.log"
the verbose log file is named AzCopyVerbose.log in
%LocalAppData%\Microsoft\Azure\AzCopy. If you specify
an existing file location for this option, the verbose log will
be appended to that file.
Be sure to surround the value of this parameter with
double-quotation marks (" ").

/S This optional switch specifies the recursive mode so that the /S


AzCopy tool will copy PSTs files that are located in
subfolders in the source directory that is specified by the
/Source: parameter.
Note: If you include this switch, PST files in subfolders will
have a different file pathname in the Azure storage location
after they're uploaded. You'll have to specify the exact file
pathname in the CSV file that you create in Step 4.

/Y This required switch allows the use of write-only SAS tokens /Y


when you upload the PST files to the Azure storage
location. The SAS URL you obtained in step 1 (and specified
in /Dest: parameter) is a write-only SAS URL, which is
why you must include this switch. Note that a write-only
SAS URL will not prevent you from using the Azure Storage
Explorer to view a list of the PST files uploaded to the Azure
storage location.

Here's an example of the syntax for the AzCopy.exe tool using actual values for each parameter:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D" /V:"c:\Users\Admin\Desktop\AzCopy1.log"
/Y

After you run the command, status messages are displayed that show the progress of uploading the PST files. A final status message shows the total number of files that were
successfully uploaded.
Tip: After you successfully run the AzCopy.exe command and verify that all the parameters are correct, save a copy of the command line syntax to the same (secured) file
where you copied the information you obtained in Step 1. Then you can copy and paste this command in a Command Prompt each time that you want to run the AzCopy.exe
tool to upload PST files to Office 365. The only value you might have to change are the ones for the /Source: parameter. This depends on the source directory where the PST
files are located.

(Optional) Step 3: View a list of the PST files uploaded to Office 365
As an optional step, you can install and use the Microsoft Azure Storage Explorer (which is a free, open source tool) to view the list of the PST files that you've uploaded to the
Azure blob. There are two good reasons to do this:
Verify that PST files from the shared folder or file server in your organization were successfully uploaded to the Azure blob.
Verify the filename (and the subfolder pathname if you included one) for each PST file uploaded to the Azure blob. This is really helpful when you're creating the PST
mapping file in the next step because you have to specify both the folder pathname and filename for each PST file. Verifying these names can help reduce potential
errors in your PST mapping file.
The Microsoft Azure Storage Explorer is in Preview.
Important: You can't use the Azure Storage Explorer to upload or modify PST files. The only supported method for importing PST files to Office 365 is to use AzCopy. Also,
you can't delete PST files that you've uploaded to the Azure blob. If you try to delete a PST file, you'll receive an error about not having the required permissions. Note that all
PST files are automatically deleted from your Azure storage area. If there are no import jobs in progress, then all PST files in the ** ingestiondata ** container are deleted 30
days after the most recent import job was created.
To install the Azure Storage Explorer and connect to your Azure storage area:
1. Download and install the Microsoft Azure Storage Explorer tool.
2. Start the Microsoft Azure Storage Explorer, right-click Storage Accounts in the left pane, and then click Connect to Azure storage.

3. Click Use a shared access signature (SAS) URI or connection string and click Next.
4. Click Use a SAS URI, paste the SAS URL that you obtained in Step 1 into the box under URI, and then click Next.
5. On the Connection summary page, you can review the connection information, and then click Connect.
The ingestiondata container is opened; it contains the PST files that you uploaded in Step 2. The ingestiondata container is located under Storage Accounts >
(SAS-Attached Services) > Blob Containers.

6. When you're finished using the Microsoft Azure Storage Explorer, right-click ingestiondata, and then click Detach to disconnect from your Azure storage area.
Otherwise, you'll receive an error the next time you try to attach.

Step 4: Create the PST Import mapping file


After the PST files have been uploaded to the Azure storage location for your Office 365 organization, the next step is to create a comma separated value (CSV) file that
specifies which user mailboxes the PST files will be imported to. You'll submit this CSV file in the next step when you create a PST Import job.
1. Download a copy of the PST Import mapping file.
2. Open or save the CSV file to your local computer. The following example shows a completed PST Import mapping file (opened in NotePad). It's much easier to use
Microsoft Excel to edit the CSV file.

Workload,FilePath,Name,Mailbox,IsArchive,TargetRootFolder,ContentCodePage,SPFileContainer,SPManifestContainer,SPSiteUrl
Exchange,,annb.pst,annb@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,annb_archive.pst,annb@contoso.onmicrosoft.com,TRUE,,,,,
Exchange,,donh.pst,donh@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,,donh_archive.pst,donh@contoso.onmicrosoft.com,TRUE,,,,,
Exchange,PSTFiles,pilarp.pst,pilarp@contoso.onmicrosoft.com,FALSE,/,,,,
Exchange,PSTFiles,pilarp_archive.pst,pilarp@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,PSTFiles,tonyk.pst,tonyk@contoso.onmicrosoft.com,FALSE,,,,,
Exchange,PSTFiles,tonyk_archive.pst,tonyk@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,
Exchange,PSTFiles,zrinkam.pst,zrinkam@contoso.onmicrosoft.com,FALSE,,,,,
Exchange,PSTFiles,zrinkam_archive.pst,zrinkam@contoso.onmicrosoft.com,TRUE,/ImportedPst,,,,

The first row, or header row, of the CSV file lists the parameters that will be used by the PST Import service to import the PST files to user mailboxes. Each parameter
name is separated by a comma. Each row under the header row represents the parameter values for importing a PST file to a specific mailbox. You will need a row for
each PST file that you want to import to a user mailbox. Be sure to replace the placeholder data in the mapping file with your actual data.
Note: Don't change anything in the header row, including the SharePoint parameters; they will be ignored during the PST Import process.
3. Use the information in the following table to populate the CSV file with the required information.

PARAMETER DESCRIPTION EXAMPLE

Workload Specifies the Office 365 service that data will be imported Exchange
to. To import PST files to user mailboxes, use Exchange .

FilePath Specifies the folder location in the Azure storage location (leave blank)
that you uploaded the PST files to in Step 2. Or
If you didn't include an optional subfolder name in the SAS PSTFiles
URL in the /Dest: parameter in Step 2, leave this
parameter blank in the CSV file. If you included a subfolder
name, specify it in this parameter (see the second example).
The value for this parameter is case sensitive.
Either way, don't include "ingestiondata" in the value for the
FilePath parameter.

Important: The case for the file path name must be the
same as the case you used if you included an optional
subfolder name in the SAS URL in the /Dest: parameter
in Step 2. For example, if you used PSTFiles for the
subfolder name in Step 2 and then use pstfiles in the
FilePath parameter in CSV file, the import for the PST file
will fail. Be sure to use the same case in both instances.
PARAMETER DESCRIPTION EXAMPLE

Name Specifies the name of the PST file that will be imported to annb.pst
the user mailbox. The value for this parameter is case
sensitive.

Important: The case for the PST file name in the CSV file
must be the same as the PST file that was uploaded to the
Azure storage location in Step 2. For example, if you use
annb.pst in the Name parameter in the CSV file, but the
name of the actual PST file is AnnB.pst , the import for
that PST file will fail. Be sure that the name of the PST in the
CSV file uses the same case as the actual PST file.

Mailbox Specifies the email address of the mailbox that the PST file annb@contoso.onmicrosoft.com
will be imported to. Note that you can't specify a public Or
folder because the PST Import Service doesn't support 2d7a87fe-d6a2-40cc-8aff-1ebea80d4ae7
importing PST files to public folders.
To import a PST file to an inactive mailbox, you have to
specify the mailbox GUID for this parameter. To obtain this
GUID, run the following PowerShell command in Exchange
Online:
Get-Mailbox <identity of inactive mailbox> -
InactiveMailboxOnly | FL Guid

Note: In some cases, you might have multiple mailboxes


with the same email address, where one mailbox is an active
mailbox and the other mailbox is in a soft-deleted (or
inactive) state. In these situations, you have to specify the
mailbox GUID to uniquely identify the mailbox to import
the PST file to. To obtain this GUID for active mailboxes, run
the following PowerShell command:
Get-Mailbox <identity of active mailbox> | FL Guid .
To obtain the GUID for soft-deleted (or inactive) mailboxes,
run this command
Get-Mailbox <identity of soft-deleted or inactive
mailbox> -SoftDeletedMailbox | FL Guid
.

IsArchive Specifies whether or not to import the PST file to the user's FALSE
archive mailbox. There are two options: Or
TRUE
FALSE - Imports the PST file to the user's primary mailbox.
TRUE - Imports the PST file to the user's archive mailbox.
This assumes that the user's archive mailbox is enabled.

If you set this parameter to TRUE and the user's archive


mailbox isn't enabled, the import for that user will fail. Note
that if an import fails for one user (because their archive
isn't enabled and this property is set to TRUE ), the other
users in the import job won't be affected.
If you leave this parameter blank, the PST file is imported to
the user's primary mailbox.

Note: To import a PST file to a cloud-based archive mailbox


for a user whose primary mailbox is on-premises, just
specify TRUE for this parameter and specify the email
address for the user's on-premises mailbox for the
Mailbox parameter.

TargetRootFolder Specifies the mailbox folder that the PST file is imported to. (leave blank)
If you leave this parameter blank, the PST will be imported Or
to a new folder named Imported located at the root level /
of the mailbox (the same level as the Inbox folder and the Or
other default mailbox folders). /ImportedPst
If you specify / , items in the PST file will be imported
directly in to the user's Inbox folder.

If you specify /<foldername> , items in the PST file will be


imported to a folder named <foldername> . For example, if
you use /ImportedPst , items would be imported to a
folder named ImportedPst. This folder will be located in
the user's mailbox at the same level as the Inbox folder.

Tip: Consider running a few test batches to experiment


with this parameter so you can determine the best folder
location to import PSTs files to.

ContentCodePage This optional parameter specifies a numeric value for the (leave blank)
code page to use for importing PST files in the ANSI file Or
format. This parameter is used for importing PST files from 932 (which is the code page identifier for ANSI/OEM
Chinese, Japanese, and Korean (CJK) organizations because Japanese)
these languages typically use a double byte character set
(DBCS) for character encoding. If this parameter isn't used
to import PST files for languages that use DBCS for mailbox
folder names, the folder names are often garbled after
they're imported.

For a list of supported values to use for this parameter, see


Code Page Identifiers.

Note: As previously stated, this is an optional parameter


and you don't have to include it in the CSV file. Or you can
include it and leave the value blank for one or more rows.

SPFileContainer For PST Import, leave this parameter blank. Not applicable

SPManifestContainer For PST Import, leave this parameter blank. Not applicable
PARAMETER DESCRIPTION EXAMPLE

SPSiteUrl For PST Import, leave this parameter blank. Not applicable

Step 5: Create a PST Import job in Office 365


The next step is to create the PST Import job in the Import service in Office 365. As previously explained, you will submit the PST Import mapping file that you created in Step
4. After you create the new job, Office 365 analyzes the data in the PST files and then gives you an opportunity to filter the data that actually gets imported to the mailboxes
specified in the PST import mapping file (see Step 6).
1. Go to https://protection.office.com and sign in using the credentials for an administrator account in your Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance and then click Import.
3. On the Import page, click New import job.
Note: You have to be assigned the appropriate permissions to access the Import page in the Security & Compliance Center to create a new import job. See the
Before you begin section for more information.
4. Type a name for the PST import job, and then click Next. Use lowercase letters, numbers, hyphens, and underscores. You can't use uppercase letters or include spaces
in the name.
5. On the Do you want to upload or ship data? page, click Upload your data and then click Next.

6. In step 4 on the Import data page, click the I'm done uploading my files and I have access to the mapping file check boxes, and then click Next.

7. On the Select the mapping file page, click Select mapping file to submit the PST Import mapping file that you created in Step 4.

8. After the name of the CSV file appears under Mapping file name, click Validate to check your CSV file for errors.
The CSV file has to be successfully validated to create a PST Import job. Note the file name is changed to green after it's successfully validated. If the validation fails,
click the View log link. A validation error report is opened, with a error message for each row in the file that failed.
9. After the PST mapping file is successfully validated, read the terms and conditions document, and then click the checkbox.
10. Click Save to submit the job, and then click Close after the job is successfully created.
A status flyout page is displayed, with a status of Analysis in progress and the new import job is displayed in the list on the Import page.
11. Click Refresh to update the status information that's displayed in the Status column. When the analysis is complete and the data is ready to be imported, the status is
changed to Analysis completed.
You can click the import job to display the status flyout page, which contains more detailed information about the import job such as the status of each PST file listed in
the mapping file.

Step 6: Filter data and start the PST Import job


After you create the import job in Step 5, Office 365 analyzes the data in the PST files (in a safe and secure manner) by identifying the age of the items and the different
message types included in the PST files. When the analysis is completed and the data is ready to import, you have the option to import all the data contained in the PST files
or you can trim the data that's imported by setting filters that control what data gets imported.
1. On the Import page in the Security & Compliance Center, click Ready to import to Office 365 for the import job that you created in Step 5.

A fly out page is displayed with information about the PST files and other information about the import job.
2. On the flyout page, click Import to Office 365.
The Filter your data page is displayed. It contains the data insights resulting from the analysis performed on the PST files by Office 365, including information about
the age of the data. At this point, you have the option to filter the data that will be imported or import all the data as is.

3. Do one of the following:


a. To trim the data that you import, click Yes, I want to filter it before importing.
For detailed step-by-step instructions about filtering the data in the PST files and then starting the import job, see Filter data when importing PST files to Office 365.
Or
b. To import all data in the PST files, click No, I want to import everything, and click Next.
4. If you chose to import all the data, click Import data to start the import job.
The status of the import job is display on the Import page. Click Refresh to update the status information that's displayed in the Status column. Click the import job
to display the status flyout page, which displays status information about each PST file being imported.

How the import process works


You can use the network upload option and the Office 365 Import service to bulk-import PST files to user mailboxes. Network upload means that you upload the PST files a
temporary storage area in the Microsoft cloud. Then the Office 365 Import service copies the PST files from the storage area to the target user mailboxes.
Here's an illustration and description of the network upload process to import PST files to mailboxes in Office 365.

1. Download the PST import tool and key to private Azure storage location - The first step is to download the Azure AzCopy command-line tool and an access key
used to upload the PST files to an Azure storage location in the Microsoft cloud . You obtain these from the Import page in the Office 365 Security & Compliance
Center. The key (called a secure access signature (SAS) key, provides you with the necessary permissions to upload PST files to a private and secure Azure storage
location. This access key is unique to your organization and helps prevent unauthorized access to your PST files after they're uploaded to the Microsoft cloud. Note that
importing PST files to Office 365 doesn't require your organization to have a separate Azure subscription.
2. Upload the PST files to the Azure storage location - The next step is to use the AzCopy.exe tool (downloaded in step 1) to upload and store your PST files in an
Azure storage location that resides in the same regional Microsoft datacenter where your Office 365 organization is located. To upload them, the PST files that you
want to import to Office 365 have to be located in a file share or file server in your organization.
Note that there's an optional step that you can perform to view the list of PST files after they're uploaded to the Azure storage location.
3. Create a PST import mapping file - After the PST files have been uploaded to the Azure storage location, the next step is to create a comma separated value (CSV)
file that specifies which user mailboxes the PST files will be imported to, note that a PST file can be imported to a user's primary mailbox or their archive mailbox. The
Office 365 Import service will use the information in the CSV file to import the PST files.
4. Create a PST import job - The next step is to create a PST import job on the Import page in the Security & Compliance Center and submit the PST import mapping
file created in the previous step. After you create the import job, Office 365 analyzes the data in the PST files and then gives you an opportunity to set filters that
control what data actually gets imported to the mailboxes specified in the PST import mapping file.
5. Filter the PST data that will be imported to mailboxes - After the import job is created and started, Office 365 analyzes the data in the PST files (safely and
securely) by identifying the age of the items and the different message types included in the PST files. When the analysis is completed and the data is ready to import,
you have the option to import all the data contained in the PST files or you can trim the data that's imported by setting filters that control what data gets imported.
6. Start the PST import job - After the import job is started, Office 365 uses the information in the PST import mapping file to import the PSTs files from the he Azure
storage location to user mailboxes. Status information about the import job (including information about each PST file being imported) is displayed on the Import
page in the Security & Compliance Center. When the import job is finished, the status for the job is set to Complete.

More information
Why import PST files to Office 365?
It's a good way to import your organization's archival messaging data to Office 365.
The data is available to the user from all devices because it's stored in the cloud.
It helps address compliance needs of your organization by letting you apply Office 365 compliance features to the data from the PST files that you imported.
This includes:
Enabling archive mailboxes and auto-expanding archiving to give users additional mailbox storage space to store the data that you imported.
Placing mailboxes on Litigation Hold to retain the data that you imported.
Using Microsoft eDiscovery tools to search the data that you imported.
Using Office 365 retention policies to control how long the data that you imported will be retained, and what action to take after the retention period expires.
Searching the Office 365 audit log for mailbox-related events that affect the data that you imported.
Importing data to inactive mailboxes to archive data for compliance purposes.
Using data loss prevention policies to prevent sensitive data from leaking outside your organization.
Here's an example of the Shared Access Signature (SAS) URL that's obtained in Step 1. This example also contains the syntax for the command that you run in the
AzCopy.exe tool to upload PST files to Office 365. Be sure to take precautions to protect the SAS URL just like you would protect passwords or other security-related
information.
SAS URL: https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-
31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D

AzCopy.exe /Source:<Location of PST files> /Dest:<SAS URL> /V:<Log file location> /Y

EXAMPLES

This example uploads PST files to the root of the Azure storage location:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D"
/V:"c:\Users\Admin\Desktop\AzCopy1.log" /Y

This example uploads PST files to a subfolder named PSTFiles in the Azure storage location:

AzCopy.exe /Source:"\\FILESERVER1\PSTs" /Dest:"https://3c3e5952a2764023ad14984.blob.core.windows.net/ingestiondata/PSTFiles?sv=2012-02-12&amp;se=9999-12-


31T23%3A59%3A59Z&amp;sr=c&amp;si=IngestionSasForAzCopy201601121920498117&amp;sig=Vt5S4hVzlzMcBkuH8bH711atBffdrOS72TlV1mNdORg%3D"
/V:"c:\Users\Admin\Desktop\AzCopy1.log" /Y

``
As previously explained, the Office 365 Import service turns on the retention hold setting (for an indefinite duration) after PST files are imported to a mailbox. This
means the RetentionHoldEnabled property is set to True so that the retention policy assigned to the mailbox won't be processed. This gives the mailbox owner time to
manage the newly-imported messages by preventing a deletion or archive policy from deleting or archiving older messages. Here are some steps you can take to
manage this retention hold:
After a certain period of time, you can turn off the retention hold by running the Set-Mailbox -RetentionHoldEnabled $false command. For instructions, see Place
a mailbox on retention hold.
You can configure the retention hold so that it's turned off on some date in the future. You do this by running the Set-Mailbox -EndDateForRetentionHold <date>
command. For example, assuming that today's date is July 1, 2016 and you want the retention hold turned off in 30 days, you would run the following
command: Set-Mailbox -EndDateForRetentionHold 8/1/2016 . In this scenario, you would leave the RetentionHoldEnabled property set to True . For more
information, see Set-Mailbox.
You can change the settings for the retention policy that's assigned to the mailbox so that older items that were imported won't be immediately deleted or
moved to the user's archive mailbox. For example, you could lengthen the retention age for a deletion or archive policy that's assigned to the mailbox. In this
scenario, you would turn off the retention hold on the mailbox after you changed the settings of the retention policy. For more information, see Set up an archive
and deletion policy for mailboxes in your Office 365 organization.
FAQ about importing PST files to Office 365
10/9/2018 • 13 minutes to read • Edit Online

This article is for administrators. Do you want to import PST files to your own mailbox? See Import
email, contacts, and calendar from an Outlook .pst file|
Here are some frequently asked questions about using the Office 365 Import Service to bulk-import PST files to
Office 365 mailboxes. For more information about how to import PST files, see Overview of importing PST files to
Office 365.

Using network upload to import PST files


For step-by-step instructions, see Use network upload to import PST files to Office 365.
What permissions are required to create import jobs in the Office 365 Import Service?
You have to be assigned the Mailbox Import Export role in Exchange Online to import PST files to Office 365
mailboxes. By default, this role isn't assigned to any role group in Exchange Online. You can add the Mailbox
Import Export role to the Organization Management role group. Or you can create a new role group, assign the
Mailbox Import Export role, and then add yourself or other users as a member. For more information, see the "Add
a role to a role group" or the "Create a role group" sections in Manage role groups in Exchange Online.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be
true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the
Organization Management and Recipient Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For
the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the
new role group, and then add members.

Where is network upload available?


Network upload is currently available in the United States, Canada, Brazil, the United Kingdom, France, Europe,
India, East Asia, Southeast Asia, Japan, Republic of Korea, and Australia. Network upload will be available in more
regions soon.
What is the pricing for importing PST files by using network upload?
Using network upload to import PST files is free.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Office 365 admin center. Although an import job might still be listed on
the Import data to Office 365 page, the list of PST files might be empty when you view the details of older
import jobs.
What version of the PST file format is supported for importing to Office 365?
There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the
Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a
double-byte character set (DBCS ), can also be imported to Office 365. For more information about importing
ANSI PST files, see Step 4 in Use network upload to import your organization's PST files to Office 365.
Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
After I upload my PST files to the Azure storage area, how long are they kept in Azure before they're
deleted?
When you use the network upload method to import PST files, you upload them to an Azure blob container named
ingestiondata. If there are no import jobs in progress on the Import page in the Security & Compliance Center),
then all PST files in the ingestiondata container in Azure are deleted 30 days after the most recent import job was
created in the Security & Compliance Center. That also means you have to create a new import job in the Security
& Compliance Center (described in Step 5 in the network upload instructions) within 30 days of uploading PST
files to Azure.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Security & Compliance Center. Although an import job might still be
listed on the Import page in the Security & Compliance Center, the list of PST files might be empty when you view
the details of older import jobs.
How long does it take to import a PST file to a mailbox?
It depends on the capacity of your network, but it typically takes several hours for each terabyte (TB ) of data to be
uploaded to the Azure storage area for your organization. After the PST files are copied to the Azure storage area,
a PST file is imported to an Office 365 mailbox at a rate of at least 24 GB per day. If this rate doesn't meet your
needs, you might consider other methods for migrating email data to Office 365. For more information, see Ways
to migrate multiple email accounts to Office 365.
If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other
words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same
mailbox, they will be simultaneously imported.
Is there a message size limit when importing PST files?
Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped during the import
process.
Are message properties, such as when the message was sent or received, the list of recipients and other
properties, preserved when PST files are imported to an Office 365 mailbox?
Yes. The original message metadata isn't changed during the import process.
Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a
mailbox?
Yes. You can't import a PST file that has 300 or more levels of nested folders.
Can I use network upload to import PST files to an inactive mailbox in Office 365?
Yes, this capability is now available.
Can I use network upload to import PST files to an online archive mailbox in an Exchange hybrid
deployment?
Yes, this capability is now available.
Can I use network upload to import PST files to public folders in Exchange Online?
No, you can't import PST files to public folders.

Using drive shipping to import PST files


For step-by-step instructions, see Use drive shipping to import PST files to Office 365.
What permissions are required to create import jobs in the Office 365 Import Service?
You have to be assigned the Mailbox Import Export role to import PST files to Office 365 mailboxes. By default,
this role isn't assigned to any role group in Exchange Online. You can add the Mailbox Import Export role to the
Organization Management role group. Or you can create a new role group, assign the Mailbox Import Export role,
and then add yourself or other users as a member. For more information, see the "Add a role to a role group" or
the "Create a role group" sections in Manage role groups in Exchange Online.
Additionally, to create import jobs in the Office 365 Security & Compliance Center, one of the following must be
true:
You have to be assigned the Mail Recipients role in Exchange Online. By default, this role is assigned to the
Organization Management and Recipient Management roles groups.
Or
You have to be a global administrator in your Office 365 organization.

TIP
Consider creating a new role group in Exchange Online that's specifically intended for importing PST files to Office 365. For
the minimum level of privileges required to import PST files, assign the Mailbox Import Export and Mail Recipients roles to the
new role group, and then add members.

Where is drive shipping available?


Drive shipping is currently available in the United States, Canada, Brazil, the United Kingdom, Europe, India, East
Asia, Southeast Asia, Japan, Republic of Korea, and Australia. Drive shipping will be available in more regions soon.
What commercial licensing agreements support drive shipping?
Drive shipping to import PST files to Office 365 is available through a Microsoft Enterprise Agreement (EA). Drive
shipping isn't available through a Microsoft Products and Services Agreement (MPSA).
What is the pricing for using drive shipping to import PST files to Office 365?
The cost to use drive shipping to import PST files to Office 365 mailboxes is $2 USD per GB of data. For example,
if you ship a hard drive that contains 1,000 GB (1 TB ) of PST files, the cost is $2,000 USD. You can work with a
partner to pay the import fee. For information about finding a partner, see Find your Office 365 partner or reseller.
What kind of hard drives are supported for drive shipping?
Only 2.5 inch solid-state drives (SSDs) or 2.5 or 3.5 inch SATA II/III internal hard drives are supported for use with
the Office 365 Import service. You can use hard drives up to 10 TB. For import jobs, only the first data volume on
the hard drive will be processed. The data volume must be formatted with NTFS. When copying data to a hard
drive, you can attach it directly using a 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III connector or you can attach it
externally using an external 2.5 inch SSD or 2.5 or 3.5 inch SATA II/III USB adaptor.
IMPORTANT
External hard drives that come with an built-in USB adaptor aren't supported by the Office 365 Import service. Additionally,
the disk inside the casing of an external hard drive can't be used. Please don't ship external hard drives.

How many hard drives can I ship for a single import job?
You can ship a maximum of 10 hard drives for a single import job.
After I ship my hard drive, how long does it take to get to the Microsoft data center?
That depends on a few things, such as your proximity to the Microsoft data center and what kind of shipping option
you used to ship your hard drive (such as, next-day delivery, two-day delivery, or ground-delivery). With most
shippers, you can use the tracking number to track the status of your delivery.
After my hard drive arrives at the Microsoft data center, how long does it take to upload my PST files to
Azure?
After your hard drive is received at the Microsoft data center, it will take between 7 to 10 business days to upload
the PST files to the Microsoft Azure storage area for your organization. The PST files will be uploaded to a Azure
blob container named ingestiondata.
How long does it take to import a PST file to a mailbox?
After the PST files are uploaded to the Azure storage area, Office 365 analyzes the data in the PST files (in a safe
and secure manner) to identify the age of the items and the different message types included in the PST files.
When this analysis is complete, you'll have the option to import all the data in the PST files or set filters to that
control what data gets imported. After you start the import job, a PST file is imported to an Office 365 mailbox at a
rate of at least 24 GB per day. If this rate doesn't meet your needs, you might consider other methods for importing
email data to Office 365. For more information, see Ways to migrate multiple email accounts to Office 365.
If different PST files are imported to different target mailboxes, the import process occurs in parallel; in other
words, each PST/mailbox pair is imported simultaneously. Likewise, if multiple PST files are imported to the same
mailbox, they will be simultaneously imported.
After Microsoft uploads my PST files to Azure, how long are they kept in Azure before they're deleted?
All PST files in the Azure storage location for your organization (in blob container named ingestiondata ), are
deleted 30 days after the most recent import job was created on the Import page in the Security & Compliance
Center.
This also means that after PST files are deleted from the Azure storage area, they're no longer displayed in the list
of files for a completed import job in the Security & Compliance Center. Although an import job might still be
listed on the Import page in the Security & Compliance Center, the list of PST files might be empty when you view
the details of older import jobs.
What version of the PST file format is supported for importing to Office 365?
There are two versions of the PST file format: ANSI and Unicode. We recommend importing files that use the
Unicode PST file format. However, files that use the ANSI PST file format, such as those for languages that use a
double-byte character set (DBCS ), can also be imported to Office 365. For more information about importing
ANSI PST files, see Step 3 in Use drive shipping to import PST files to Office 365.
Additionally, PST files from Outlook 2007 and later versions can be imported to Office 365.
Is there a message size limit when importing PST files?
Yes. If a PST file contains a mailbox item that is larger than 150 MB, the item will be skipped during the import
process.
Are message properties, such as when the message was sent or received, the list of recipients and other
properties, preserved when PST files are imported to an Office 365 mailbox?
Yes. The original message metadata isn't changed during the import process
Is there a limit to the number of levels in a folder hierarchy for a PST file that I want to import to a
mailbox?
Yes. You can't import a PST file that has 300 or more levels of nested folders.
Can I use drive shipping to import PST files to an inactive mailbox in Office 365?
Yes, this capability is now available.
Can I use drive shipping to import PST files to an online archive mailbox in an Exchange hybrid
deployment?
Yes, this capability is now available.
Can I use drive shipping to import PST files to public folders in Exchange Online?
No, you can't import PST files to public folders.
Can Microsoft wipe my hard drive before they ship it back to me?
No, Microsoft can't wipe hard drives before shipping them back to customers. Hard drives are returned to you in
the same state they were in when they were received by Microsoft.
Can Microsoft shred my hard drive instead of shipping it back to me?
No, Microsoft can't destroy your hard drive. Hard drives are returned to you in the same state they were in when
they were received by Microsoft.
What courier services are supported for return shipping?
If you're a customer in the United States or Europe, Microsoft uses FedEx to return your hard drive. For all other
regions, Microsoft uses DHL.
What are the return shipping costs?
Return shipping costs vary, depending on your proximity to the Microsoft data center that you shipped your hard
drive to. Microsoft will bill your FedEx or DHL account to return your hard drive. The cost of return shipping is your
responsibility.
Can I use a custom courier shipping service, such as FedEx Custom Shipping, to ship my hard drive to
Microsoft?
Yes.
If I have to ship my hard drive to another country, is there anything I need to do?
The hard drive that you ship to Microsoft might have to cross international borders. If this is the case, you're
responsible for ensuring that the hard drive and the data it contains are imported and/or exported in accordance
with the applicable laws. Before shipping a hard drive, check with your advisors to verify that your drive and data
can legally be shipped to the specified Microsoft data center. This will help to ensure that it reaches Microsoft in a
timely manner.
Archiving third-party data in Office 365
9/26/2018 • 16 minutes to read • Edit Online

Office 365 lets administrators import and archive third-party data from social media platforms, instant messaging
platforms, and document collaboration platforms, to mailboxes in your Office 365 organization. Examples of third-
party data sources that you can import to Office 365 include the following:
Social - Twitter, Facebook, Yammer, and LinkedIn
Instant messaging - Yahoo Messenger, GoogleTalk, and Cisco Jabber
Document collaboration - Box and DropBox
Vertical industries - Customer Relationship Management (such as Salesforce Chatter) and Financials (such
as Thomson Reuters and Bloomberg)
SMS/text messaging - BlackBerry
After third-party data is imported, you can apply Office 365 compliance features—such as Litigation Hold, Content
Search, In-Place Archiving, Auditing, and Office 365 retention policies—to this data. For example, when a mailbox
is placed on Litigation Hold, third-party data will be preserved. You can search third-party data by using Content
Search. Or you can apply archiving and retention polices to third-party data just like you can for Microsoft data. In
short, archiving third-party data in Office 365 can help your organization stay compliant with government and
regulatory policies.
Here's an overview of the process and the steps necessary to import third-party data to Office 365.
Step 1: Find a third-party data partner
Step 2: Create and configure a third-party data mailbox in Office 365
Step 3: Configure user mailboxes for third-party data
Step 4: Provide your partner with information
Step 5: Register the third-party data connector in Azure Active Directory

How the third-party data import process works>


The following illustration and description explain how the third-party data import process works.
1. Customer works with their partner of choice to configure a connector that will extract items from the third-
party data source and then import those items to Office 365.
2. The partner connector connects to third-party data sources via a third-party API (on a scheduled or as-
configured basis) and extracts items from the data source. The partner connector converts the content of an
item to an email message format. See the More information section for a description of the message format
schema.
3. Partner connector connects to the Azure service in Office 365 by using Exchange Web Service (EWS ) via a
well-known end point.
4. Items are imported into the mailbox of a specific user or into a "catch-all" third-party data mailbox. Whether
an item is imported into a specific user mailbox or to the third-party data mailbox is based on the following
criteria:
a. Items that have a user ID that corresponds to an Office 365 user account - If the partner connector
can map the user ID of the item in the third-party data source to a specific user ID in Office 365, the item is
copied to the Purges folder in the user's Recoverable Items folder. Users can't access items in the Purges
folder. However, you can use Office 365 eDiscovery tools to search for items in the Purges folder.
b. Items that don't have a user ID that corresponds to an Office 365 user account - If the partner
connector can't map the user ID of an item to a specific user ID in Office 365, the item is copied to the
Inbox folder of the third-party data mailbox. Importing items to the inbox allows you or someone in your
organization to sign in to the third-party mailbox to view and manage these items, and see if any
adjustments need to be made in the partner connector configuration.

Step 1: Find a third-party data partner


A key component for archiving third-party data in Office 365 is finding and working with a Microsoft partner that
specializes in capturing data from a third-party data source and importing it to Office 365. After the data is
imported, it can be archived and preserved along with your organization's other Microsoft data, such as email from
Exchange and documents from SharePoint and OneDrive for Business. A partner creates a connector that extracts
data from your organization's third-party data sources (such as BlackBerry, Facebook, Google+, Thomson Reuters,
Twitter, and YouTube) and passes that data to an Office 365 API that imports items to Exchange mailboxes as
email messages.
The following sections list the Microsoft partners—and the third-party data sources they support—that are
participating in the program for archiving third-party data in Office 365.
17a-4 LLC
Actiance
ArchiveSocial
Globanet
OpenText
Verba
17a-4 LLC
17a-4 LLC supports the following third-party data sources:
BlackBerry
Bloomberg Data Streams
Cisco Jabber
FactSet
HipChat
InvestEdge
LivePerson
MessageLabs Data Streams
OpenText
Oracle/ATG 'click-to-call' Live Help
Pivot IMTRADER
Microsoft SharePoint
MindAlign
Sitrion One (Newsgator)
Skype for Business (Lync/OCS )
Skype for Business Online (Lync Online)
SQL Databases
Squawker
Thomson Reuters Eikon Messenger
Actiance
Actiance supports the following third-party data sources:
AIM
American Idol
Apple Juice
AOL with Pivot client
Ares
Bazaar Voice
Bear Share
Bit Torrent
BlackBerry Call Logs (v5, v10, v12)
BlackBerry Messenger (v5, v10, v12)
BlackBerry PIN (v5, v10, v12)
BlackBerry SMS (v5, v10, v12)
Bloomberg Mail
CellTrust
Chat Import
Chat Real Time Logging and Policy
Chatter
Cisco IM & Presence Server (v9.0.1, v9.1, v9.1.1 SU1, v10, v10.5.1 SU1)
Cisco Unified Presence Server (v8.6.3, v8.6.4, v8.6.5)
Collaboration Import
Collaboration Real Time Logging
Direct Connect
Facebook
FactSet
FastTrack
Gnutella
Google+
GoToMyPC
Hopster
HubConnex
IBM Connections (v3.0.1, v4.0, v4.5, v4.5 CR3, v5)
IBM Connections Chat Cloud
IBM Connections Social Cloud
IBM SameTime Advanced 8.5.2 IFR1
IBM SameTime Communicate 9.0
IBM SameTime Community (v8.0.2, v8.5.1 IFR2, v8.5.2 IFR1, v9.1)
IBM SameTime Complete 9.0
IBM SameTime Conference 9.0
IBM SameTime Meeting 8.5.2 IFR1
ICE/YellowJacket
IM Import
IM Real Time Logging and Policy
Indii Messenger
Instant Bloomberg
IRC
Jive
Jive 6 Real Time Logging (v6, v7)
Jive Import
JXTA
LinkedIn
Microsoft Lync (2010, 2013)
MFTP
Microsoft Lync 2013 Voice
Microsoft SharePoint (2010, 2013)
Microsoft SharePoint Online
Microsoft UC (Unified Communications)
MindAlign
Mobile Guard
MSN
My Space
NEONetwork
Office 365 Lync Dedicated
Office 365 Shared IM
Pinterest
Pivot
QQ
Skype for Business 2015
SoftEther
Symphony
Thomson Reuters Eikon
Thomson Reuters Messenger
Tor
TTT
Twitter
WinMX
Winny
Yahoo
Yammer
YouTube
ArchiveSocial
ArchiveSocial supports the following third-party data sources:
Facebook
Flickr
Instagram
LinkedIn
Pinterest
Twitter
YouTube
Vimeo
Globanet
Globanet supports the following third-party data sources:
AOL with Pivot Client
BlackBerry Call Logs (v5, v10, v12)
BlackBerry Messenger (v5, v10, v12)
BlackBerry PIN (v5, v10, v12)
BlackBerry SMS (v5, v10, v12)
Bloomberg Chat
Bloomberg Mail
Box
CipherCloud for Salesforce Chatter
Cisco IM & Presence Server (v10, v10.5.1 SU1, v11.0, v11.5 SU2)
Cisco Webex Teams
Citrix Workspace & ShareFile
CrowdCompass
Custom delimited text files
Custom XML files
Facebook (Pages)
Factset
FXConnect
ICE Chat/YellowJacket
Jive
Macgregor XIP
Microsoft Exchange Server
Microsoft OneDrive for Business
Microsoft Teams
Microsoft Yammer
Mobile Guard
Pivot
Salesforce Chatter
Skype for Business Online
Skype for Business, versions 2007 R2 - 2016 (on-premises)
Slack Enterprise Grid
Symphony
Thomson Reuters Eikon
Thomson Reuters Messenger
Thomson Reuters Dealings 3000 / FX Trading
Twitter
UBS Chat
YouTube
OpenText
OpenText supports the following third-party data sources:
Axs Encrypted
Axs Exchange
Axs Local Archive
Axs PlaceHolder
Axs Signed
Bloomberg
Thomson Reuters
Verba
Verba supports the following third-party data sources:
Avaya Aura Video
Avaya Aura Voice
Avtec Radio
Bosch/Telex Radio
BroadSoft Video
BroadSoft Voice
Centile Voice
Cisco Jabber IM
Cisco UC Video
Cisco UC Voice
Cisco UCCX/UCCE Video
Cisco UCCX/UCCE Voice
ESChat Radio
Geoman Contact Expert
IP Trade Voice
Luware LUCS Contact Center
Microsoft UC (Unified Communications)
Mitel MiContact Center for Lync (prairieFyre)
Oracle / Acme Packet Session Border Controller Video
Oracle / Acme Packet Session Border Controller Voice
Singtel Mobile Voice
SIPREC Video
SIPREC Voice
Skype for Business / Lync IM
Skype for Business / Lync Video
Skype for Business / Lync Voice
Speakerbus Voice
Standard SIP/H.323 Video
Standard SIP/H.323 Voice
Truphone Voice
TwistedPair Radio
Windows Desktop Computer Screen

Step 2: Create and configure a third-party data mailbox in Office 365


Here are the steps for creating and configuring a third-party data mailbox for importing data to Office 365. As
previous explained, items are imported to this mailbox if the partner connector can't map the user ID of the item to
an Office 365 user account.
Complete these tasks in the Office 365 admin center
1. Create a new user account in Office 365 and assign it an Exchange Online Plan 2 license; see Add users to
Office 365. A Plan 2 license is required to place the mailbox on Litigation Hold or enable an archive mailbox
that has an unlimited storage quota.
2. Add the user account for the third-party data mailbox to the Exchange administrator admin role in Office
365; see Assign admin roles in Office 365.

TIP
Write down the credentials for this user account. You need to provide them to your partner, as described in Step 4.

Complete these tasks in the Exchange admin center


1. Hide the third-party data mailbox from the address book and other address lists in your organization; see
Manage user mailboxes. Alternatively, you can run the following PowerShell command:

Set-Mailbox -Identity <identity of third-party data mailbox> -HiddenFromAddressListsEnabled $true

2. Assign the FullAccess permission to the third-party data mailbox so that administrators or compliance
officers can open the third-party data mailbox in the Outlook desktop client; see Manage permissions for
recipients.
3. Enable the following compliance-related Office 365 features for the third-party data mailbox:
Enable the archive mailbox; see Enable archive mailboxes in the Office 365 Security & Compliance
Center and Enable unlimited archiving in Office 365. This will let you free-up storage space in the
primary mailbox by setting up an archive policy that moves third-party data items to the archive
mailbox. This will provide you with unlimited storage for third-party data.
Place the third-party data mailbox on Litigation Hold. You can also apply an Office 365 retention
policy in the Office 365 Security & Compliance Center. Placing this mailbox on hold will retain third-
party data items (indefinitely or for a specified duration) and prevent them from being purged from
the mailbox. See one of the following topics:
Place a mailbox on Litigation Hold
Overview of retention policies in Office 365
Enable mailbox audit logging for owner, delegate, and admin access to the third-party data mailbox;
see Enable mailbox auditing in Office 365. This will allow you to audit all activity performed by any
user who has access to the third-party data mailbox.

Step 3: Configure user mailboxes for third-party data


The next step is to configure user mailboxes to support third-party data. Complete these tasks by using the
Exchange admin center or by using the corresponding Windows PowerShell cmdlets.
1. Enable the archive mailbox for each user; see Enable archive mailboxes in the Office 365 Security &
Compliance Center and Enable unlimited archiving in Office 365.
2. Place user mailboxes on Litigation Hold or apply an Office 365 retention policy; see one of the following
topics:
Place a mailbox on Litigation Hold
Overview of retention policies in Office 365
As previously stated, when you place mailboxes on hold, you can set a duration for how long to hold items
from the third-party data source or you can choose to hold items indefinitely.

Step 4: Provide your partner with information


The final step is to provide your partner with the following information so they can configure the connector to
connect to your Office 365 organization to import data to user mailboxes and to the third-party data mailbox.
The endpoint used to connect to the Azure service in Office 365:

https://office365ingestionsvc.gble1.protection.outlook.com/service/ThirdPartyIngestionService.svc

The sign in credentials (Office 365 user ID and password) of the third-party data mailbox that you created in
Step 2. These credentials are required so that the partner connector can access and import items to user
mailboxes and to the third-party data mailbox.

Step 5: Register the third-party data connector in Azure Active


Directory
Starting September 30, 2018, the Azure service in Office 365 will begin using modern authentication in Exchange
Online to authenticate third-party data connectors that attempt to connect to your Office 365 organization to
import data. The reason for this change is that modern authentication provides more security than the current
method, which was based on whitelisting third-party connectors that use the previously described endpoint to
connect to the Azure service.
To enable a third-party data connector to connect to Office 365 using the new modern authentication method, an
administrator in your Office 365 organization must consent to register the connector as a trusted service
application in Azure Active Directory. This is done by accepting a permissions request to allow the connector to
access your organization's data in Azure Active Directory. After you accept this request, the third-party data
connector is added as an enterprise application to Azure Active Directory and represented as a service principal.
For more information the consent process, see Tenant Admin Consent.
Here are the steps to access and accept the request to register the connector:
1. Go to this page and sign in using the credentials of an Office 365 global administrator.

The following dialog box is displayed. You can expand the carets to review the permissions that will be assigned
to the connector.
2. Click Accept.
After you accept the request, the Azure portal is displayed. To view the list of applications for your organization,
click Azure Active Directory > Enterprise applications. The Office 365 third-party data connector is listed on
the Enterprise applications blade.

IMPORTANT
After September 30, 2018, third-party data will no longer be imported into mailboxes in your organization if you don't
register a third-party data connector in Azure Active Directory. Note existing third-party data connectors (those created
before September 30, 2018) must also be registered in Azure Active Directory by following the procedure in Step 5.

Revoking consent for a third-party data connector


After your organization consents to the permissions request to register a third-party data connector in Azure
Active Directory, your organization can revoke that consent at any time. However, revoking the consent for a
connector will mean that data from the third-party data source will no longer be imported into Office 365.
To revoke consent for a third-party data connector, you can delete the application (by deleting the corresponding
service principal) from Azure Active Directory using the Enterprise applications blade in the Azure portal, or by
using the Remove-MsolServicePrincipal in Office 365 PowerShell. You can also use the Remove-
AzureADServicePrincipal cmdlet in Azure Active Directory PowerShell.

More information
As previous explained, items from third-party data sources are imported to Exchange mailboxes as email
messages. The partner connector imports the item using a schema required by the Office 365 API. The
following table describes the message properties of an item from a third-party data source after it's
imported to an Exchange mailbox as an email message. The table also indicates if the message property is
mandatory. Mandatory properties must be populated. If an item is missing a mandatory property, it won't
be imported to Office 365. The import process will return an error message explaining why an item wasn't
imported and which property is missing.

MESSAGE PROPERTY MANDATORY? DESCRIPTION EXAMPLE VALUE

FROM Yes The user who originally bob@contoso.com


created or sent the item in
the third-party data
source. The partner
connector will attempt to
map the user ID from the
source item (for example a
Twitter handle) to an Office
365 user account for all
participants (users in the
FROM and TO fields). A
copy of the message will
be imported to the
mailbox of every
participant. If none of the
participants from the item
can be mapped to an
Office 365 user account,
the item will be imported
to the third-party
archiving mailbox in Office
365.

The participant who's


identified as the sender of
the item must have an
active mailbox in the Office
365 organization that the
item is being imported to.
If the sender doesn't have
an active mailbox, the
following error is returned:

One or more messages


in the Request failed
to be delivered to
either From or Sender
email address. You
will need to resend
your entire Request.
Error: The request
failed. The remote
server returned an
error: (401)
Unauthorized.

TO Yes The user who received an bob@contoso.com


item, if applicable for an
item in the data source.

SUBJECT No The subject from the "Mega deals with


source item. Contoso coming your
way!
#ContosoHolidayDeals"
MESSAGE PROPERTY MANDATORY? DESCRIPTION EXAMPLE VALUE

DATE Yes The date the item was 01 NOV 2015


originally created or
posted in the customer
data source; for example,
that date when a Twitter
message was tweeted.

BODY No The contents of the Author:


message or post. For some bob@contoso.com
data sources, the contents Date: 10 DEC 2014
of this property could be Tweet: "Mega deals
the same as the content with Contoso coming
your way!
for the SUBJECT property. #ContosoHolidayDeals"
During the import process, Date: 01 NOV 2015
the partner connector will
attempt to maintain full
fidelity from the content
source as possible. If
possible files, graphics, or
other content from the
body of the source item is
included in this property.
Otherwise, content from
the source item is included
in the ATTACHMENT
property. The contents of
this property will depend
on the partner connector
and on the capability of
the source platform.

ATTACHMENT No If an item in the data image.gif


source (such as a tweet in
Twitter or an instant
messaging conversation)
has an attached file or
include images, the
partner connect will first
attempt to include
attachments in the BODY
property. If that isn't
possible, then it's added to
the ** ATTACHMENT **
property. Other examples
of attachments include
Likes in Facebook,
metadata from the content
source, and responses to a
message or post.
MESSAGE PROPERTY MANDATORY? DESCRIPTION EXAMPLE VALUE

MESSAGECLASS Yes This is a multi-value IPM.NOTE.Twitter.Tweet


property, which is created
and populated by partner
connector. The format of
this property is
IPM.NOTE.Source.Event .
(This property must begin
with IPM.NOTE ; this
format is similar to the one
for the IPM.NOTE.X
message class.) This
property includes the
following information:

Source - Indicates the


third-party data source;
for example, Twitter,
Facebook, or BlackBerry.

Event - Indicates the


type of activity that was
performed in the third-
party data source that
produced the items; for
example, a tweet in Twitter
or a post in Facebook.
Events are specific to the
data source.

One purpose of this


property is to filter specific
items based on the data
source where an item
originated or based on the
type of event. For example,
in an eDiscovery search
you could create a search
query to find all the tweets
that were posted by a
specific user.

When items are successfully imported to mailboxes in Office 365, a unique identifier is returned back to the
caller as part of the HTTP response. This identifier—called x-IngestionCorrelationID —can be used for
subsequent troubleshooting purposes by partners for end-to-end tracking of items. It's recommended that
partners capture this information and log it accordingly at their end. Here's an example of an HTTP
response showing this identifier:

HTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/8.5
x-IngestionCorrelationID: 1ec7667d-f097-47fe-a9a2-bc7ab0a7552b
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 02 Feb 2016 22:55:33 GMT

You can use the Content Search tool in the Office 365 Security & Compliance Center to search for items
that were imported to mailboxes in Office 365 from a third-party data source. To search specifically for
these imported items, you can use the following message property-value pairs in the keyword box for a
Content Search. .
kind:externaldata - Use this property-value pair to search all third-party data types. For example, to
search for items that were imported from a third-party data source and contained the word "contoso"
in the Subject property of the imported item, you would use the keyword query
kind:externaldata AND subject:contoso .

itemclass:ipm.externaldata.<third-party data type> - Use this property-value pair to only search a


specify type of third-party data. For example, to only search Facebook data that contains the word
"contoso" in the Subject property, you would use the keyword query
itemclass:ipm.externaldata.Facebook* AND subject:contoso .

For a complete list of values to use for third-party data types for the itemclass property, see Use Content
Search to search third-party data that was imported to Office 365
For more information about using Content Search and creating keyword search queries, see:
Content Search in Office 365
Keyword queries and search conditions for Content Search
Enable archive mailboxes in the Office 365 Security
& Compliance Center
8/21/2018 • 5 minutes to read • Edit Online

Archiving in Office 365 (also called In-Place Archiving) provides users with additional mailbox storage space.
After you turn on archive mailboxes, users can access and store messages in their archive mailboxes by using
Microsoft Outlook and Outlook Web App. Users can also move or copy messages between their primary
mailbox and their archive mailbox. They can also recover deleted items from the Recoverable Items folder in
their archive mailbox by using the Recover Deleted Items tool.

TIP
Office 365 provides an unlimited amount of archive storage with the auto-expanding archiving feature. When auto-
expanding archiving is turned on, and then the initial storage quota in a user's archive mailbox is reached, Office 365
automatically adds additional storage space. This means that users won't run out of mailbox storage space and you won't
have to manage anything after you initially enable the archive mailbox and turn on auto-expanding archiving for your
organization. For more information, see Overview of unlimited archiving in Office 365.

Before you begin


You have to be assigned the Mail Recipients role in Exchange Online to enable or disable archive mailboxes. By
default, this role is assigned to the Recipient Management and Organization Management role groups on the
Permissions page in the Exchange admin center. If you don't see the Archive page in the Security &
Compliance Center, ask your administrator to assign you the necessary permissions.

Enable an archive mailbox


1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Data governance > Archive.
The Archive page is displayed. The Archive mailbox column indicates whether an archive mailbox is
enabled or disabled for each user.
4. In the list of mailboxes, select the user that you want to enable the archive mailbox for.

5. In the details pane for the selected user, click Enable.


A warning is displayed saying that if you enable the archive mailbox, items in the user's mailbox that are
older than the archiving policy assigned to the mailbox will be moved to the new archive mailbox. The
default archive policy that is part of the retention policy assigned to Exchange Online mailboxes moves
items to the archive mailbox two years after the date the item was delivered to the mailbox or created by
the user. For more information, see the More info section in this article.
6. Click Yes to enable the archive mailbox.
It might take a few moments to create the archive mailbox. When it's created, Archive mailbox:
enabled is displayed in the details pane for the selected user. You might have to click Refresh to
update the information in the details pane.

TIP
You can also bulk-enable archive mailboxes by selecting multiple users with disabled archive mailboxes (use the Shift or
Ctrl keys). After selecting multiple mailboxes, click Enable in the details pane.

Disable an archive mailbox


You can also use the Archive page in the Security & Compliance Center to disable a user's archive mailbox.
After you disable an archive mailbox, you can reconnect it to the user's primary mailbox within 30 days of
disabling it. In this case, the original contents of the archive mailbox are restored. After 30 days, the contents of
the original archive mailbox are permanently deleted and can't be recovered. So if you re-enable the archive
more than 30 days after disabling it, a new archive mailbox is created.
Note that the default archive policy assigned to users' mailboxes moves items to the archive mailbox two years
after the date the item is delivered. If you disable a user's archive mailbox, no action will be taken on mailbox
items and they will remain in the user's primary mailbox.
To disable an archive mailbox:
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Data governance > Archive.
The Archive page is displayed. The Archive mailbox column indicates whether an archive mailbox is
enabled or disabled for each user.
4. In the list of mailboxes, select the user that you want to disable the archive mailbox for.
5. In the details pane, click Disable.
A warning message is displayed saying that you'll have 30 days to re-enable the archive mailbox, and that
after 30 days, all information in the archive will be permanently deleted.
6. Click Yes to disable the archive mailbox.
It might take a few moments to disable the archive mailbox. When it's disabled, Archive mailbox:
disabled is displayed in the details pane for the selected user. You might have to click Refresh to
update the information in the details pane.

TIP
You can also bulk-disable archive mailboxes by selecting multiple users with enabled archive mailboxes (use the Shift or
Ctrl keys). After selecting multiple mailboxes, click Disable in the details pane.
More information
Archive mailboxes help you and your users to meet your organization's retention, eDiscovery, and hold
requirements. For example, you can use your organization's Exchange retention policy to move mailbox
content to users' archive mailbox. When you use the Content Search tool in the Security & Compliance
Center to search a user's mailbox for specific content, the user's archive mailbox will also be searched.
And, when you place a Litigation Hold or apply an Office 365 retention policy to a user's mailbox, items in
the archive mailbox are also retained.
When an archive mailbox is enabled, users can store messages in their archive mailbox. Users can access
their archive mailboxes by using Microsoft Outlook and Outlook Web App. Using either of these client
applications, users can view messages in their archive mailbox and move or copy messages between their
primary mailbox and their archive mailbox. Users can also recover deleted items from the Recoverable
Items folder in their archive mailbox by using the Recover Deleted Items tool.
After archive mailboxes are enabled, your organization can take advantage of the default Exchange
retention policy (also called Messaging Records Management or MRM policy) that is automatically
assigned to every mailbox. When an archive mailbox is enabled, the default Exchange retention policy
automatically does the following:
Moves items that are two years or older from a user's primary mailbox to their archive mailbox.
Moves items that are 14 days or older from the Recoverable Items folder in the user's primary
mailbox to the Recoverable Items folder in their archive mailbox.
For more information about archive mailboxes and Exchange retention policies, see:
Archive mailboxes in Exchange Online
Retention tags and retention policies
Default Retention Policy in Exchange Online
Set up an archive and deletion policy for mailboxes in your Office 365 organization
Overview of unlimited archiving in Office 365
8/30/2018 • 4 minutes to read • Edit Online

In Office 365, archive mailboxes provide users with additional mailbox storage space. After a user's archive
mailbox is enabled, up to 100 GB of additional storage is available. When the 100 GB storage quota is reached,
organizations had to contact Microsoft to request additional storage space for an archive mailbox. That's no longer
the case. The new unlimited archiving feature in Office 365 (called auto -expanding archiving) provides an
unlimited amount of storage in archive mailboxes. Now, when the storage quota in the archive mailbox is reached,
Office 365 automatically increases the size of the archive, which means that users won't run out of mailbox
storage space and administrators won't have to request additional storage for archive mailboxes.
For step-by-step instructions for turning on auto-expanding archiving, see Enable unlimited archiving in Office
365.

NOTE
Auto-expanding archiving also supports shared mailboxes. To enable the archive for a shared mailbox, an Exchange Online
Plan 2 license or an Exchange Online Plan 1 license with an Exchange Online Archiving license is required.

How auto-expanding archiving works


As previously explained, additional mailbox storage space is created when a user's archive mailbox is enabled.
When auto-expanding archiving is enabled, Office 365 periodically checks the size of the archive mailbox. When
an archive mailbox gets close to its storage limit, Office 365 automatically creates additional storage space for the
archive. If the user runs out of this additional storage space, Office 365 adds more storage space to the user's
archive. This process happens automatically, which means administrators don't have to request additional archive
storage or manage auto-expanding archiving.
Here's a quick overview of the process.

1. Archiving is enabled for a user mailbox or a shared mailbox. An archive mailbox with 100 GB of storage
space is created, and the warning quota for the archive mailbox is set to 90 GB.
2. An administrator enables auto-expanding archiving for the mailbox. Then, when the archive mailbox
(including the Recoverable Items folder) reaches 90 GB, it's converted to an auto-expanding archive, and
Office 365 adds storage space to the archive. Note that it can take up to 30 days for the additional storage
space to be provisioned.
3. Office 365 automatically adds more storage space to the archive when necessary.

IMPORTANT
If a mailbox is placed on hold or assigned to an Office 365 retention policy, the storage quota for the archive maibox is
increased to 110 GB when auto-expanding archiving is enabled. Similarly, the archive warning quota is increased to 100 GB.

What gets moved to the additional archive storage space?


To make efficient use of auto-expanding archive storage, folders might get moved. Office 365 determines which
folders get moved when additional storage is added to the archive. When a folder is moved, a subfolder is
automatically created under the original folder in the archive portion of the folder list in Outlook. This new
subfolder points to the items that were moved. The naming convention that Office 365 uses to name this folder is
<folder name>_yyyy (Created on mmm dd, yyyy h_mm ), where:
yyyy is the year the messages in the folder were received.
mmm dd, yyyy h_m is the date and time that the subfolder was created by Office 365, in UTC format,
based on the user's time zone and regional settings in Outlook.
The following screen shots show a folder list before and after messages are moved in an auto-expanded archive.
Before additional storage is added

After additional storage is added

Outlook requirements for accessing items in an auto-expanded archive


To access messages that are stored in an auto-expanded archive, users have to use one of the following Outlook
clients:
Outlook 2016 for Windows
Outlook on the web
Outlook 2016 for Mac
NOTE
Outlook 2013 users can only access items that were originally stored in their archive mailbox. They won't be able to access
items that are moved to additional archive storage.

Here are some things to consider when using Outlook or Outlook on the web to access messages stored in an
auto-expanded archive.
You can access any folder in your archive mailbox, including ones that were moved to the auto-expanded
storage area.
You can search for items that were moved to an additional storage area only by searching the folder itself.
This means you have to select the archive folder in the folder list to select the Current Folder option as the
search scope. Similarly, if a folder in an auto-expanded storage area contains subfolders, you have to search
each subfolder separately.
Item counts in Outlook and Read/Unread counts (in Outlook and Outlook on the web ) in an auto-
expanded archive might not be accurate.
You can delete items in a subfolder that points to an auto-expanded storage area, but the folder itself can't
be deleted.
You can't use the Recover Deleted Items feature to recover an item that was deleted from an auto-expanded
storage area.

Auto-expanding archiving and other Office 365 compliance features


This section explains the functionality between auto-expanding archiving and other Office 365 compliance and
data governance features.
eDiscovery - When you use an Office 365 eDiscovery tool, such as Content Search or In-Place eDiscovery,
the additional storage areas in an auto-expanded archive are also searched.
Retention - When you put a mailbox on hold by using tools such as Litigation Hold in Exchange Online or
eDiscovery case holds and retention policies in the Office 365 Security & Compliance Center, content
located in an auto-expanded archive is also placed on hold.
Messaging records management (MRM ) - If you use MRM deletion policies in Exchange Online to
permanently delete expired mailbox items, expired items located in the auto-expanded archive will also be
deleted.
Import service - You can use the Office 365 Import service to import PST files to a user's auto-expanded
archive. You can import up to 100 GB of data from PST files to the user's archive mailbox.

More information
For more technical details about auto-expanding archiving, see Office 365: Auto-Expanding Archives FAQ.
Enable unlimited archiving in Office 365 - Admin
Help
9/3/2018 • 6 minutes to read • Edit Online

You can use the Exchange Online auto-expanding archiving feature in Office 365 to enable unlimited storage
space for archive mailboxes. When auto-expanding archiving is turned on, additional storage space is
automatically added to a user's archive mailbox when it approaches the storage limit. The result is unlimited
mailbox storage capacity. You can turn on auto-expanding archiving for everyone in your organization or just for
specific users. For more information about auto-expanding archiving, see Overview of unlimited archiving in
Office 365.

Before you begin


You have to be a global administrator in your Office 365 organization or a member of the Organization
Management role group in your Exchange Online organization to enable auto-expanding archiving for
your entire organization or for specific users. Alternately, you have to be a member of a role group that's
assigned the Mail Recipients role to enable auto-expanding archiving for specific users.
A user's archive mailbox has to be enabled before you can enable auto-expanding archiving. A user must
be assigned an Exchange Online Plan 2 license to enable the archive mailbox. If a user is assigned an
Exchange Online Plan 1 license, you would have to assign them a separate Exchange Online Archiving
license to enable their archive mailbox. See Enable archive mailboxes in the Office 365 Security &
Compliance Center.
You can also use PowerShell to enable archive mailboxes. See the More information section for an
example of the PowerShell command that you can use to enable archive mailboxes for all users in your
organization.
Auto-expanding archiving also supports shared mailboxes. To enable the archive for a shared mailbox, an
Exchange Online Plan 2 license or an Exchange Online Plan 1 license with an Exchange Online Archiving
license is required.
You can't use the Exchange admin center or the Security & Compliance Center to enable auto-expanding
archiving. You have to use Exchange Online PowerShell. To connect to your Exchange Online organization
using remote PowerShell, see Connect to Exchange Online PowerShell.

Enable auto-expanding archiving for your entire organization


You can enable auto-expanding archiving for your entire organization. After you turn it on, auto-expanding
archiving will be enabled for existing user mailboxes and for new user mailboxes that are created. When you
create new user mailboxes, be sure to enable the user's main archive mailbox so the auto-expanding archiving
feature will work for the new user mailbox.
1. Connect to Exchange Online PowerShell
2. Run the following command in Exchange Online PowerShell to enable auto-expanding archiving for your
entire organization.

Set-OrganizationConfig -AutoExpandingArchive
Enable auto-expanding archiving for specific users
Instead of enabling auto-expanding archiving for every user in your organization, you can just enable it for
specific users. You might do this because only some users might have a need for a very large archive storage.
When you enable auto-expanding archiving for a specific user and the user's mailbox in on hold or assigned to an
Office 365 retention policy, the following two configurations changes are made:
The storage quota for the user's primary archive mailbox is increased by 10 GB (from 100 GB to 110 GB ).
The archive warning quota is also increased by 10 GB (from 90 GB to 100 GB ).
The storage quota for the Recoverable Items folder in the user's primary mailbox is increased by 10 GB
(also from 100 GB to 110 GB ). The Recoverable Items warning quota is also increased by 10 GB (from 90
GB to 100 GB ). These changes are applicable only if the mailbox in on hold or assigned to an Office 365
retention policy.
This additional space is added to prevent any storage issues that may occur before the auto-expanding archive is
provisioned. Note that additional storage space is not added when you enable auto-expanding archiving for your
entire organization, as described in the previous section.
1. Connect to Exchange Online PowerShell
2. Run the following command in Exchange Online PowerShell to enable auto-expanding archiving for a
specific user. As previously explained, the user's archive mailbox (main archive) must be enabled before
you can turn on auto-expanding archiving for that user.

Enable-Mailbox <user mailbox> -AutoExpandingArchive

IMPORTANT
In an Exchange hybrid deployment, you can't use the Enable-Mailbox -AutoExpandingArchive command to enable
auto-expanding archiving for specific a user whose primary mailbox is on premises and their archive mailbox is cloud-based.
To enable auto-expanding archiving for cloud-based archive mailboxes in an Exchange hybrid deployment, you have to run
the Set-OrganizationConfig -AutoExpandingArchive command in Exchange Online PowerShell to enable auto-
expanding archiving for the entire organization. If a user's primary and archive mailboxes are both cloud-based, then you
can use the Enable-Mailbox -AutoExpandingArchive command to enable auto-expanding archiving for that specific
user.

Verify that auto-expanding archiving is enabled


To verify that auto-expanding archiving is enabled for your organization, run the following command in Exchange
Online PowerShell.

Get-OrganizationConfig | FL AutoExpandingArchiveEnabled

A value of True indicates that auto-expanding archiving is enabled for the organization.
To verify that auto-expanding archiving is enable for a specific user, run the following command in Exchange
Online PowerShell.

Get-Mailbox <user mailbox> | FL AutoExpandingArchiveEnabled

A value of True indicates that auto-expanding archiving is enabled for the user.
Keep the following things in mind after you enable auto-expanding archiving:
If you run the Set-OrganizationConfig -AutoExpandingArchive command to enable auto-expanding
archiving for your organization, you don't have to run the Enable-Mailbox -AutoExpandingArchive on
individual mailboxes. Note that running the Set-OrganizationConfig cmdlet to enable auto-expanding
archiving for your organization doesn't change the AutoExpandingArchiveEnabled property on user
mailboxes to True .
Similarly, the values for the ArchiveQuota and ArchiveWarningQuota mailbox properties aren't changed
when you enable auto-expanding archiving. In fact, when you enable auto-expanding archiving for a user
mailbox and the AutoExpandingArchiveEnabled property is set to True , the ArchiveQuota and
ArchiveWarningQuota properties are just ignored. Here's an example of these mailbox properties after
auto-expanding archiving is enabled for a user's mailbox.

More information
You can also use PowerShell to enable archive mailboxes. For example, you can run the following
command in Exchange Online PowerShell to enable archive mailboxes for all users whose archive mailbox
isn't already enabled.

Get-Mailbox -Filter {ArchiveStatus -Eq "None" -AND RecipientTypeDetails -eq "UserMailbox"} | Enable-
Mailbox -Archive

After you turn on auto-expanding archiving for your organization or for a specific user, an archive mailbox
is converted to an auto-expanding archive when the archive mailbox (including the Recoverable Items
folder) reaches 90 GB. It can take up to 30 days for the additional storage space to be provisioned.
After you turn on auto-expanding archiving, it can't be turned off.
Auto-expanding archiving is supported for cloud-based archive mailboxes in an Exchange hybrid
deployment for users who have an on-premises primary mailbox. However, after auto-expanding
archiving is enabled for a cloud-based archive mailbox, you can't off-board that archive mailbox back to
the on-premises Exchange organization.
For a list of Outlook clients that users can use to access items in the additional storage area in their archive
mailbox, see the "Outlook requirements for accessing items in an auto-expanded archive" section in
Overview of unlimited archiving in Office 365.
As previously explained, 10 GB is added to the storage quota of the user's primary archive mailbox (and to
the Recoverable Items folder if the mailbox is on hold) when you run the Enable-Mailbox -
AutoExpandingArchive command. This provides additional storage until the auto-expanded storage
space is provisioned (which can take up to 30 days). This additional storage space isn't added when you
run the Set-OrganizationConfig -AutoExpandingArchive to enable auto-expanding archiving for all
mailboxes in your organization. If you enabled auto-expanding archiving for the entire organization, but
need to add the additional 10 GB of storage space for a specific user, you can run the Enable-Mailbox -
AutoExpandingArchive command on that mailbox. Note that you will receive an error saying that auto-
expanding archiving has already been enabled, but the additional storage space will be added to the
mailbox.
Set up an archive and deletion policy for mailboxes
in your Office 365 organization
10/26/2018 • 15 minutes to read • Edit Online

In Office 365, admins can create an archiving and deletion policy that automatically moves items to a user's
archive mailbox and automatically deletes items from the mailbox. The admin does this by creating a retention
policy that's assigned to mailboxes, and moves items to a user's archive mailbox after a certain period of time and
that also deletes items from the mailbox after they reach a certain age limit. The actual rules that determine what
items are moved or deleted and when that happens are called retention tags. Retention tags are linked to a
retention policy, that in turn is assigned to a user's mailbox. A retention tag applies retention settings to individual
messages and folders in a user's mailbox. It defines how long a message remains in the mailbox and what action is
taken when the message reaches the specified retention age. When a message reaches its retention age, it's either
moved to the user's archive mailbox or it's deleted.
The steps in this article will set up an archiving and retention policy for a fictitious organization named Alpine
House. Setting up this policy includes the following tasks:
Enabling an archive mailbox for every user in the organization. This gives users addition mailbox storage,
and is required so that a retention policy can move items to the archive mailbox. It also let's a user store
archival information by moving items to their archive mailbox.
Creating three custom retention tags that do the following:
Automatically moves items that are 3 years old to the user's archive mailbox. Moving items to the
archive mailbox frees up space in a user's primary mailbox.
Automatically deletes items that are 5 years old from the Deleted Items folder. This also frees up
space in the user's primary mailbox. User's will have the opportunity to recover these items if
necessary. See the footnote in the More information section for more details.
Automatically (and permanently) deletes items that are 7 years old from both the primary and
archive mailbox. Because of compliance regulations, some organization's are required to retain email
for a certain period of time. After this time period expires, an organization might want to
permanently remove these items user mailboxes.
Creating a new retention policy and adding the new custom retention tags to it. Additionally, you'll also add
built-in retention tags to the new retention policy. This includes personal tags that users can assign to items
in their mailbox. You'll also add a retention tag that moves items from the Recoverable Items folder in the
user's primary mailbox to the Recoverable Items folder in their archive mailbox. This helps free up space in
a user's Recoverable Items folder when their mailbox is placed on hold.
You can follow some or all of the steps in this article to set up an archive and deletion policy for mailboxes in your
own organization. We recommend that you test this process on a few mailboxes before implementing it on all
mailboxes in your organization.

Before you begin


You have to be a global administrator in your Office 365 organization to perform the steps in this topic.
When you create a new user account in Office 365 and assign the user an Exchange Online license, a
mailbox is automatically created for the user. When the mailbox is created, it's automatically assigned a
default retention policy, named Default MRM Policy. In this article, you will create a new retention policy
and then assign it to user mailboxes, replacing the Default MRM policy. A mailbox can have only one
retention policy assigned to it at any one time.
To learn more about retention tags and retention policies in Exchange Online, see Retention tags and
retention policies.

Step 1: Enable archive mailboxes for users


The first step is to enable the archive mailbox for each user in your organization. A user's archive mailbox has to
be enabled so that a retention tag with a "Move to Archive" retention action can move the item after the retention
age expires.

NOTE
You can enable archive mailboxes any time during this process, just as long as they're enabled at some point before you
complete the process. If an archive mailbox isn't enabled, no action is taken on any items that have an archive policy
assigned to it.

1. Go to https://protection.office.com.
2. Sign in to Office 365 using your global administrator account.
3. In the Security & Compliance Center, go to Data governance > Archive.
A list of the mailboxes in your organization is displayed and whether the corresponding archive mailbox is
enabled or disabled.
4. Select all the mailboxes by clicking on the first one in the list, holding down the Shift key, and then clicking
the last one in the list.

TIP
This step assumes that no archive mailboxes are enabled. If you have any mailboxes with the archive enabled, hold
down the Ctrl key and click each mailbox that has a disabled archive mailbox. Or you can click the Archive mailbox
column header to sort the rows based on whether the archive mailbox is enabled or disabled to make it easier to
select mailboxes.

5. In the details pane, under Bulk Edit, click Enable.


A warning is displayed saying that items that are older than two years will be moved to the new archive
mailbox. This is because the default retention policy that's assigned a new user mailbox when it's created
has an archive default policy tag that has a retention age of 2 years. The custom archive default policy tag
that you'll create in Step 2 has a retention age of 3 years. That means items that are 3 years or older will be
moved to the archive mailbox.
6. Click Yes to close the warning message and start the process to enable the archive mailbox for each
selected mailbox.
7. When the process is complete, click Refresh to update the list on the Archive page.
The archive mailbox is enabled for all user's in your organization.
8. Leave the Security & Compliance Center open. You'll use it in the next step.

Step 2: Create new retention tags for the archive and deletion policies
In this step, you'll create the three custom retention tags that were previously described.
Alpine House 3 Year Move to Archive (custom archive policy)
Alpine House 7 Year Permanently Delete (custom deletion policy)
Alpine House Deleted Items 5 Years Delete and Allow Recovery (custom tag for the Deleted Items folder)
To create new retention tags, you'll use the Exchange admin center (EAC ) in your Exchange Online organization.
1. In the Security & Compliance Center, click the app launcher in the upper left corner, and then click the
Admin tile .
2. In the left navigation pane of the Office 365 admin center, click Admin centers, and then click Exchange.
3. In the EAC, go to Compliance management > Retention tags
A list of the retention tags for your organization is displayed.
Create a custom archive default policy tag
First, you'll create a custom archive default policy tag (DPT) that will move items to the archive mailbox after 3
years.
1. On the Retention tags page, click New tag , and then select applied automatically to entire mailbox
(default).
2. On the New tag applied automatically to entire mailbox (default) page, complete the following
fields:
3. Name Type a name for the new retention tag.
4. Retention action Select Move to Archive to move items to the archive mailbox when the retention
period expires.
5. Retention period Select When the item reaches the following age (in days), and then enter the
duration of the retention period. For this scenario, items will be moved to the archive mailbox after 1095
days (3 years).
6. Comment (Optional) Type a comment that explains the purpose of the custom retention tag.
7. Click Save to create the custom archive DPT.
The new archive DPT is displayed in the list of retention tags.
Create a custom deletion default policy tag
Next, you'll create another custom DPT but this one will be a deletion policy that permanently deletes items after 7
years.
1. On the Retention tags page, click New tag , and then select applied automatically to entire mailbox
(default).
2. On the New tag applied automatically to entire mailbox (default) page, complete the following
fields:
3. Name Type a name for the new retention tag.
4. Retention action Select Permanently Delete to purge items from the mailbox when the retention period
expires.
5. Retention period Select When the item reaches the following age (in days), and then enter the
duration of the retention period. For this scenario, items will be purged after 2555 days (7 years).
6. Comment (Optional) Type a comment that explains the purpose of the custom retention tag.
7. Click Save to create the custom deletion DPT.
The new deletion DPT is displayed in the list of retention tags.
Create a custom retention policy tag for the Deleted Items folder
The last retention tag that you'll create is a custom retention policy tag (RPT) for the Deleted Items folder. This tag
will delete items in the Deleted Items folder after 5 years, and provides a recovery period when users can use the
Recover Deleted Items tool to recover an item.
1. On the Retention tags page, click New tag , and then select applied automatically to a default
folder.
2. On the New tag applied automatically to a default folder page, complete the following fields:
3. Name Type a name for the new retention tag.
4. Apply this tag to the following default folder In the drop-down list, select Deleted Items.
5. Retention action Select Delete and Allow Recovery to delete items when the retention period expires,
but allow users to recover a deleted item within the deleted item retention period (which by default is 14
days).
6. Retention period Select When the item reaches the following age (in days), and then enter the
duration of the retention period. For this scenario, items will be deleted after 1825 days (5 years).
7. Comment (Optional) Type a comment that explains the purpose of the custom retention tag.
8. Click Save to create the custom RPT for the Deleted Items folder.
The new RPT is displayed in the list of retention tags.

Step 3: Create a new retention policy


After you create the custom retention tags, the next step is to create a new retention policy and add the retention
tags. You'll add the three custom retention tags that you created in Step 2, and the built-in tags that were
mentioned in the first section. In Step 4, you'll assign this new retention policy to user mailboxes.
1. In the EAC, go to Compliance management > Retention policies.
2. On the Retention policies page, click New .
3. In the Name box, type a name for the new retention policy; for example, Alpine House Archive and
Deletion Policy.
4. Under Retention tags, click Add .
A list of the retention tags in your organization is displayed. Note the custom tags that you created in Step
2 are displayed.
5. Add the 9 retention tags that are highlighted in the following screenshot (these tags are described in more
detail in the More information section). To add a retention tag, select it and then click Add.

TIP
You can select multiple retention tags by holding down the Ctrl key and then clicking each tag.

6. After you've added the retention tags, click OK.


7. On the New retention policy page, click Save to create the new policy.
The new retention policy is displayed in the list. Select it to display the retention tags linked to it in the
details pane.

Step 4: Assign the new retention policy to user mailboxes


When a new mailbox is created, a retention policy named Default MRM policy is assigned to it by default. In this
step, you'll replace this retention policy (because a mailbox can have only one retention policy assigned to it) by
assigning the new retention policy that you created in Step 3 to the user mailboxes in your organization. This step
assumes that you'll assign the new policy to all mailboxes in your organization.
1. In the EAC, go to Recipients > Mailboxes.
A list of all user mailboxes in your organization is displayed.
2. Select all the mailboxes by clicking on the first one in the list, holding down the Shift key, and then clicking
the last one in the list.
3. In the details pane on the right side of the EAC, under Bulk Edit, click More options.
4. Under Retention Policy, click Update.
5. On the Bulk assign retention policy page, in the Select the retention policy drop-down list, select the
retention policy that you created in Step 3; for example, Alpine House Archive and Retention Policy.
6. Click Save to save the new retention policy assignment.
7. To verify that the new retention policy was assigned to mailboxes, you can do the following: select a
mailbox on the Mailboxes page, and then click Edit.
8. Select a mailbox on the Mailboxes page, and then click Edit .
9. On the mailbox properties page for the selected user, click Mailbox features.
The name of the new policy assigned to the mailbox is displayed in the Retention policy drop-down list.

(Optional) Step 5: Run the Managed Folder Assistant to apply the new
settings
After you apply the new retention policy to mailboxes in Step 4, it can take up to 7 days in Exchange Online for the
new retention settings to be applied to the mailboxes. This is because a process called the Managed Folder
Assistant processes mailboxes once every 7 days. Instead of waiting for the Managed Folder Assistant to run, you
can force this to happen by running the Start-ManagedFolderAssistant cmdlet in Exchange Online PowerShell.
What happens when you run the Managed Folder Assistant? It applies the settings in the retention policy by
inspecting items in the mailbox and determining whether they're subject to retention. It then stamps items subject
to retention with the appropriate retention tag, and then takes the specified retention action on items past their
retention age.
Here are the steps to connect to Exchange Online PowerShell, and then run the Managed Folder Assistant on
every mailbox in your organization.
1. On your local computer, open Windows PowerShell and run the following command.

$UserCredential = Get-Credential

In the Windows PowerShell Credential Request dialog box, type the user name and password for your
Office 365 global admin account, and then click OK.
2. Run the following command.

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri


https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -
AllowRedirection

3. Run the following command.

Import-PSSession $Session
4. To verify that you're connected to your Exchange Online organization, run the following command to get a
list of all the mailboxes in your organization.

Get-Mailbox

NOTE
For more information or if you have problems connecting to your Exchange Online organization, see Connect to
Exchange Online using remote PowerShell.

5. Run the following two commands to start the Managed Folder Assistant for all user mailboxes in your
organization.

$Mailboxes = Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"}

$Mailboxes.Identity | Start-ManagedFolderAssistant

That's it! You've set up an archive and deletion policy for the Alpine House organization.

More information
How is retention age calculated? The retention age of mailbox items is calculated from the date of delivery
or the date of creation for items such as draft messages that aren't sent but are created by the user. When
the Managed Folder Assistant processes items in a mailbox, it stamps a start date and an expiration date
for all items that have retention tags with the Delete and Allow Recovery or Permanently Delete retention
action. Items that have an archive tag are stamped with a move date.
The following table provides more information about each retention tag that is added to the custom
retention policy that was created by following the steps in this topic.

RETENTION TAG WHAT THIS TAG DOES BUILT-IN OR CUSTOM? TYPE

Alpine House 3 Year Move Moves items that are Custom (See Step 2: Default Policy Tag
to Archive 1095 days (3 years) old to Create new retention tags (archive); this tag is
the archive mailbox. for the archive and automatically applied to
deletion policies) the entire mailbox.

Alpine House 7 Year Permanently deletes items Custom (See Step 2: Default Policy Tag
Permanently Delete in the primary mailbox or Create new retention tags (deletion); this tag is
the archive mailbox when for the archive and automatically applied to
they are 7 years old. deletion policies) the entire mailbox.

Alpine House Deleted Deletes items from the Custom (See Step 2: Retention Policy Tag
Items 5 Years Delete and Deleted Items folder that Create new retention tags (Deleted Items); this tag is
Allow Recovery are 5 years old. Users can for the archive and automatically applied to
recover these items for up deletion policies) items in the Deleted items
14 days after they're folder.
deleted.*
RETENTION TAG WHAT THIS TAG DOES BUILT-IN OR CUSTOM? TYPE

Recoverable Items 14 days Moves items that have Built-in Retention Policy Tag
Move to Archive been in the Recoverable (Recoverable Items); this
Items folder for 14 days to tag is automatically
the Recoverable Items applied to items in the
folder in the archive Recoverable Items folder.
mailbox.

Junk Email Permanently deletes items Built-in Retention Policy Tag (Junk
that have been in the Junk Email); this tag is
Email folder for 30 days. automatically applied to
Users can recover these items in Junk Email folder.
items for up 14 days after
they're deleted.*

1 Month Delete Permanently deletes items Built-in Personal; this tag can be
that are 30 days old. Users applied by users.
can recover these items
for up 14 days after
they're deleted.*

1 Year Delete Permanently deletes items Built-in Personal; this tag can be
that are 365 days old. applied by users.
Users can recover these
items for up 14 days after
they're deleted.*

Never Delete This tag prevent items Built-in Personal; this tag can be
from being deleted by a applied by users.
retention policy.

Personal 1 year move to Moves items to the Built-in Personal; this tag can be
archive archive mailbox after 1 applied by users.
year.

* Users can use the Recover Deleted Items tool in Outlook and Outlook Web App to recover a deleted
item within the deleted item retention period, which by default is 14 days in Exchange Online. An
administrator can use Windows PowerShell to increase the deleted item retention period to a
maximum of 30 days. For more information, see: Recover deleted items in Outlook for Windows and
Change the deleted item retention period for a mailbox in Exchange Online

Using the Recoverable Items 14 days Move to Archive retention tag helps free up storage space in the
Recoverable Items folder in the user's primary mailbox. This is useful when a user's mailbox is placed on
hold, which means nothing is ever permanently deleted the user's mailbox. Without moving items to the
archive mailbox, it's possible the storage quota for the Recoverable Items folder in the primary mailbox will
be reached. For more information about this and how to avoid it, see Increase the Recoverable Items quota
for mailboxes on hold.
Overview of retention policies
12/6/2018 • 25 minutes to read • Edit Online

For most organizations, the volume and complexity of their data is increasing daily - email, documents, instant
messages, and more. Effectively managing or governing this information is important because you need to:
Comply proactively with industry regulations and internal policies that require you to retain
content for a minimum period of time - for example, the Sarbanes-Oxley Act might require you to retain
certain types of content for seven years.
Reduce your risk in the event of litigation or a security breach by permanently deleting old content
that you're no longer required to keep.
Help your organization to share knowledge effectively and be more agile by ensuring that your
users work only with content that's current and relevant to them.
A retention policy in Office 365 can help you achieve all of these goals. Managing content commonly requires
two actions:
Retaining content so that it can't be permanently deleted before the end of the retention period.
Deleting content permanently at the end of the retention period.
With a retention policy, you can:
Decide proactively whether to retain content, delete content, or both - retain and then delete the content.
Apply a single policy to the entire organization or just specific locations or users.
Apply a policy to all content or just content meeting certain conditions, such as content containing
specific keywords or specific types of sensitive information.
When content is subject to a retention policy, people can continue to edit and work with the content as if
nothing's changed because the content is retained in place, in its original location. But if someone edits or
deletes content that's subject to the policy, a copy is saved to a secure location where it's retained while the
policy is in effect.
Finally, some organizations might need to comply with regulations such as Securities and Exchange
Commission (SEC ) Rule 17a-4, which requires that after a retention policy is turned on, it cannot be turned off
or made less restrictive. To meet this requirement, you can use Preservation Lock. After a policy's been locked,
no one—including the administrator—can turn off the policy or make it less restrictive.
You create and manage retention policies on the Retention page in the Office 365 Security & Compliance
Center.
NOTE
To include an Exchange Online mailbox in a retention policy, the mailbox must be assigned an Exchange Online Plan 2
license. If a mailbox is assigned an Exchange Online Plan 1 license, you would have to assign it a separate Exchange Online
Archiving license to include it in a retention policy.

How a retention policy works with content in place


When you include a location such as a site or mailbox in a retention policy, the content remains in its original
location. People can continue to work with their documents or mail as if nothing's changed. But if they edit or
delete content that's included in the policy, a copy of the content as it existed when you applied the policy is
retained.
For sites, a copy of the original content is retained in the Preservation Hold library when users edit or delete it;
for email and public folders, the copy is retained in the Recoverable Items folder. These secure locations and the
retained content are not visible to most people. With a retention policy, people do not even need to know that
their content is subject to the policy.
Notes:
Skype content is stored in Exchange, where the policy is applied based on message type (email or
conversation).
A retention policy applied to an Office 365 group includes both the group mailbox and site.
Content in OneDrive accounts and SharePoint sites
A retention policy is applied at the level of a site. When you include a SharePoint site or OneDrive account in a
retention policy, a Preservation Hold library is created, if one doesn't already exist. Most users can't view the
Preservation Hold library because it's visible only to site collection administrators.
If a person attempts to change or delete content in a site that's subject to a retention policy, first the policy
checks whether the content's been changed since the policy was applied. If this is the first change since the
policy was applied, the retention policy copies the content to the Preservation Hold library, and then allows the
person to change or delete the original content. Note that any content in the site can be copied to the
Preservation Hold library, even if the content does not match the query used by the retention policy.
Then a timer job cleans up the Preservation Hold library. The timer job runs periodically and compares all
content in the Preservation Hold library to all of the queries used by the retention policies on the site. Unless
content matches at least one of the queries, the timer job permanently deletes the content from the Preservation
Hold library.
The previous applies to content that exists when the retention policy is applied. In addition, any new content
that's created or added to the site after it was included in the policy will be retained after deletion. However, new
content isn't copied to the Preservation Hold library the first time it's edited, only when it's deleted. To retain all
versions of a file, you need to turn on versioning — see the below section on versioning.
Note that a user will receive an error if they try to delete a library, list, folder, or site that's subject to a retention
policy. A user can delete a folder if they first move or delete any files in the folder that are subject to the policy.

After a retention policy is assigned to a OneDrive account or SharePoint site, content can follow one of two
paths:
1. If the content is modified or deleted during the retention period, a copy of the original content as it
existed when the retention policy was assigned is created in the Preservation Hold library. There, a timer
job runs periodically and identifies items whose retention period has expired, and these items are
permanently deleted within seven days of the end of the retention period.
2. If the content is not modified or deleted during the retention period, it's moved to the first-stage
Recycle Bin at the end of the retention period. If a user deletes the content from there or empties this
Recycle Bin (also known as purging), the document is moved to the second-stage Recycle Bin. A 93-day
retention period spans both the first- and second-stage recycle bins. At the end of 93 days, the document
is permanently deleted from wherever it resides, in either the first- or second-stage Recycle Bin. Note that
the Recycle Bin is not indexed and therefore searches do not find content there. This means that an
eDiscovery hold can't locate any content in the Recycle Bin in order to hold it.
Content in mailboxes and public folders
For a user's mail, calendar, and other items, a retention policy is applied at the level of a mailbox. For a public
folder, a retention policy is applied at the folder level, not the mailbox level. Both a mailbox and a public folder
use the Recoverable Items folder to retain items. Only people whom have been assigned eDiscovery
permissions can view items in another user's Recoverable Items folder.
By default, when a person deletes a message in a folder other than the Deleted Items folder, the message is
moved to the Deleted Items folder. When a person deletes an item in the Deleted Items folder, the message is
moved to the Recoverable Items folder. In addition, a person can soft delete an item (SHIFT+DELETE ) in any
folder, which bypasses the Deleted Items folder and moves the item directly to the Recoverable Items folder.
A process periodically evaluates items in the Recoverable Items folder. If an item doesn't match the rules of at
least one retention policy, the item is permanently deleted (also called hard deleted) from the Recoverable Items
folder.
When a person attempts to change certain properties of a mailbox item — such as the subject, body,
attachments, senders and recipients, or date sent or received for a message — a copy of the original item is
saved to the Recoverable Items folder before the change is committed. This happens for each subsequent
change. At the end of the retention period, copies in the Recoverable Items folder are permanently deleted.
If a user leaves your organization, and their mailbox is included in a retention policy, the mailbox becomes an
inactive mailbox when the user's Office 365 account is deleted. The contents of an inactive mailbox are still
subject to any retention policy that was placed on the mailbox before it was made inactive, and the contents are
available to an eDiscovery search. For more information, see Inactive mailboxes in Exchange Online.

After a retention policy is assigned to a mailbox or public folder, content can follow one of two paths:
1. If the item is modified or permanently deleted by the user (either SHIFT+DELETE or deleted from
Deleted Items) during the retention period, the item is moved (or copied, in the case of edit) to the
Recoverable Items folder. There, a process runs periodically and identifies items whose retention period
has expired, and these items are permanently deleted within 14 days of the end of the retention period.
Note that 14 days is the default setting, but it can be configured up to 30 days.
2. If the item is not modified or deleted during the retention period, the same process runs periodically
on all folders in the mailbox and identifies items whose retention period has expired, and these items are
permanently deleted within 14 days of the end of the retention period. Note that 14 days is the default
setting but it can be configured up to 30 days.

How a retention policy works with document versions in a site


Versioning is a feature of all document libraries in SharePoint Online and OneDrive for Business. By default,
versioning retains a minimum of five hundred major versions, though you can increase this limit. For more
information, see Enable and configure versioning for a list or library.
A retention policy retains all versions of a document in a SharePoint site or OneDrive account. Each time a
document subject to a retention policy is edited or deleted, a version is copied to the Preservation Hold library.
Each version of a document in the Preservation Hold library exists as a separate item with its own retention
period:
If the retention policy is based on when the content was created, each version has the same expiration
date as the original document. The original document and its versions all expire at the same time.
If the retention policy is based on when the content was last modified, each version has its own expiration
date based on when the original document was modified to create that version. The original documents
and its versions expire independently of each other.

Retaining content for a specific period of time


With a retention policy, you can retain content indefinitely or for a specific number of days, months, or years.
Note that the duration for how long content is retained is calculated from the age of the content, not from when
the retention policy is applied. You can choose whether the age is based on when the content was created or (for
OneDrive and SharePoint) when it was last modified.
For example, if you want to retain content in a site for seven years since it was last modified, and a document in
that site hasn't been modified in six years, the document will be retained for only another year if it's not
modified. If the document is edited again, the age of the document is calculated from the new last modified date,
and it will be retained for another seven years.
Similarly, if you want to retain content in a mailbox for seven years, and a message was sent six years ago, the
message will be retained for only one year. For Exchange content, the age is always based on the date received
or sent (they are the same). Retaining content based on when it was last modified applies only to site content in
OneDrive and SharePoint.
You can choose whether you want the content to be permanently deleted at the end of the retention period. A
retention policy can also simply delete old content without retaining it - see the next section.

Deleting content that's older than a specific age


A retention policy can both retain and then delete content, or simply delete old content without retaining it.
If your retention policy deletes content, it's important to understand that the time period specified for a retention
policy is calculated from the time when the content was created or modified, not the time since the policy was
assigned.
For example, suppose that you create a retention policy that deletes content after three years, and then assign
that policy to all OneDrive accounts, which contain a lot of content that was created four or five years ago. In this
case, a lot of content will be deleted soon after assigning the retention policy for the first time. For this reason, a
retention policy that deletes content can have a considerable impact on your content.
Therefore, before you assign a retention policy to a site for the first time, you should first consider the age of the
existing content and how the policy may impact that content. You may also want to communicate the new policy
to your users before assigning it, to give them time to assess the possible impact. Note this warning that
appears when you review the settings for your retention policy just before creating it.

Advanced settings that apply a policy only to content that meets


certain conditions
A retention policy can apply to all content in the locations that it includes, or you can choose to apply a retention
policy only to content that contains specific keywords or specific types of sensitive information.

Retain content that contains specific keywords


You can apply a retention policy only to content that satisfies certain conditions, and then take retention actions
on just that content. The conditions available now support applying a retention policy to content that contains
specific words or phrases. You can refine your query by using search operators like AND, OR, and NOT. For
more information on these operators, see Keyword queries and search conditions for Content Search.
Support for adding searchable properties (for example, subject:) is coming soon.
Note that query-based retention uses the search index to identify content.
Retain content that contains sensitive information
You can also apply a retention policy only to content that contains specific types of sensitive information. For
example, you can choose to apply unique retention requirements only to content that contains personally
identifiable information (PII) such as taxpayer identification numbers, social security numbers, or passport
numbers.

Notes:
Advanced retention for sensitive information doesn't apply to Exchange public folders or Skype for
Business because those locations don't support sensitive information types.
You should understand that Exchange Online uses transport rules to identify sensitive information, so this
works only on messages in transit — not on all items already stored in a mailbox. For Exchange Online,
this means that a retention policy can identify sensitive information and take retention actions only on
messages that are received after the policy is applied to the mailbox. (Note that query-based retention
described in the previous section doesn't have this limitation because it uses the search index to identify
content.)

Applying a retention policy to an entire organization or specific


locations
You can easily apply a retention policy to an entire organization, entire locations, or only to specific locations or
users.
Org-wide policy
One of the most powerful features of a retention policy is that by default it applies to locations across Office
365, including:
Exchange email
SharePoint sites
OneDrive accounts
Office 365 groups (applies to content in the group's mailbox, site, and documents. Support for content in
Planner, Yammer, and CRM is coming soon.)
Exchange public folders

Other important features of an org-wide retention policy include:


There is no limit to the number of mailboxes or sites the policy can include.
For Exchange, any new mailbox created after the policy is applied will automatically inherit the policy.
A policy that applies to entire locations
When you choose locations, you can easily include or exclude an entire location, such as Exchange email or
OneDrive accounts. To do so, simply toggle the Status of that location on or off.
Like an org-wide policy, if a policy applies to any combination of entire locations, there is no limit to the number
of mailboxes or sites the policy can include. For example, if a policy includes all Exchange email and all
SharePoint sites, all sites and mailboxes will be included, no matter how many. And for Exchange, any new
mailbox created after the policy is applied will automatically inherit the policy.
A policy with specific inclusions or exclusions
You can also apply a retention policy to specific users. To do so, toggle the Status of that location on, and then
use the links to include or exclude specific users, Office 365 groups, or locations.
However, note that the following limits exist for a retention policy that includes or excludes over 1,000 specific
users:
Such a retention policy can contain no more than 1,000 mailboxes and 100 sites.
A tenant can contain no more than 1,000 such retention policies.
Although these limits exist, understand that you can get over these limits by applying either an org-wide policy
or a policy that applies to entire locations.
Skype locations
Unlike Exchange email, you can't simply toggle the status of the Skype location on to include all users, but you
can turn on that location and then manually choose the users whose conversations you want to retain.
When you choose Skype for Business users, you can quickly include all users by selecting the Name box in the
column header - however, it's important to understand that each user counts as a specific inclusion in the policy.
Therefore, if you include over 1,000 users, the limits noted in the previous section apply. Selecting all Skype
users here is not the same as if an org-wide policy were able to include all Skype users by default.
Note that Conversation History, a folder in Outlook, is a feature that has nothing to do with Skype archiving.
Conversation History can be turned off by the end user, but archiving for Skype is done by storing a copy of
Skype conversations in a hidden folder that is inaccessible to the user but available to eDiscovery.
Teams locations
You can use a retention policy to retain chats and channel messages in Teams. Teams chats are stored in a
hidden folder in the mailbox of each user included in the chat, and Teams channel messages are stored in a
similar hidden folder in the group mailbox for the team. However, it's important to understand that Teams uses
an Azure-powered chat service that also stores this data, and by default this service stores the data forever. For
this reason, we strongly recommend that you use the Teams location to retain and delete Teams data. Using the
Teams location will permanently delete data from both the Exchange mailboxes and the underlying Azure-
powered chat service. For more information, see Overview of security and compliance in Microsoft Teams.
Note that Teams chats and channel messages are not affected by retention policies applied to user or group
mailboxes in the Exchange or Office 365 groups locations. Even though Teams chats and channel messages are
stored in Exchange, they're affected only by a retention policy that's applied to the Teams location.
We're still working on retention in Teams, and additional features are coming. In the meantime, here are a few
limitations to be aware of:
Teams require a separate retention policy When you create a retention policy and toggle on the
Teams location, all other locations toggle off. A retention policy that includes Teams can include only
Teams and no other locations.
Teams are not included in an org-wide policy If you create an org-wide policy, Teams are not
included because they require a separate retention policy.
Teams doesn't support advanced retention When you create a retention policy, if you choose the
Advanced settings that apply a policy only to content that meets certain conditions, the Teams location is
not available. At this time, retention in Teams applies to all of the chat and channel message content.
Teams content must be at least 30 days old to be deleted At this time, creating a policy to delete
Teams content that's less than 30 days old is not supported. If you want this policy to apply to Teams
content, specify a retention period that's equal to or greater than 30 days.
Teams may take up to 30 days to clean up retained content A retention policy applied to Teams will
delete the content from all relevant storage locations. However, immediately after launch, it may take up
to 30 days for Teams clients to clean up content based on the retention policy. But even though content
still appears in the Teams clients, that content will not appear in content search or eDiscovery after the
end of the retention period.
In a Team, files that are shared in chat are stored in the OneDrive account of the user who shared the file. Files
that are uploaded into channels are stored in the SharePoint site for the Team. Therefore, to retain or delete files
in a Team, you need to create a retention policy that applies to the SharePoint and OneDrive locations. If you
want to apply a policy to the files of just a specific team, you can choose the SharePoint site for the Team and the
OneDrive accounts of users in the Team.
A retention policy that applies to Teams can use Preservation Lock.

Excluding specific types of Exchange items from a retention policy


By using PowerShell, you can exclude specific types of Exchange items from a retention policy. For example, you
can exclude voicemail messages, IM conversations, and other Skype for Business Online content in mailboxes.
You can also exclude calendar, note, and task items. This capability is available only by using PowerShell; it's not
available in the UI when you create a retention policy.
To do this, use the parameter of the New-RetentionComplianceRule and
ExcludedItemClasses
Set-RetentionComplianceRule cmdlets. For more information about PowerShell, see the below section Find the
PowerShell cmdlets for retention policies.

Locking a retention policy


Some organizations may need to comply with rules defined by regulatory bodies such as the Securities and
Exchange Commission (SEC ) Rule 17a-4, which requires that after a retention policy is turned on, it cannot be
turned off or made less restrictive. With Preservation Lock, you can lock the policy so that no one—including the
administrator—can turn off the policy or make it less restrictive.
After a policy's been locked, no one can turn it off or remove locations from the policy. And it's not possible to
modify or delete content that's subject to the policy during the retention period. After the policy's been locked,
the only ways you can modify the retention policy are by adding locations to it or extending its duration. A
locked policy can be increased or extended, but it can't be reduced or turned off.
Therefore, before you lock a retention policy, it's critical that you understand your organization's compliance
requirements, and that you do not lock a policy until you're certain that it's what you need.
You can lock a retention policy only by using PowerShell. Use the RestrictiveRetention parameter of the
New-RetentionCompliancePolicy or Set-RetentionCompliancePolicy cmdlet. For more information about
PowerShell, see the below section Find the PowerShell cmdlets for retention policies.

The principles of retention, or what takes precedence?


It's possible or even likely that content might have several retention policies applied to it, each with a different
action (retain, delete, or both) and retention period. What takes precedence? At the highest level, rest assured
that content being retained by one policy can't be permanently deleted by another policy.

To understand how different retention policies are applied to content, keep these principles of retention in mind:
1. Retention wins over deletion. Suppose that one retention policy says to delete Exchange email after
three years, but another retention policy says to retain Exchange email for five years and then delete it.
Any content that reaches three years old will be deleted and hidden from the users' view, but still retained
in the Recoverable Items folder until the content reaches five years old, when it will be permanently
deleted.
2. The longest retention period wins. If content's subject to multiple policies that retain content, it will be
retained until the end of the longest retention period.
3. Explicit inclusion wins over implicit inclusion. This means:
a. If a label with retention settings is manually assigned by a user to an item, such as an Exchange
email or OneDrive document, that label takes precedence over both a policy assigned at the site or
mailbox level and a default label assigned by the document library. For example, if the explicit label
says to retain for ten years, but the policy assigned to the site says to retain for only five years, the
label takes precedence. Note that auto-apply labels are considered implicit, not explicit, because
they're applied automatically by Office 365.
b. If a retention policy includes a specific location, such as a specific user's mailbox or OneDrive for
Business account, that policy takes precedence over another retention policy that applies to all
users' mailboxes or OneDrive for Business accounts but doesn't specifically include that user's
mailbox.
4. The shortest deletion period wins. Similarly, if content's subject to multiple policies that delete content
(with no retention), it will be deleted at the end of the shortest retention period.

Understand that the principles of retention work as a tie-breaking flow from top to bottom: If the rules applied
by all policies or labels are the same at one level, the flow moves down to the next level to determine precedence
for which rule is applied.
Finally, a retention policy or label cannot permanently delete any content that's on hold for eDiscovery. When
the hold is released, the content again becomes eligible for the cleanup process described above.

Use a retention policy instead of these features


A single retention policy can easily apply to an entire organization and locations across Office 365, including
Exchange Online, SharePoint Online, OneDrive for Business, and Office 365 groups. If you need to retain or
delete content anywhere in Office 365, we recommend that you use a retention policy. (You can also use labels
with retention settings - for more information, see Overview of labels.)
There are several other features that have previously been used to retain or delete content in Office 365. These
are listed below. These features will continue to work side by side with retention policies and labels created in
the Security & Compliance Center. But moving forward, for data governance, we recommend that you use a
retention policy or labels instead of all of these features. A retention policy is the only feature that can both
retain and delete content across Office 365.
Exchange Online
Manage eDiscovery cases in the Office 365 Security & Compliance Center (eDiscovery hold)
In-Place Hold and Litigation Hold (eDiscovery hold)
Retention tags and retention policies, also known as messaging records management (MRM ) (Deletion
only)
SharePoint Online and OneDrive for Business
Manage eDiscovery cases in the Office 365 Security & Compliance Center (eDiscovery hold)
Add content to a case and place sources on hold in the eDiscovery Center (eDiscovery hold)
Overview of document deletion policies (Deletion only)
Configuring in place records management (Retention)
Use policies for site closure and deletion (Deletion only)
Information management policies (Deletion only)
Note that if you've previously used any of the eDiscovery holds for the purpose of data governance, you should
instead use a retention policy for proactive compliance. You should use a hold created in the Security &
Compliance Center only for eDiscovery.
Retention policies override information management policies
In SharePoint sites, you may be using information management policies to retain content. If you apply a
retention policy created in the Security and Compliance Center to a site that already uses content type policies
or information management policies for a list or library, those policies are ignored while the retention policy is in
effect.

What happened to preservation policies?


If you were using a preservation policy, that policy has been automatically converted to a retention policy that
uses only the retain action - the policy won't delete content. The preservation policy will continue to work and
preserve your content without requiring any changes from you. You can find these policies on the Retention
page in the Security & Compliance Center. You can edit a preservation policy to change the retention period, but
you can't make other changes, such as adding or removing locations.

Permissions
Members of your compliance team who will create retention policies need permissions to the Security &
Compliance Center. By default, your tenant admin will have access to this location and can give compliance
officers and other people access to the Security & Compliance Center, without giving them all of the
permissions of a tenant admin. To do this, we recommend that you go to the Permissions page of the Security
& Compliance Center, edit the Compliance Administrator role group, and add members to that role group.
For more information, see Give users access to the Office 365 Security & Compliance Center.
These permissions are required only to create and apply a retention policy. Policy enforcement does not require
access to the content.

Find the PowerShell cmdlets for retention policies


To use the retention policy cmdlets, you need to:
1. Connect to the Office 365 Security & Compliance Center using remote PowerShell
2. Use these Office 365 Security & Compliance Center cmdlets

More information
Overview of labels
Overview of retention labels
11/13/2018 • 21 minutes to read • Edit Online

Across your organization, you probably have different types of content that require different actions taken on
them in order to comply with industry regulations and internal policies. For example, you might have:
Tax forms that need to be retained for a minimum period of time.
Press materials that need to be permanently deleted when they reach a certain age.
Competitive research that needs to be both retained and then permanently deleted.
Work visas that must be marked as a record so that they can't be edited or deleted.
In all of these cases, retention labels in Office 365 can help you take the right actions on the right content. With
retention labels, you can classify data across your organization for governance, and enforce retention rules based
on that classification.
With retention labels, you can:
Enable people in your organization to apply a retention label manually to content in Outlook on
the web, Outlook 2010 and later, OneDrive, SharePoint, and Office 365 groups. Users often know best
what type of content they're working with, so they can classify it and have the appropriate policy applied.
Apply retention labels to content automatically if it matches specific conditions, such as when the
content contains:
Specific types of sensitive information.
Specific keywords that match a query you create.
The ability to apply retention labels to content automatically is important because:
You don't need to train your users on all of your classifications.
You don't need to rely on users to classify all content correctly.
Users no longer need to know about data governance policies - they can instead focus on their
work.

NOTE
The capability to apply labels automatically requires an Office 365 Enterprise E5 license for each user who has
permissions to edit content that's been automatically labeled in a site or mailbox. Users who simply have read-only
access do not require a license.

Apply a default retention label to a document library in SharePoint and Office 365 group sites, so
that all documents in that library get the default retention label.
Implement records management across Office 365, including both email and documents. You can use
a retention label to classify content as a record. When this happens, the label can't be changed or removed,
and the content can't be edited or deleted.
You create and manage retention labels on the Retention tab on the Labels page in the Office 365 Security &
Compliance Center.
How retention labels work with label policies
Making retention labels available to people in your organization so that they can classify content is a two-step
process: first you create the labels, and then you publish them to the locations you choose. When you publish
retention labels, a label policy gets created.

Retention labels are independent, reusable building blocks that are included in a label policy and published to
different locations. Retention labels can be reused across many policies. The primary purpose of the label policy
is to group a set of retention labels and specify the locations where you want those labels to appear.
1. When you publish retention labels, they're included in a label policy. A single retention label can be
included in many policies.
2. Label policies specify the locations to publish the retention labels.

Only one retention label at a time


It's important to know that content like an email or document can have only a single retention label assigned to it
at a time:
For labels assigned manually by end users, people can remove or change the retention label that's
assigned.
If content has an auto-apply label assigned, an auto-apply label can be replaced by a retention label
assigned manually by an end user.
If content has a retention label assigned manually by an end user, an auto-apply label cannot replace the
manually assigned retention label.
If there are multiple rules that assign an auto-apply label and content meets the conditions of multiple
rules, the retention label for the oldest rule is assigned.
Manually assigned labels are explicitly assigned; auto-apply labels are implicitly assigned; an explicit retention
label takes precedence over an implicit label. For more information, see the below section on The principles of
retention, or what takes precedence?.
All of the information in this section applies only to retention labels. Note that an item of content can also have
one sensitivity label applied to it, in addition to one retention label.

How long it takes for retention labels to take effect


When you publish or auto-apply retention labels, they don't take effect immediately:
1. First the label policy needs to be synced from the Security & Compliance Center to the locations in the
policy.
2. Then the location may require time to make manual labels available to end users or auto-apply labels to
content. How long this takes depends on the location and type of label.
Manual retention labels
If you publish retention labels to SharePoint or OneDrive, it can take one day for those retention labels to appear
for end users. In addition, if you publish retention labels to Exchange, it can take 7 days for those retention labels
to appear for end users, and the mailbox needs to contain at least 10 MB of data.

Auto -apply retention labels


If you auto-apply retention labels to content matching specific conditions, it can take seven days for the retention
labels to be applied to all content that matches the conditions.

How to check on the status of Exchange labels


In Exchange Online, retention labels are made available to end users by a process that runs every seven days. By
using Powershell, you can see when this process last ran and thus determine when it will run again.
1. Connect to Exchange Online PowerShell.
2. Run these commands.

$logProps = Export-MailboxDiagnosticLogs <user> -ExtendedProperties

$xmlprops = [xml]($logProps.MailboxLog)

$xmlprops.Properties.MailboxTable.Property | ? {$_.Name -like "ELC*"}

In the results, the ELCLastSuccessTimeStamp (UTC ) property shows when the system last processed your mailbox.
If it has not happened since the time you created the policy, the labels are not going to appear. To force
processing, run Start-ManagedFolderAssistant -Identity <user> .
If labels aren't appearing in Outlook on the web and you think they should be, make sure to clear the cache in
your browser (CTRL+F5).

Label policies and locations


Different types of retention labels can be published to different locations, depending on what the retention label
does.

IF THE RETENTION LABEL IS… THEN THE LABEL POLICY CAN BE APPLIED TO…

Published to end users Exchange, SharePoint, OneDrive, Office 365 groups

Auto-applied based on sensitive information types Exchange (all mailboxes only), SharePoint, OneDrive

Auto-applied based on a query Exchange, SharePoint, OneDrive, Office 365 groups

Note that in Exchange, auto-apply retention labels (for both queries and sensitive information types) are applied
only to messages newly sent (data in transit), not to all items currently in the mailbox (data at rest). Also, auto-
apply retention labels for sensitive information types can apply only to all mailboxes; you can't select the specific
mailboxes.
Note that Exchange public folders and Skype do not support labels.

How retention labels enforce retention


Retention labels can enforce exactly the same retention actions that a retention policy can. You can use retention
labels to implement a sophisticated content plan (or file plan). For more information on how retention works, see
Overview of retention policies.
In addition, a retention label has two retention options that are available only in a retention label and not in a
retention policy. With a retention label, you can:
Trigger a disposition review at the end of the retention period, so that SharePoint and OneDrive
documents must be reviewed before they can be deleted. For more information, see Overview of
disposition reviews.
Start the retention period from when the content was labeled, instead of the age of the content or when it
was last modified.
Where published retention labels can appear to end users
If your retention label will be assigned to content by end users, you can publish it to:
Outlook on the web
Outlook 2010 and later
OneDrive
SharePoint
Office 365 groups (both the group site and group mailbox in Outlook on the web)
The sections below show how labels will appear in different apps to people in your organization.
Outlook on the web
To label an item in Outlook on the web, right-click the item > Assign policy > choose the retention label.
After the retention label is applied, you can view that retention label and what action it takes at the top of the
item. If an email is classified and has an associated retention period, you can know at a glance when the email will
expire.

You can also apply retention labels to folders, in which case:


All items in the folder automatically get the same retention label, except for items that have had a
retention label applied explicitly to them. Explicitly labeled items keep their existing retention label. For
more information, see the below section on the principles of retention.
If you change or remove the default retention label for a folder, the retention label's also changed or
removed for all items in the folder, except items with explicit retention labels.
If you move an item with a default retention label from one folder to another folder with a different default
retention label, the item will get the new default retention label.
If you move an item with a default retention label from one folder to another folder with no default
retention label, the old default retention label is removed.
Outlook 2010 and later
To label an item in Outlook on the web, right-click the item > on the Ribbon > Assign Policy > choose the
retention label.
After the retention label is applied, you can view that retention label and what action it takes at the top of the
item. If an email is classified and has an associated retention period, you can know at a glance when the email will
expire.
You can also apply retention labels to folders. This works the same in Outlook 2010 and later as it does in
Outlook on the web -- see the previous section for more info.
OneDrive and SharePoint
To label a document (including OneNote files) in OneDrive or SharePoint, select the item > in the upper-right
corner, choose Open the details pane > Apply label > choose the retention label.
Note that you can also apply a retention label to a folder or document set, and you can set a default retention
label for a document library - see the section below for more information.

After a retention label is applied to an item, you can view it in the details pane when that item's selected.
You can also create a view of the library that contains the Labels column or Item is a Record column, so that
you can see at a glance the retention labels assigned to all items and which items are records. Note, however, that
you can't filter the view by the Item is a Record column.
Office 365 groups
When you publish retention labels to an Office 365 group, the retention labels appear in both the group site and
group mailbox in Outlook on the web. The experience of applying a retention label to content is identical to that
shown above for email and documents.

Applying a retention label automatically based on conditions


One of the most powerful features of retention labels is the ability to apply them automatically to content that
matches certain conditions. In this case, people in your organization don't need to apply the retention labels -
Office 365 does the work for them.
Auto-apply retention labels are powerful because:
You don't need to train your users on all of your classifications.
You don't need to rely on users to classify all content correctly.
Users no longer need to know about data governance policies - they can focus on their work.
You can choose to apply retention labels to content automatically when that content contains:
Specific types of sensitive information.
Specific keywords that match a query you create.

Note that auto-apply retention labels require an Office 365 Enterprise E5 subscription, and that it can take up to
seven days for auto-apply retention labels to be applied to all content that matches the conditions, as described
above.
Auto -apply retention labels to content with specific types of sensitive information
When you create auto-apply retention labels for sensitive information, you see the same list of policy templates
as when you create a data loss prevention (DLP ) policy. Each policy template is preconfigured to look for specific
types of sensitive information - for example, the template shown here looks for U.S. ITIN, SSN, and passport
numbers. To learn more about DLP, see Overview of data loss prevention policies.
After you select a policy template, you can add or remove any types of sensitive information, and you can change
the instance count and match accuracy. In the example shown here, a retention label will be auto-applied only
when:
The content contains between 1 and 9 instances of any of these three sensitive information types. You can
delete the max value so that it changes to any.
The type of sensitive information that's detected has a match accuracy (or confidence level) of at least 75.
Many sensitive information types are defined with multiple patterns, where a pattern with a higher match
accuracy requires more evidence to be found (such as keywords, dates, or addresses), while a pattern with
a lower match accuracy requires less evidence. Simply put, the lower the min match accuracy, the easier it
is for content to match the condition.
If you change the match accuracy (or confidence level), you should use one of confidence levels used in a
pattern for that type of sensitive information, as defined in What the sensitive information types look for.
Auto -apply retention labels to content with keywords
You can auto-apply retention labels to content that satisfies certain conditions. The conditions now available
support applying a retention label to content that contains specific words or phrases. You can refine your query
by using search operators like AND, OR, and NOT.
For more information on query syntax, see:
Keyword Query Language (KQL ) syntax reference
Query-based retention labels use the search index to identify content.

Applying a default retention label to all content in a SharePoint library,


folder, or document set
In addition to enabling people to apply a retention label to individual documents, you can also apply a default
retention label to a SharePoint library, folder, or document set, so that all documents in that location get the
default retention label.
For a document library, this is done on the Library settings page for a document library. When you choose the
default retention label, you can also choose to apply it to any existing items in the library.
For example, if you have a tag for marketing materials, and you know a specific document library will contain
only that type of content, you can make the Marketing Materials tag the default for all documents in that library.

If you apply a default retention label to existing items in the library, folder, or document set:
All items in the library, folder, or document set automatically get the same retention label, except for
items that have had a retention label applied explicitly to them. Explicitly labeled items keep their existing
label. For more information, see the below section on The principles of retention, or what takes
precedence?.
If you change or remove the default retention label for a library, folder, or document set, the retention
label's also changed or removed for all items in the library, folder, or document set, except items with
explicit retention labels.
If you move an item with a default retention label from one library, folder, or document set to another
library, folder, or document set, the item keeps its existing default retention label, even if the new location
has a different default retention label.

Applying a retention label to email by using rules


In Outlook 2010 or later, you can create rules to apply a retention label or retention policy.
For example, you can create a rule that applies a specific retention label to all messages sent to or from a specific
distribution group.
To create a rule, right-click an item > Rules > Create Rule > Advanced Options > Rules Wizard > apply
retention policy.
Classifying content without applying any actions
When you create a retention label, you can do so without turning on any retention or other actions, as shown
below. In this case, you can use a retention label simply as a text label, without enforcing any actions.
For example, you can create a retention label named "Review later" with no actions, and then auto-apply that
retention label to content with sensitive information types or queried content.

Using retention labels for records management


At a high level, records management means that:
Important content is classified as a record by users.
A record can't be modified or deleted.
Records are finally disposed of after their stated lifetime is past.
You can use retention labels to implement a single, consistent records-management strategy across Office 365,
whereas other records-management features such as the Record Center apply only to SharePoint content. And
you can enforce retention actions on records, so that they're disposed of automatically at the end of their lifecycle.
When you create a retention label, you have the option to use the retention label to classify the content as a
record.

When an item is labeled as a record, four things happen:


The item can't be permanently deleted.
The item can't be edited.
The label can't be changed.
The label can't be removed.
Who can classify content as a record
For SharePoint content, any user in the default Members group (the Contribute permission level) can apply a
record label to content. Only the site collection administrator can remove or change that retention label after it's
been applied. In addition, a retention label that classifies content as a record needs to be applied manually; it can't
be auto-applied.
Records and folders
You can apply a retention label to a folder in Exchange, SharePoint, or OneDrive. If a folder is labeled as a record,
and you move an item into the folder, the item is labeled as a record. When you move the item out of the folder,
the item will continue to be labeled as a record.
Records can't be deleted
If you attempt to delete a record in Exchange, the item is moved to the Recoverable Items folder as described in
How a retention policy works with content in place.
If you attempt to delete a record in a SharePoint, you see an error that the item wasn't deleted, and the item
remains in the library.

If you attempt to delete a record in OneDrive, the item is moved to the Preservation Hold library as described in
How a retention policy works with content in place.
Using a retention label as a condition in a DLP policy
A retention label can enforce retention actions on content. In addition, you can use a retention label as a
condition in a data loss prevention (DLP ) policy, and the DLP policy can enforce other actions, such as restricting
access, on content that contains a specific label.
For more information, see Using a label as a condition in a DLP policy.

Using the Label Activity Explorer and the data governance reports
After you publish or auto-apply your retention labels, you'll want to verify that they're being applied to content as
you intended. To monitor your retention labels, you can use the:
Label Activity Explorer. With the explorer (shown below ), you can quickly search and view retention
label activity for all content across SharePoint and OneDrive for Business over the past 30 days. For more
information, see View label activity for documents.
Data governance reports. With these reports, you can quickly view retention label trends and activity for
all content across Exchange, SharePoint, and OneDrive for Business over the past 90 days. For more
information, see View the data governance reports.

Using Content Search to find all content with a specific retention label
applied to it
After retention labels are assigned to content, either by users or auto-applied, you can use content search in the
Security & Compliance Center to find all content that's classified with a specific retention label.
When you create a content search, choose the Compliance Tag condition, and then enter the complete label
name or part of the label name and use a wildcard. For more information, see Keyword queries and search
conditions for Content Search.

The principles of retention, or what takes precedence?


It's possible or even likely that content might have several retention policies applied to it, each with a different
action (retain, delete, or both) and retention period. What takes precedence? At the highest level, rest assured that
content being retained by one policy can't be permanently deleted by another policy.

To understand how different labels with retention actions are applied to content, keep these principles of
retention in mind:
1. Retention wins over deletion. Suppose that one retention policy says to delete Exchange email after
three years, but another retention policy says to retain Exchange email for five years and then delete it.
Any content that reaches three years old will be deleted and hidden from the users' view, but still retained
in the Recoverable Items folder until the content reaches five years old, when it will be permanently
deleted.
2. The longest retention period wins. If content's subject to multiple policies that retain content, it will be
retained until the end of the longest retention period.
3. Explicit inclusion wins over implicit inclusion. This means:
a. If a retention label with retention settings is manually assigned by a user to an item, such as an
Exchange email or OneDrive document, that retention label takes precedence over both a policy
assigned at the site or mailbox level and a default retention label assigned by the document library.
For example, if the explicit retention label says to retain for ten years, but the retention policy
assigned to the site says to retain for only five years, the retention label takes precedence. Note that
auto-apply retention labels are considered implicit, not explicit, because they're applied
automatically by Office 365.
b. If a retention policy includes a specific location, such as a specific user's mailbox or OneDrive for
Business account, that policy takes precedence over another retention policy that applies to all
users' mailboxes or OneDrive for Business accounts but doesn't specifically include that user's
mailbox.
4. The shortest deletion period wins. Similarly, if content's subject to multiple policies that delete content
(with no retention), it will be deleted at the end of the shortest retention period.

Understand that the principles of retention work as a tie-breaking flow from top to bottom: If the rules applied by
all policies or labels are the same at one level, the flow moves down to the next level to determine precedence for
which rule is applied.
Finally, a retention policy or label cannot permanently delete any content that's on hold for eDiscovery. When the
hold is released, the content again becomes eligible for the cleanup process described above.
Use retention labels instead of these features
Retention labels can easily be made available to an entire organization and its content across Office 365,
including Exchange, SharePoint, OneDrive, and Office 365 groups. If you need to classify content or manage
records anywhere in Office 365, we recommend that you use retention labels.
There are several other features that have previously been used to classify content or manage records in Office
365. These are listed below. These features will continue to work side by side with retention labels created in the
Security & Compliance Center. Note that while there are instances where the implementation of retention labels
differs from previous features, the evolution of retention labels will drive the future of records management
across Office 365. Therefore, moving forward, for data governance, we recommend that you use retention labels
instead of these features.
Exchange Online
Retention tags and retention policies, also known as messaging records management (MRM ) (Deletion only)
SharePoint Online and OneDrive for Business
Configuring in place records management (Retention)
Introduction to the Records Center (Retention)
Information management policies (Deletion only)

Permissions
Members of your compliance team who will create retention labels need permissions to the Security &
Compliance Center. By default, your tenant admin will have access to this location and can give compliance
officers and other people access to the Security & Compliance Center, without giving them all of the permissions
of a tenant admin. To do this, we recommend that you go to the Permissions page of the Security & Compliance
Center, edit the Compliance Administrator role group, and add members to that role group.
For more information, see Give users access to the Office 365 Security & Compliance Center.
These permissions are required only to create and apply retention labels and a label policy. Policy enforcement
does not require access to the content.

Find the PowerShell cmdlets for labels


To use the label cmdlets, you need to:
1. Connect to the Office 365 Security & Compliance Center Powershell
2. Use these Office 365 Security & Compliance Center cmdlets:
Get-ComplianceTag
New -ComplianceTag
Remove-ComplianceTag
Set-ComplianceTag
Enable-ComplianceTagStorage
Get-ComplianceTagStorage
Get-RetentionCompliancePolicy
New -RetentionCompliancePolicy
Remove-RetentionCompliancePolicy
Set-RetentionCompliancePolicy
Get-RetentionComplianceRule
New -RetentionComplianceRule
Remove-RetentionComplianceRule
Set-RetentionComplianceRule

More information
Overview of retention policies
Overview of disposition reviews
8/24/2018 • 4 minutes to read • Edit Online

When content reaches the end of its retention period, there are several reasons why you might want to review that
content to decide whether it can be safely deleted ("disposed"). For example, you might need to:
Suspend the deletion ("disposition") of relevant content in the event of litigation or an audit.
Remove content from the disposition list to store in an archive, if that content has research or historical
value.
Assign a different retention period to the content, if the original policy was a temporary or provisional
solution.
Return the content to clients or transfer it to another organization.
When you create a label that retains content in Office 365, you can choose to trigger a disposition review at the
end of the retention period. In a disposition review:
The people you choose receive an email notification that they have content to review. These reviewers can
be individual users, distribution or security groups, or Office 365 groups. Note that notifications are sent on
a weekly basis.
The reviewers go to the Disposition page in the Security & Compliance Center to review the content.
For each document, the reviewer can:
Apply a different label.
Extend its retention period.
Permanently delete it.
Reviewers can view either pending or historical dispositions, and export that list as a .csv file.
Note that disposition reviews require an Office 365 Enterprise E5 subscription.
A disposition review can include content in Exchange mailboxes, SharePoint sites, OneDrive accounts, and Office
365 groups. Content awaiting a disposition review in those locations is deleted only after a reviewer chooses to
permanently delete the content.
Setting up the disposition review by creating a label
This is the basic workflow for setting up a disposition review. Note that this flow shows a label being published and
then manually applied by a user; alternatively, a label that triggers a disposition review can be auto-applied to
content.

A disposition review is an option when you create a label in Office 365. Note that this option is not available in a
retention policy but only in a label with retention settings.
For more information about labels, see Overview of labels.
Disposing content
When a reviewer is notified by email that content is ready to review, they can go to the Disposition page in the
Security & Compliance Center and select one or more items. The reviewer can then:
Apply a different label.
Extend the retention period.
Permanently delete the item.
A reviewer can use the link to view the document in its original location, if the reviewer has permissions for that
location. During a disposition review, the content never moves from its original location, and it's never deleted until
the reviewer chooses to do so.
Note that the email notifications are sent automatically to reviewers on a weekly basis. Therefore, when content
reaches the end of its retention period, it may take up to seven days for reviewers to receive the email notification
that content is awaiting disposition.
Also note that all disposition actions are audited. To ensure this, you must turn on auditing at least one day prior to
the first disposition action - for more information, see Search the audit log in the Office 365 Security &
Compliance Center.
Permissions for disposition
To get access to the Disposition page, reviewers must be members of the Disposition Management role and
the View-Only Audit Logs role. We recommend creating a new role group called Disposition Reviewers, adding
these two roles to that role group, and then adding members to the role group.
For more information, see Give users access to the Office 365 Security & Compliance Center

How long until disposed content is permanently deleted


Content awaiting a disposition review is deleted only after a reviewer chooses to permanently delete the content.
When the reviewer chooses this option, the content in the SharePoint site or OneDrive account becomes eligible
for the standard cleanup process described in this section: How a retention policy works with content in place.
This means that:
Content in a document library will be moved to the first-stage Recycle Bin within 7 days of disposition, and
then permanently deleted 93 days after that. The Recycle Bin is not indexed by search and therefore its
contents are not available to an eDiscovery hold.
Content in the Preservation Hold library will be permanently deleted within 7 days of disposition.

View pending and completed dispositions


On the Disposition page of the Security & Compliance Center, you can view both pending and completed
dispositions:
Pending dispositions have reached the end of their retention period and require a disposition review. After
reviewing each item, decide if you want to apply a different label to it, extend its retention period, or
permanently delete it.
Completed dispositions were approved for deletion during a disposition review and are now in the process
of being permanently deleted. Items that had a different label applied or their retention period extended as
part of a review won't appear here.
Filter the disposition views
You can filter these views by label or time range. For pending dispositions, the time range is based on the expiry
date. For historical dispositions, the time range is based on the deletion date.

Export the disposition items


In addition, you can export the items in either view as a .csv file that you can open in Excel.
Overview of event-driven retention
10/12/2018 • 9 minutes to read • Edit Online

When you retain content, the retention period is often based on the age of the content - for example, you might
retain documents for seven years after they're created and then delete them. But with labels in Office 365, you can
also base a retention period on when a specific type of event occurs. The event triggers the start of the retention
period, and all content with a label applied for that type of event get the label's retention actions enforced on them.
For example, you can use labels with event-driven retention for:
Employees leaving the organization Suppose that employee records must be retained for 10 years from
the time an employee leaves the organization. After 10 years elapse, all documents related to the hiring,
performance, and termination of that employee need to be disposed. The event that triggers the 10-year
retention period is the employee leaving the organization.
Contract expiration Suppose that all records related to contracts need to be retained for five years from
the time the contract expires. The event that triggers the five-year retention period is the expiration of the
contract.
Product lifetime Your organization might have retention requirements related to the last manufacturing
date of products for content such as technical specifications. In this case, the last manufacturing date is the
event that triggers the retention period.
Event-driven retention is typically used as part of a records-management process. This means that:
Labels based on events also usually classify content as a record. For more information, see Using Content
Search to find all content with a specific retention label applied to it.
A document that's been declared as a record but whose event trigger has not yet happened is retained
indefinitely (records can't be permanently deleted), until an event triggers that document's retention period.
Labels based on events usually trigger a disposition review at the end of the retention period, so that a
records manager can manually review and dispose the content. For more information, see Overview of
disposition reviews.
A label based on an event has the same capabilities as any label in Office 365. To learn more, see Overview of
labels.

Understanding the relationship between event types, labels, events,


and asset IDs
To successfully use event-driven retention, it's important to understand the relationship between event types,
labels, events, and asset IDs as illustrated here. An explanation follows the diagram.
1. You create labels for different types of content and then associate them with a type of event. For example,
labels for different types of product files and records are associated with an event type named Product
Lifetime because those records must be retained for 10 years from the time the product reaches its end of
life.
2. Users (typically records managers) apply those labels to content and (for SharePoint and OneDrive
documents) enter an asset ID for each item. In this example, the asset ID is a product name or code used by
the organization. Thus, each product's records are assigned a label, and each record has a property that
contains an asset ID. The diagram represents all of the content for all product records in an organization,
and each item bears the asset ID of the product whose record it is.
3. Product Lifetime is the event type; a specific product reaching end of life is an event. When an event of that
event type occurs - in this case, when a product reaches its end of life - you create an event that specifies:
An asset ID (for SharePoint and OneDrive documents)
Keywords (for Exchange items). In this example, the organization uses a product code in messages
containing product records, so the keyword for Exchange items is the same as the asset ID for SharePoint
and OneDrive documents.
The date when the event occurred. This date is used as the start of the retention period. This date can only
be the current or a future date, not a past date.
4. After you create an event, that event date is synced to all of the content that has a label of that event type and
that contains the specified asset ID or keyword. Like any label, this syncing can take up to 7 days. In the diagram
above, all of the items circled in red have their retention period triggered by this event - in other words, when
this product reaches its end of life, that event triggers the retention period for that product's records.
It's important to understand that if you don't specify an asset ID or keywords for an event, all of the content with
a label of that event type will have its retention period triggered by the event. This means that in the diagram
above, all of the content would start being retained. This may not be what you intend.
Finally, remember that each label has its own retention settings. In this example, they all specify 10 years, but it's
possible for an event to trigger labels where each label has a different retention period.

How to set up event-driven retention


Here's the high-level workflow for event-driven retention. More detailed steps follow below.

Step 1: Create a label whose retention period is based on an event


In the Security & Compliance Center, in the left navigation, under Classifications, choose Labels > Create a
label.
When you create the label, turn on retention, and then choose the option shown below to retain or delete the
content based on an event. This means that the retention settings won't go into effect until Step 5, when you create
an event on the Events page.
Note that event-driven retention is typically used for content that's classified as a record. For this reason, when you
create labels based on an event, you typically choose the option to Use label to classify content as a "Record".
Also note that event-driven retention requires retention settings that:
Retain the content.
Delete the content automatically or trigger a disposition review at the end of the retention period.
Step 2: Choose an event type for that label
In the label settings, after you choose the option to base the label on an event, you'll see the option to Choose an
event type. An event type is simply a general description of an event that you want to associate a label with.
For example, if you create an event type named Product Lifetime, you'll create event-based labels with names that
describe what types of content you want the labels to be applied to, such as "Product development files" or
"Product business decision records".
Note that once you choose an event type and create the label, the event type cannot be changed.
Step 3: Publish or auto -apply the label
Just like any label, you need to publish or auto-apply an event-based label, so that it's manually or automatically
applied to content. Do this on the Labels page. Note that labels that classify content as a record can only be
published and manually applied to content; they can't be auto-applied to content.

Step 4: Enter an asset ID


After an event-driven label is applied to content, you can enter an asset ID for each item. For example, your
organization might use:
Product codes that you can use to retain content for only a specific product.
Project codes that you can use to retain content for only a specific project.
Employee IDs that you can use to retain content for only a specific person.
Understand that Asset ID is simply another document property in SharePoint and OneDrive for Business. Your
organization may already use other document properties and IDs to classify content. If so, you can also use those
properties and values when you create an event - see Step 6 below. The important point is that your organization
must use some property:value combination in the document properties to associate that item with an event type.

Step 5: Create an event


When a particular instance of that event type occurs - for example, a product reaches its end of life - go to the
Events page in the Security & Compliance Center and create an event. You need to manually trigger an event by
creating it.
Step 6: Choose the same event type used by the label in step 2
When you create the event, choose the same event type used by the label in step 2 - for example, Product Lifetime.
Only content with labels applied to it of that event type will have its retention period triggered.

Step 7: Enter keywords or an asset ID


Now you narrow the scope of the content by specifying asset IDs for SharePoint and OneDrive content or
keywords for Exchange content. For asset IDs, retention will be enforced only on content with the specified
property:value pair. If an asset ID is not entered, all of the content with labels of that event type get the same
retention date applied to them.
Understand that Asset ID is simply another document property in SharePoint and OneDrive for Business. If you're
using the Asset ID property, you would enter ComplianceAssetID:<value> in the box for asset IDs shown below.
Your organization might have applied other properties and IDs to the documents related to this event type. For
example, if you need to detect a specific product's records, the ID might be a combination of your custom property
ProductID and the value "XYZ". In this case, you'd enter ProductID:XYZ in the box for asset IDs shown below.
For Exchange items, you can include keywords. You can refine your query by using search operators like AND, OR,
and NOT. For more information on operators, see Keyword queries and search conditions for Content Search.
Finally, choose the date when the event occurred; this date is used as the start of the retention period. After you
create an event, that event date is synced to all of the content with a label of that event type, asset ID, and
keywords. Like any label, this syncing can take up to 7 days.
Use Content Search to find all content with a specific label or asset ID
After labels are assigned to content, you can use content search in the Security & Compliance Center to find all
content that's classified with a specific label or that contains a specific asset ID.
When you create a content search:
To find all content with a specific label, choose the Compliance Tag condition, and then enter the complete
label name or part of the label name and use a wildcard.
To find all content with a specific asset ID, enter the ComplianceAssetID property and a value, like
ComplianceAssetID:<value>.
For more information, see Keyword queries and search conditions for Content Search.

Permissions
To get access to the Events page, reviewers must be members of a role group with the Disposition Management
role and the View-Only Audit Logs role. We recommend creating a new role group called Disposition Reviewers,
adding these two roles to that role group, and then adding members to the role group.
For more information, see Give users access to the Office 365 Security & Compliance Center.

Automate events by using PowerShell


In the Office 365 Security & Compliance Center, you can only create events manually; it's not possible to
automatically trigger an event when it occurs. However, you can use a PowerShell script to automate event-based
retention from your business applications.
We are currently working on APIs, so that you can connect your business applications (such as HR, CRM, or
financial applications) to event-driven retention. For example, you'll be able to connect your HR system to event-
driven retention, so that when an employee leaves the organization, and event of that event type is automatically
triggered.
Until then, here are the PowerShell cmdlets available for event-driven retention:
Get-ComplianceRetentionEventType
New -ComplianceRetentionEventType
Remove-ComplianceRetentionEventType
Set-ComplianceRetentionEventType
Get-ComplianceRetentionEvent
New -ComplianceRetentionEvent
Overview of file plan manager
9/25/2018 • 2 minutes to read • Edit Online

File plan manager provides advanced management capabilities for retention labels and policies, and provides an
integrated way to traverse label and label-to-content activity for your entire content lifecycle – from creation,
through collaboration, record declaration, retention, and finally disposition.

Important: This feature is currently available only as part of the Office


365 Preview program
You will see this feature in your tenant only if your organization has enrolled in the Office 365 Preview program.

Accessing file plan manager


There are two requirements to access file plan manager, they are:
An Office 365 Enterprise E5 subscription.
The user has been in assigned one of the following roles of the Security & Compliance Center:
Retention Manager
View -only Retention Manager

Navigating your file plan


File plan manager makes it easier see into and across the settings of all your retention labels and policies from one
view.
Note that retention labels created outside of the file plan will be available in the file plan and vice versa.
On the file plan labels tab, the following additional information and capabilities are available:
Label settings columns
Based on identifies the type of trigger that will start the retention period. Valid values are:
Event
When created
When last modified
When labeled
Record identifies if the item will become a declared record when the label is applied. Valid values are:
No
Yes
Yes(Regulatory)
Retention identifies the retention type. Valid values are:
Keep
Keep and delete
Delete
Disposition identifies what will happen to the content at the end of the retention period. Valid values are:
null
No action
Auto-delete
Review required (aka Disposition review )

Label file plan descriptors columns


You can now include more information in the configuration of your retention labels. Inserting file plan descriptors
into labels will improve the manageability and organization of your file plan.
To get you started, file plan manager provides some out-of-box values for: Function/department, Category,
Authority type and Provision/citation. You can add new file plan descriptor values when creating or editing a
retention label.
Here's a view of the file plan descriptors step when creating or editing a retention label.
Here's a view of the file plan descriptors columns on the labels tab of file plan manager.

Export labels out of your file plan


From file plan manager, you can export the details of all retention labels into a .csv file to assist you in facilitating
periodic compliance reviews with data governance stakeholders in your organization.
To export all retention labels, go to file plan manager > file plan actions > export labels.
A *.csv file containing all existing retention labels will open.

Import labels into your file plan


From file plan manager, you can bulk import new labels as well as modify existing retention labels.
To import new retention labels and make updates existing retention labels, go to file plan manager > file plan
actions > import labels.
Download a blank template (or start from an export of your current file plan).

Fill-out the template (coming soon is reference information about valid values for entries).

Upload the filled-out template, and file plan manager will validate the entries and display import statistics.
When the import is complete, return to file plan manager to assign new labels to new or existing policies.
Overview of inactive mailboxes in Office 365
8/21/2018 • 10 minutes to read • Edit Online

Your organization might need to retain former employees' email after they leave the organization. Depending on
your organization's retention requirements, you might need to retain mailbox content for a few months or years
after employment ends, or you might need to retain mailbox content indefinitely. Regardless of how long you need
to retain email, you can create inactive mailboxes in Office 365 to retain the mailbox of former employees.

What are inactive mailboxes?


When an employee leaves your organization (or goes on an extended leave of absence), you can remove their
Office 365 account. The employee's mailbox data is retained for 30 days after the account is removed. During this
period, you can still recover the mailbox data by undeleting the account. After 30 days, the data is permanently
removed.
But if your organization needs to retain mailbox content for former employees, you can turn the mailbox into an
inactive mailbox by placing the mailbox on Litigation Hold or applying an Office 365 retention policy to the
mailbox in the Office 365 Security & Compliance Center and then removing the corresponding Office 365
account. The contents of an inactive mailbox are retained for the duration of the Litigation Hold placed on the
mailbox or the retention period of the Office 365 retention policy applied to it before the mailbox was deleted. You
can still recover the corresponding user account for a 30-day period. However, after 30 days, the inactive mailbox
is retained in Office 365 until the hold or retention policy is removed.
IMPORTANT: We've postponed the July 1, 2017 deadline for creating new In-Place Holds to make a mailbox
inactive. But later this year or early next year, you won't be able to create new In-Place Holds in Exchange Online.
At that time, only Litigation Holds and Office 365 retention policies can be used to create an inactive mailbox.
However, existing inactive mailboxes that are on In-Place Hold will still be supported, and you can continue to
manage the In-Place Holds on inactive mailboxes. This includes changing the duration of an In-Place Hold and
permanently deleting an inactive mailbox by removing the In-Place Hold.

Inactive mailboxes and Office 365 retention policies


In addition to Litigation Hold, using the new Office 365 retention policy feature in the Security & Compliance
Center is another way to make a mailbox inactive. To use a retention policy to make an inactive mailbox:
It has to be applied to Exchange mailboxes or Skype for Business locations (because Skype-related content
is stored in the user's mailbox).
It has to be configured to retain content or retain and then deleted content. If a retention policy is
configured to just delete content, a mailbox that the policy is applied to won't become inactive when the
mailbox is deleted.
It can be query-based so that it retains only items that match a search query.
For more information about configuring Office 365 retention policies, see Overview of retention policies in Office
365.
If you use an Office 365 retention policy to make an inactive mailbox, Office 365 will continue to process the
retention policy on the inactive mailbox. This means if the retention policy is configured to retain and then delete
content, items will be moved to the Recoverable Items folder when the retention duration expires, and then
eventually purged from the inactive mailbox. If the Office 365 retention policy isn't configured to deleted items,
then items that haven't been permanently deleted by the user (before the mailbox was made inactive) won't be
moved to the Recoverable Items folder and will be retained indefinitely after the mailbox becomes inactive.
You might consider creating an Office 365 retention policy specifically for inactive mailboxes. Here are some
reasons for doing this and things to keep in mind.
You can configure the retention policy to retain mailbox content only as long as necessary to meet your
organization's requirement for former employees.
It's an easy way to identify inactive mailboxes because the retention policy will only be applied to inactive
mailboxes.
You'll be able to easily identify the retention policy that's assigned to inactive mailboxes in your
organization. This will make it easier to change the retention (or deletion) settings if necessary. It will also
make it easier to permanently delete an inactive mailbox because you can just remove it from the policy by
using the Security & Compliance Center. Otherwise, you have to use Exchange Online PowerShell to
remove a Litigation Hold from an inactive mailbox or use Security & Compliance Center PowerShell to
exclude an inactive mailbox from an organization-wide Office 365 retention policy.
If you create an Office 365 retention policy specifically for inactive mailboxes, you can add a maximum of
1,000 mailboxes to the policy. If you're a very large organization, you might have to create more than one
Office 365 retention policy to use for inactive mailboxes.

Inactive mailboxes and eDiscovery case holds


If a hold that's associated with an eDiscovery case in the Security & Compliance Center is placed on a mailbox and
then the mailbox or the user's Office 365 account is deleted, the mailbox will become an inactive mailbox.
However, we don't recommend using eDiscovery case holds to make a mailbox inactive. That's because
eDiscovery cases are intended for specific, time-bound cases related to a legal issue. At some point, a legal case
will probably end and the holds associated with the case will be removed and the eDiscovery case will be closed.
In fact, if a hold that's placed on an inactive mailbox is associated with an eDiscovery case, and then the hold is
released or the eDiscovery case is closed (or deleted), the inactive mailbox will be permanently deleted.
Additionally, you can't create a time-based eDiscovery hold. That's means content in an inactive mailbox will be
retained forever or until the hold is removed and the inactive mailbox is deleted. Therefore, we recommend using
a Litigation Hold or an Office 365 retention policy for inactive mailboxes.
For more information about eDiscovery cases and holds, see eDiscovery cases in the Office 365 Security &
Compliance Center.

Inactive mailboxes and Office 365 labels


Labels in Office 365 help you classify email data in your organization for governance, and enforce retention rules
based on that classification. A label can be applied to an email item either manually by users or automatically by
administrators, and an email item can only have single label assigned to it. If a single email item in a user's
mailbox has a label assigned to it and the mailbox or the user's Office 365 account is deleted, the mailbox will
become an inactive mailbox. Similar to eDiscovery case holds, we don't recommend using labels to make a
mailbox inactive. Instead, we recommend that you use a Litigation Hold or an Office 365 retention policy. Be
aware that in the case of labels, you might not realize that a label has been applied to an email item and then
inadvertently make an inactive mailbox when you delete the user's account.
For more information about labels, see Overview of labels in Office 365.

Inactive mailboxes and Exchange MRM retention policies


If an Exchange retention policy (the Messaging Records Management, or MRM, feature in Exchange Online) was
applied to mailbox when it was made inactive, any deletion policies (which are retention tags configured with a
Delete retention action) will continue to be processed on the inactive mailbox. That means items that are tagged
with a deletion policy will be moved to the Recoverable Items folder when the retention period expires. Those
items are purged from the inactive mailbox when the hold duration expires. If a hold duration isn't specified for the
inactive mailbox, items in the Recover Items folder will be retained indefinitely.
Conversely, any archive policies (which are retention tags configured with a MoveToArchive retention action)
that are included in the retention policy assigned to an inactive mailbox are ignored. That means items in an
inactive mailbox that are tagged with an archive policy will remain in the primary mailbox when the retention
period expires. They're not moved to the archive mailbox or to the Recoverable Items folder in the archive
mailbox. They will be retained indefinitely.

Creating an inactive mailbox


To make a mailbox inactive, it must be assigned an Exchange Online (Plan 2) license so that a Litigation Hold or
Office 365 retention policy can be applied to the mailbox before it's deleted. After the mailbox is deleted, the
Exchange Online license that was associated with it will be available to assign to a new user. Inactive mailboxes
don't require ongoing licenses.
The following table summarizes the process of making an inactive mailbox for different retention scenarios. For
more information, see Manage inactive mailboxes in Office 365.

TO… DO THIS... RESULT

Retain mailbox content indefinitely after Place the mailbox on Litigation Hold or All content in the inactive mailbox,
an employee leaves the organization apply an Office 365 retention policy to including items in the Recoverable
the mailbox. Items folder, is retained indefinitely.
Don't specify a hold duration for the
Litigation Hold or don't configure the
Office 365 retention policy to delete
items; alternatively you can use a
retention policy that retains items
forever.
Remove the user's Office 365 account.

Retain mailbox content for a specific Apply an Office 365 retention policy to When the retention period for a
period after an employee leaves the the mailbox. mailbox item expires, the item is moved
organization and then delete it Configure the retention policy to retain to the Recoverable Items folder and
and then delete items when the then it's permanently deleted (purged)
retention period expires. from the inactive mailbox when the
Remove the user's Office 365 account. deleted item retention period (for
Exchange mailboxes) expires. The
retention period of the Office 365
retention policy can be configured
based on the original date a mailbox
item was received or created, or when it
was last modified.

NOTE: If a Litigation Hold is already placed on a mailbox, or if an Office 365 retention policy is already applied to
it, then all you have to do is delete the corresponding Office 365 user account to create an inactive mailbox.

Managing inactive mailboxes


After you make a mailbox inactive, you can perform various management tasks on inactive mailboxes.
Change the hold duration for an inactive mailbox After a mailbox is made inactive, you can change the
hold duration of the Litigation Hold or Office 365 retention policy applied to the inactive mailbox. For step-
by-step procedures, see Change the hold duration for an inactive mailbox in Office 365.
Recover an inactive mailbox If a former employee (or an employee on a leave of absence) returns to
your organization, or if a new employee is hired to take on the job responsibilities of the former employee,
you can recover the contents of the inactive mailbox. When you recover an inactive mailbox, the mailbox is
converted to a new mailbox, the contents and folder structure of the inactive mailbox are retained, and the
mailbox is linked to a new user account. After it's recovered, the inactive mailbox no longer exists. For step-
by-step procedures and information about what happens when you recover an inactive mailbox, see
Recover an inactive mailbox in Office 365.
Restore an inactive mailbox If another employee takes on the job responsibilities of a former employee,
or if another person needs access to the contents of the inactive mailbox, you can restore (or merge) the
contents of the inactive mailbox to an existing mailbox. When you restore an inactive mailbox, the contents
are copied to another mailbox. The inactive mailbox is retained and remains an inactive mailbox. The
inactive mailbox can still be searched using eDiscovery tools, its contents can be restored to another
mailbox, and it can be recovered or deleted at a later date. For step-by-step procedures, see Restore an
inactive mailbox in Office 365.
Delete an inactive mailbox When you no longer need to retain the contents of an inactive mailbox, you
can permanently delete it by removing all holds or Office 365 retention policies applied to the inactive
mailbox. If a mailbox was made inactive more than 30 days ago, it will be marked for permanent deletion
after you remove the hold. If the mailbox was made inactive within the last 30 days, you can make it active
again after removing the hold or retention policy. For step-by-step procedures, see Delete an inactive
mailbox in Office 365.
Create and manage inactive mailboxes in Office 365
8/21/2018 • 9 minutes to read • Edit Online

Office 365 makes it possible for you to retain the contents of deleted mailboxes. This feature is called inactive
mailboxes. Inactive mailboxes allow you to retain former employees' email after they leave your organization. A
mailbox becomes inactive when a Litigation Hold or an Office 365 retention policy (created in the Office 365
Security & Compliance Center) is applied to the mailbox before the corresponding Office 365 user account is
deleted. The contents of an inactive mailbox are retained for the duration of the hold that was placed on the
mailbox before it was made inactive. This allows administrators, compliance officers, and records managers to use
Content Search in the Security & Compliance Center to search and export the contents of an inactive mailbox.
Inactive mailboxes can't receive email and aren't displayed in your organization's shared address book or other
lists.

NOTE
We've postponed the July 1, 2017 deadline for creating new In-Place Holds to make a mailbox inactive. But later this year or
early next year, you won't be able to create new In-Place Holds in Exchange Online. At that time, only Litigation Holds and
Office 365 retention policies can be used to create an inactive mailbox. However, existing inactive mailboxes that are on In-
Place Hold will still be supported, and you can continue to manage the In-Place Holds on inactive mailboxes. This includes
changing the duration of an In-Place Hold and permanently deleting an inactive mailbox by removing the In-Place Hold.

Before you begin


To make a mailbox inactive, it must be assigned an Exchange Online Plan 2 license so that a Litigation Hold
or an Office 365 retention policy can be applied to the mailbox before it's deleted. Exchange Online Plan 2
licenses are part of an Office 365 Enterprise E3 and E5 subscriptions. If a mailbox is assigned an Exchange
Online Plan 1 license (which is part of an Office 365 Enterprise E1 subscription), you would have to assign
it a separate Exchange Online Archiving license so that a hold can be applied to the mailbox before it's
deleted. For more information, see Exchange Online Archiving.
The license associated with the deleted Exchange Online mailbox will be available after you delete the
corresponding Office 365 user account. You can then Assign licenses to users in Office 365 for business to
another user.
If a Litigation Hold or an Office 365 retention policy isn't applied to a mailbox before it's deleted, the
contents of the mailbox won't be retained or discoverable. However, the deleted mailbox can be recovered
within 30 days of deletion, but the mailbox and its contents will be permanently deleted after 30 days if it
isn't recovered.
For more information about Litigation Hold, see In-Place Hold and Litigation Hold. For more information
about Office 365 retention policies in the Security & Compliance Center, see Overview of retention policies
in Office 365.

Create an inactive mailbox


Making a mailbox inactive involves two steps: 1) placing the mailbox on Litigation Hold or applying an Office 365
retention policy to it, and 2) deleting the mailbox or corresponding Office 365 user account. After the mailbox is
inactive, its contents are retained until the hold or retention policy is removed.
Step 1: Place a mailbox on Litigation Hold or apply an Office 365 retention policy
Placing a mailbox on Litigation Hold or applying an Office 365 retention policy retains the contents in the mailbox
before it's deleted. Both types of holds will retain all mailbox content, including deleted items and original versions
of modified items. Deleted and modified items are retained in the inactive mailbox for a specified period, or until
you permanently delete the inactive mailbox by removing the hold or retention policy that's applied to the inactive
mailbox.
If a hold is already placed on a mailbox, or if an Office 365 retention policy is already applied to a mailbox, then all
you have to do is delete the corresponding Office 365 user account as explained in Step 2.
For step-by-step procedures for placing a mailbox on Litigation Hold or applying an Office 365 retention policy,
see:
Place a mailbox on Litigation Hold
Overview of retention policies in Office 365

NOTE
For Litigation Holds and Office 365 retention policies, you can create an indefinite hold or on a time-based hold. In an
indefinite hold, the contents of the inactive mailbox will be retained forever, or until the hold is removed or until the hold
duration is changed. After the hold or retention policy is removed (assuming that the mailbox was deleted more than 30
days ago), the inactive mailbox will be marked for permanent deletion and the contents of the mailbox will no longer be
retained or discoverable. In a time-based hold or Office 365 retention policy, you specify the duration of the hold. This
duration is on a per-item basis and is calculated from the date a mailbox item was received or created. After the hold expires
for a mailbox item, and that item moved to or is located in the Recoverable Items folder in the inactive mailbox, the item is
permanently deleted (purged) from the inactive mailbox after the deleted item retention period expires.

Step 2: Delete the mailbox


After the mailbox is placed on hold or an Office 365 retention policy is applied to it, the next step is to delete the
mailbox. The best way to delete a mailbox is to delete the corresponding Office 365 user account in the Office 365
admin center. For information about deleting Office 365 user accounts, see Delete a user from your organization.

NOTE
You can also delete the mailbox by using the Remove-Mailbox cmdlet in Exchange Online PowerShell. For more
information, see Delete or restore user mailboxes in Exchange Online.

View a list of inactive mailboxes


To view a list of the inactive mailboxes in your organization:
1. Go to https://protection.office.com/ and sign in using the credentials for an administrator account in your
Office 365 organization.
2. In the left pane of the Security & Compliance Center, click Data governance > ** Retention **.
3. On the Retention page, click More , and then click Inactive mailboxes.
The Inactive mailboxes page is displayed. Note the total number of inactive mailboxes in your
organization is displayed.

Alternatively, you can run the following command in Exchange Online PowerShell to display the list of inactive
mailboxes.

Get-Mailbox -InactiveMailboxOnly | FT DisplayName,PrimarySMTPAddress,WhenSoftDeleted

You can click Export to view or download a CSV file that contains additional information about the inactive
mailboxes in your organization.
You can also run the following command to export the list of inactive mailboxes and other information to a CSV
file. In this example, the CSV file is created in the current directory.
Get-Mailbox -InactiveMailboxOnly | Select
Displayname,PrimarySMTPAddress,DistinguishedName,ExchangeGuid,WhenSoftDeleted | Export-Csv
InactiveMailboxes.csv -NoType

NOTE
It's possible that an inactive mailbox may have the same SMTP address as an active user mailbox. In this case, the value of
the DistinguishedName or ExchangeGuid property can be used to uniquely identify an inactive mailbox.

Search and export the contents of an inactive mailbox


You can access the contents of the inactive mailbox by using the Content Search tool in the Security &
Compliance Center. When you search an inactive mailbox, you can create a keyword search query to search for
specific items or you can return the entire contents of the inactive mailbox. You can preview the search results or
export the search results to an Outlook Data (PST) file or as individual email messages. For step-by-step
procedures for searching mailboxes and exporting search results, see the following topics:
Content Search in Office 365
Export Content Search results from the Office 365 Security & Compliance Center
Here are a few things to keep in mind when searching inactive mailboxes.
If a content search includes a user mailbox and that mailbox is then made inactive, the content search will
continue to search the inactive mailbox when you re-run the search after it becomes inactive.
In some cases, a user may have an active mailbox and an inactive mailbox that have the same SMTP
address. In this case, only the specific mailbox that you select as a location for a content search will be
searched. In other words, if you add a user's mailbox to a search, you can't assume that both their active
and inactive mailboxes will be searched; only the mailbox that you explicitly add to the search will be
searched.
We strongly recommend that you avoid having an active mailbox and inactive mailbox with the same
SMTP address. If you need to reuse the SMTP address that is currently assigned to an inactive mailbox, we
recommend that you recover the inactive mailbox or restore the contents of an inactive mailbox to an active
mailbox (or the archive of an active mailbox), and then delete the inactive mailbox.

Change the hold duration for an inactive mailbox


After a mailbox is made inactive, you can change the duration of the hold or the Office 365 retention policy
applied to the inactive mailbox. For step-by-step procedures, see Change the hold duration for an inactive mailbox
in Office 365.

Recover an inactive mailbox


If a former employee returns to your organization, or if a new employee is hired to take on the job responsibilities
of the departed employee, you can recover the contents of the inactive mailbox. When you recover an inactive
mailbox, the mailbox is converted to a new mailbox, the contents and folder structure of the inactive mailbox are
retained, and the mailbox is linked to a new user account. After it's recovered, the inactive mailbox no longer
exists. For step-by-step procedures and more information about happens when you recover an inactive mailbox,
see Recover an inactive mailbox in Office 365.
Managing inactive mailboxes
Restore the contents of an inactive mailbox to another mailbox
If another employee takes on the job responsibilities of a former employee, or if another person needs access to
the contents of the inactive mailbox, you can restore (or merge) the contents of the inactive mailbox to an existing
mailbox. When you restore an inactive mailbox, the contents are copied to another mailbox. The inactive mailbox
is retained and remains an inactive mailbox. The inactive mailbox can still be searched using eDiscovery, its
contents can be restored to another mailbox, or it can be recovered or deleted at a later date. For step-by-step
procedures, see Restore an inactive mailbox in Office 365.

Delete an inactive mailbox


If you no longer need to retain the contents of an inactive mailbox, you can permanently delete the inactive
mailbox by removing the hold or removing the Office 365 retention policy applied to the inactive mailbox. If the
mailbox was deleted more than 30 days ago, the mailbox will be marked for permanent deletion after you remove
the hold, and the mailbox will become non-recoverable. If the mailbox was deleted within the last 30 days, you can
still recover the mailbox after removing the hold or retention policy. For step-by-step procedures for removing a
hold or a Office 365 retention policy to permanently delete an inactive mailbox, see Delete an inactive mailbox in
Office 365.
Change the hold duration for an inactive mailbox in
Office 365
9/26/2018 • 10 minutes to read • Edit Online

An inactive mailbox is used to retain a former employee's email after he or she leaves your organization. A mailbox
becomes inactive when a Litigation Hold, an In-Place Hold, an Office 365 retention policy, or a hold that's
associated with an eDiscovery case is placed on the mailbox, and the corresponding Office 365 user account is
deleted. The contents of an inactive mailbox are retained for the duration of the hold that was placed on the
mailbox before it was made inactive. The hold duration defines how long items in the Recoverable Items folder are
held. When the hold duration expires for an item in the Recoverable Items folder, the item is permanently deleted
(purged) from the inactive mailbox. After a mailbox is made inactive, you can change the duration of the hold or
Office 365 retention policy assigned to the inactive mailbox.

IMPORTANT
We've postponed the July 1, 2017 deadline for creating new In-Place Holds to make a mailbox inactive. But later this year or
early next year, you won't be able to create new In-Place Holds in Exchange Online. At that time, only Litigation Holds and
Office 365 retention policies can be used to create an inactive mailbox. However, existing inactive mailboxes that are on In-
Place Hold will still be supported, and you can continue to manage the In-Place Holds on inactive mailboxes. This includes
changing the duration of an In-Place Hold and permanently deleting an inactive mailbox by removing the In-Place Hold.

Before you begin


You have to use Exchange Online PowerShell to change the hold duration for a Litigation Hold on an
inactive mailbox. You can't use the Exchange admin center (EAC ). But you can use Exchange Online
PowerShell or the EAC to change the hold duration for an In-Place Hold. You can use the Office 365
Security & Compliance Center or the Security & Compliance Center PowerShell to change the hold
duration for an Office 365 retention policy.
To connect to Exchange Online PowerShell or Security & Compliance Center PowerShell, see one of the
following topics:
Connect to Exchange Online PowerShell
Connect to Office 365 Security & Compliance Center PowerShell
Note that holds associated with eDiscovery cases are infinite holds, which means there is no hold duration
that can be changed. Items are held forever or until the hold is removed and the inactive mailbox is deleted.
For more information about inactive mailboxes, see Inactive mailboxes in Office 365.

Step 1: Identify the holds on an inactive mailbox


Because different types of holds or one or more Office 365 retention policies might be placed on an inactive
mailbox, the first step is to identify the holds on an inactive mailbox.
Run the following command in Exchange Online PowerShell to display the hold information for all inactive
mailboxes in your organization.
Get-Mailbox -InactiveMailboxOnly | FL
DisplayName,Name,IsInactiveMailbox,LitigationHoldEnabled,LitigationHoldDuration,InPlaceHolds

The value of True for the LitigationHoldEnabled property indicates that the inactive mailbox is on Litigation
Hold. If an In-Place Hold, eDiscovery hold, or Office 365 retention policy is placed on an inactive mailbox, a GUID
for the hold or retention policy is displayed as the value for the InPlaceHolds property. For example, the
following shows results for 5 inactive mailboxes.

DisplayName : Ann Beebe


Name : annb
IsInactiveMailbox : True
LitigationHoldEnabled : True
LitigationHoldDuration: 365.00:00:00
InPlaceHolds : {}
...
DisplayName : Pilar Pinilla
Name : pilarp
IsInactiveMailbox : True
LitigationHoldEnabled : False
LitigationHoldDuration: Unlimited
InPlaceHolds : {c0ba3ce811b6432a8751430937152491}
...
DisplayName : Mario Necaise
Name : marion
IsInactiveMailbox : True
LitigationHoldEnabled : False
LitigationHoldDuration: Unlimited
InPlaceHolds : {}
...
DisplayName : Carol Olson
Name : carolo
IsInactiveMailbox : True
LitigationHoldEnabled : False
LitigationHoldDuration: Unlimited
InPlaceHolds : {mbxcdbbb86ce60342489bff371876e7f224}
...
DisplayName : Abraham McMahon
Name : abrahamm
IsInactiveMailbox : True
LitigationHoldEnabled : False
LitigationHoldDuration: Unlimited
InPlaceHolds : {UniH7d895d48-7e23-4a8d-8346-533c3beac15d}

The following table identifies the five different hold types that were used to make each mailbox inactive.

HOW TO IDENTIFY THE HOLD ON THE


INACTIVE MAILBOX HOLD TYPE INACTIVE MAILBOX

Ann Beebe Litigation Hold The LitigationHoldEnabled property is


set to True .
HOW TO IDENTIFY THE HOLD ON THE
INACTIVE MAILBOX HOLD TYPE INACTIVE MAILBOX

Pilar Pinilla In-Place Hold The InPlaceHolds property contains the


GUID of the In-Place Hold that's placed
on the inactive mailbox. You can tell this
is an In-Place Hold because the ID
doesn't start with a prefix.
You can use the
Get-MailboxSearch -
InPlaceHoldIdentity <hold GUID> |
FL
command in Exchange Online
PowerShell to get information about
the In-Place Hold on the inactive
mailbox.

Mario Necaise Organization-wide Office 365 retention The InPlaceHolds property is empty.
policy in the Security & Compliance This indicates that one or more
Center organization-wide or (Exchange-wide)
Office 365 retention policy is applied to
the inactive mailbox. In this case, you
can run the
Get-OrganizationConfig | Select-
Object -ExpandProperty
InPlaceHolds
command in Exchange Online
PowerShell to get a list of the GUIDs for
organization-wide Office 365 retention
policies. The GUID for organization-
wide retention policies that are applied
to Exchange mailboxes start with the
mbx prefix; for example
mbxa3056bb15562480fadb46ce523ff7b02
.

To identity the Office 365 retention


policy that's applied to the inactive
mailbox, run the following command in
Security & Compliance Center
PowerShell.

Get-RetentionCompliancePolicy
<retention policy GUID without
prefix> | FL Name
HOW TO IDENTIFY THE HOLD ON THE
INACTIVE MAILBOX HOLD TYPE INACTIVE MAILBOX

Carol Olson Office 365 retention policy in the The InPlaceHolds property contains the
Security & Compliance Center applied GUID of the Office 365 retention policy
to specific mailboxes that's applied to the inactive mailbox.
You can tell this is a retention policy
that applied to specific mailboxes
because the GUID starts with the mbx
prefix. Note that if GUID of the
retention policy applied to the inactive
mailbox started with the skp prefix,
that would indicate that the retention
policy is applied to Skype for Business
conversations.

To identity the Office 365 retention


policy that's applied to the inactive
mailbox, run the following command in
Security & Compliance Center
PowerShell.

Get-RetentionCompliancePolicy
<retention policy GUID without
prefix> | FL Name

Be sure to remove the mbx or skp


prefix when you run this command.
HOW TO IDENTIFY THE HOLD ON THE
INACTIVE MAILBOX HOLD TYPE INACTIVE MAILBOX

Abraham McMahon eDiscovery case hold in the Security & The InPlaceHolds property contains the
Compliance Center GUID of the eDiscovery case hold that's
placed on the inactive mailbox. You can
tell this is an eDiscovery case hold
because the GUID starts with the
UniH prefix.
You can use the Get-CaseHoldPolicy
cmdlet in Security & Compliance Center
PowerShell to get information about
the eDiscovery case that the hold on
the inactive mailbox is associated with.
For example, you can run the command
Get-CaseHoldPolicy <hold GUID
without prefix> | FL Name
to display the name of the case hold
that's on the inactive mailbox. Be sure
to remove the UniH prefix when you
run this command.

To identity the eDiscovery case that the


hold on the inactive mailbox is
associated with, run the following
commands.

$CaseHold = Get-CaseHoldPolicy
<hold GUID without prefix>

Get-ComplianceCase
$CaseHold.CaseId | FL Name

Note: We don't recommend using


eDiscovery holds for inactive mailboxes.
That's because eDiscovery cases are
intended for specific, time-bound cases
related to a legal issue. At some point, a
legal case will probably end and the
holds associated with the case will be
removed and the eDiscovery case will
be closed (or deleted). In fact, if a hold
that's placed on an inactive mailbox is
associated with an eDiscovery case, and
the hold is released or the eDiscovery
case is closed or deleted, the inactive
mailbox will be permanently deleted.

For more information about Office 365 retention policies, see Overview of retention policies.

Step 2: Change the hold duration for an inactive mailbox


After you identify what type of hold is placed on the inactive mailbox (and whether there are multiple holds), the
next step is to change the duration for the hold.
Change the duration for a Litigation Hold
Here's how to use Exchange Online PowerShell to change the hold duration for a Litigation Hold that is placed on
an inactive mailbox. You can't use the EAC. Run the following command to change the hold duration. In this
example, the hold duration is changed to an unlimited period of time.
Set-Mailbox -InactiveMailbox -Identity <identity of inactive mailbox> -LitigationHoldDuration unlimited

The result is that items in the inactive mailbox are retained indefinitely or until the hold is removed or the hold
duration is changed to a different value.

TIP
The best way to identify an inactive mailbox is by using its Distinguished Name or Exchange GUID value. Using one of
these values helps prevent accidentally specifying the wrong mailbox.

Change the duration for an In-Place Hold


You can use the EAC or Exchange Online PowerShell to change the hold duration for an In-Place Hold.
Use the EAC to change the hold duration
1. If you know the name of the In-Place Hold that you want to change, go to the next step. Otherwise, run the
following command to get the name of the In-Place Hold that is placed on the inactive mailbox. Use the In-
Place Hold GUID that you obtained in Step 1.

Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID> | FL Name

2. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.


3. Select the In-Place Hold you want to change, and then click Edit .
4. On the In-Place eDiscovery & Hold properties page, click In-Place Hold.
5. Do one of the following based on the current hold duration:
6. Click Hold indefinitely to hold items for an unlimited period of time.
7. Click Specify number of days to hold items relative to their received date to hold items for a specific
period. Type the number of days that you want to hold items for.

8. Click Save.
Use Exchange Online PowerShell to change the hold duration
1. If you know the name of the In-Place Hold that you want to change, go to the next step. Otherwise, run the
following command to get the name of the In-Place Hold that is placed on the inactive mailbox. Use the In-
Place Hold GUID that you obtained in Step 1.

Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID> | FL Name

2. Run the following command to change the hold duration. In this example, the hold duration is changed to
2,555 days (approximately 7 years).

Set-MailboxSearch <identity of In-Place Hold> -ItemHoldPeriod 2555

To change the hold duration to an unlimited period of time, use -ItemHoldPeriod unlimited.

More information
How is the hold duration calculated for an item in an inactive mailbox? The duration is calculated
from the original date a mailbox item was received or created.
What happens when the hold duration expires? When the hold duration expires for a mailbox item in
the Recoverable Items folder, the item is permanently deleted (purged) from the inactive mailbox. If there is
no duration specified for the hold placed on the inactive mailbox, items in the Recoverable Items folder are
never purged (unless the hold duration for the inactive mailbox is changed).
Is an Exchange retention policy still processed on inactive mailboxes? If an Exchange retention
policy (the messaging records management, or MRM, feature in Exchange Online) was applied to a mailbox
when it was made inactive, the deletion policies (which are retention tags configured with a Delete
retention action) will continue to be processed on the inactive mailbox. That means items that are tagged
with a deletion policy are moved to the Recoverable Items folder when the retention period expires. Those
items are then purged from the inactive mailbox when the hold duration for an item expires.
Conversely, any archive policies (which are retention tags configured with a MoveToArchive retention
action) that are included in the retention policy assigned to an inactive mailbox are ignored. That means
items in an inactive mailbox that are tagged with an archive policy remain in the primary mailbox when the
retention period expires. They're not moved to the archive mailbox or to the Recoverable Items folder in the
archive mailbox. Because a user can't sign in to an inactive mailbox, there's no reason to consume
datacenter resources to process archive policies.
To check the new hold duration, run one of the following commands. The first command is for
Litigation Hold; the second is for In-Place Hold.

Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox> | FL LitigationHoldDuration

Get-MailboxSearch <identity of In-Place Hold> | FL ItemHoldPeriod

Like regular mailboxes, the Managed Folder Assistant (MFA ) also processes inactive mailboxes. In
Exchange Online, the MFA processes mailboxes approximately once every 7 days. After you change the
hold duration for an inactive mailbox, you can use the Start-ManagedFolderAssistant cmdlet to
immediately start processing the new hold duration for the inactive mailbox. Run the following command.

Start-ManagedFolderAssistant -InactiveMailbox <identity of inactive mailbox>

If a lot of holds are placed on an inactive mailbox, not all of the hold GUIDs will be displayed. You
can run the following command to display the GUIDs for all holds (except Litigation Holds) that are placed
on an inactive mailbox.

Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox> | Select-Object -


ExpandProperty InPlaceHolds
Recover an inactive mailbox in Office 365
8/21/2018 • 7 minutes to read • Edit Online

An inactive mailbox (which is a type of soft-deleted mailbox) is used to preserve a former employee's email after
he or she leaves your organization. If that employee returns to your organization or if another employee takes on
the job responsibilities of the former employee, there are two ways that you can make the contents of the inactive
mailbox available to a user:
Recover an inactive mailbox If the former employee returns to your organization, or if a new employee
is hired to take on the job responsibilities of the former employee, you can recover the contents of the
inactive mailbox. This method converts the inactive mailbox to a new, active mailbox that contains the
contents of the inactive mailbox. After it's recovered, the inactive mailbox no longer exists. The procedures
in this topic describe this method.
Restore an inactive mailbox If another employee takes on the job responsibilities of the former
employee, or if another user needs access to the contents of the inactive mailbox, you can restore (or
merge) the contents of the inactive mailbox to an existing mailbox. You can also restore the archive from an
inactive mailbox. For the procedures for this method, see Restore an inactive mailbox in Office 365.
See the More information section for more details about the differences between recovering and restoring an
inactive mailbox, and for a description of what happens when an inactive mailbox is recovered.

NOTE
We've postponed the deadline for creating new In-Place Holds to make a mailbox inactive. But at some point in the future,
you won't be able to create new In-Place Holds in Exchange Online. At that time, only Litigation Holds and Office 365
retention policies can be used to create an inactive mailbox. However, existing inactive mailboxes that are on In-Place Hold
will still be supported, and you can continue to manage the In-Place Holds on inactive mailboxes. This includes changing the
duration of an In-Place Hold and permanently deleting an inactive mailbox by removing the In-Place Hold.

Before you begin


You have to use Exchange Online PowerShell to restore an inactive mailbox. You can't use the Exchange
admin center (EAC ). For step-by-step instructions, see Connect to Exchange Online PowerShell.
Run the following command to get identity information for the inactive mailboxes in your organization.

Get-Mailbox -InactiveMailboxOnly | FL Name,DistinguishedName,ExchangeGuid,PrimarySmtpAddress

Use the information returned by this command to recover a specific inactive mailbox.
For more information about inactive mailboxes, see Inactive mailboxes in Office 365.

Recover an inactive mailbox


Use the New-Mailbox cmdlet with the InactiveMailbox parameter to recover an inactive mailbox.
1. Create a variable that contains the properties of the inactive mailbox.

$InactiveMailbox = Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox>


IMPORTANT
In the previous command, use the value of the DistinguishedName or ExchangeGUID property to identify the
inactive mailbox. These properties are unique for each mailbox in your organization, whereas it's possible that an
active and an inactive mailbox might have the same primary SMTP address.

2. This example uses the properties obtained in the previous command and recovers the inactive mailbox to
an active mailbox for the user Ann Beebe. Be sure that the values specified for the Name and
MicrosoftOnlineServicesID parameters are unique within your organization.

New-Mailbox -InactiveMailbox $InactiveMailbox.DistinguishedName -Name annbeebe -FirstName Ann -LastName


Beebe -DisplayName "Ann Beebe" -MicrosoftOnlineServicesID Ann.Beebe@contoso.com -Password (ConvertTo-
SecureString -String 'P@ssw0rd' -AsPlainText -Force) -ResetPasswordOnNextLogon $true

The primary SMTP address for the recovered inactive mailbox will have the same value as the one
specified by the MicrosoftOnlineServicesID parameter.
After you recover an inactive mailbox, a new Office 365 user account is also created. You have to activate this user
account by assigning a license. To assign a license in the Office 365 admin center, see Assign or unassign licenses
for Office 365 for business.

More information
What's the main difference between recovering and restoring an inactive mailbox? When you
recover an inactive mailbox, the mailbox is basically converted to a new mailbox, the contents and folder
structure of the inactive mailbox are retained, and the mailbox is linked to a new user account. After it's
recovered, the inactive mailbox no longer exists, and any changes made to the content in the new mailbox
will affect the content that was originally on hold in the inactive mailbox. Conversely, when you restore an
inactive mailbox, the contents are merely copied to another mailbox. The inactive mailbox is preserved and
remains an inactive mailbox. Any changes made to the content in the target mailbox won't affect the
original content held in the inactive mailbox. The inactive mailbox can still be searched by using In-Place
eDiscovery, its contents can be restored to another mailbox, or it can be recovered or deleted at a later date.
What happens when you recover an inactive mailbox? When you recover an inactive mailbox, the
following things occur:
Litigation Hold (if it was enabled for the inactive mailbox) is removed.
In-Place Holds are removed. This means that the inactive mailbox is removed as a source mailbox
from any In-Place Hold or In-Place eDiscovery searches.
The inactive mailbox is removed from any Office 365 retention policies that where applied to it.
The single item recovery period (which is defined by the RetainDeletedItemsFor mailbox
property) is set to 30 days. Typically, when a new mailbox is created in Exchange Online, this
retention period is set to 14 days. Setting this to the maximum value of 30 days gives you more time
to recover any data that's been permanently deleted (or purged) from the inactive mailbox. You can
also disable single item recovery or set the single item recovery period back to the default of 14
days. For more information, see Enable or disable single item recovery for a mailbox.
Retention hold is enabled, and the retention hold duration is set to 30 days. This means that the
default Exchange retention policy and any organization-wide or Exchange-wide Office 365 retention
policies that are assigned to the new mailbox won't be processed for 30 days. This gives the
returning employee or the new owner of the recovered inactive mailbox time to manage the old
messages. Otherwise, the Exchange or Office 365 retention policy might delete old mailbox items (or
move items to the archive mailbox, if it's enabled) that have expired based on the settings configured
for the Exchange or Office 365 retention policies. After 30 days, the retention hold expires, the
RetentionHoldEnabled mailbox property is set to False, and the Managed Folder Assistant starts
processing the policies assigned to the mailbox. If you don't need this additional time, you can just
remove the retention hold. Alternatively, you can increase the duration of the retention hold by using
the Set-Mailbox -EndDateForRetentionHold command. For more information, see Place a
mailbox on retention hold.
Put a hold on the recovered mailbox if you need to preserve the original state of the inactive
mailbox. To prevent the new mailbox owner or retention policy from permanently deleting any messages
from the recovered inactive mailbox, you can place the mailbox on Litigation Hold For more information,
see Place a mailbox on Litigation Hold.
What user ID can you use when recovering an inactive mailbox? When you recover an inactive
mailbox, the value that you specify for the MicrosoftOnlineServicesID parameter can be different from the
original one that was associated with the inactive mailbox. You can also use the original user ID. But as
previously stated, make sure that the values used for Name and MicrosoftOnlineServicesID are unique
within your organization when you recover the inactive mailbox.
What if the mailbox retention period for the inactive mailbox hasn't expired? If an inactive mailbox
was soft-deleted less than 30 days ago, you can't use the New-Mailbox -InactiveMailbox command to
recover it. You have to recover it by restoring the corresponding Office 365 user account. For more
information, see Delete or restore users.
How do you know if the soft-deleted mailbox retention period for an inactive mailbox has
expired? Run the following command.

Get-Mailbox -InactiveMailboxOnly <identity of inactive mailbox> | FL ExternalDirectoryObjectId

If there isn't a value for the ExternalDirectoryObjectId property, the mailbox retention period has
expired, and you can recover the inactive mailbox by running the New-Mailbox -InactiveMailbox
command. If there is a value for the ExternalDirectoryObjectId property, the soft-deleted mailbox
retention period hasn't expired and you have to recover the mailbox by restoring the Office 365 user
account. See Delete or restore users
Consider enabling the archive mailbox after you recover an inactive mailbox. This lets the
returning user or new employee move old messages to the archive mailbox. And when the retention hold
expires, the archive policy that is part of the default Exchange retention policy assigned to Exchange Online
mailboxes will move items that are two years or older to the archive mailbox. If you don't enable the archive
mailbox, items older than two years will remain in the user's primary mailbox. For more information, see
Enable archive mailboxes in the Office 365 Security & Compliance Center.
Restore an inactive mailbox in Office 365
8/21/2018 • 7 minutes to read • Edit Online

An inactive mailbox (which is a type of soft-deleted mailbox) is used to retain a former employee's email after he
or she leaves your organization. If another employee takes on the job responsibilities of the departed employee or
if that employee returns to your organization, there are two ways that you can make the contents of the inactive
mailbox available to a user:
Restore an inactive mailbox If another employee takes on the job responsibilities of the departed
employee, or if another user needs access to the contents of the inactive mailbox, you can restore (or
merge) the contents of the inactive mailbox to an existing mailbox. You can also restore the archive from an
inactive mailbox. After it's restored, the inactive mailbox is preserved and is retained as an inactive mailbox.
This topic describes the procedures for restoring an inactive mailbox.
Recover an inactive mailbox If the departed employee returns to your organization, or if a new
employee is hired to take on the job responsibilities of the departed employee, you can recover the
contents of the inactive mailbox. This method converts the inactive mailbox to a new mailbox that contains
the contents of the inactive mailbox. After it's recovered, the inactive mailbox no longer exists. For the step-
by-step procedures, see Recover an inactive mailbox in Office 365.
See the More information section in this article for more details about the differences between restoring and
recovering an inactive mailbox.

Before you begin


You have to use Exchange Online PowerShell to restore an inactive mailbox. You can't use the Exchange
admin center (EAC ). For step-by-step instructions, see Connect to Exchange Online PowerShell.
Run the following command in Exchange Online PowerShell to get identity information for the inactive
mailboxes in your organization.

Get-Mailbox -InactiveMailboxOnly | FL Name,DistinguishedName,ExchangeGuid,PrimarySmtpAddress

Use the information returned by this command to restore a specific inactive mailbox.
For more information about inactive mailboxes, see Inactive mailboxes in Office 365.

Restore an inactive mailbox


Use the New-MailboxRestoreRequest cmdlet with the SourceMailbox and TargetMailbox parameters to restore
the contents of an inactive mailbox to an existing mailbox. For more information about using this cmdlet, see
New -MailboxRestoreRequest.
1. Create a variable that contains the properties of the inactive mailbox.

$InactiveMailbox = Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox>


IMPORTANT
In the previous command, use the value of the DistinguishedName or ExchangeGUID property to identify the
inactive mailbox. These properties are unique for each mailbox in your organization, whereas it's possible that an
active and an inactive mailbox might have the same primary SMTP address.

2. Restore the contents of the inactive mailbox to an existing mailbox. The contents of the inactive mailbox
(source mailbox) will be merged into the corresponding folders in the existing mailbox (target mailbox).

New-MailboxRestoreRequest -SourceMailbox $InactiveMailbox.DistinguishedName -TargetMailbox


newemployee@contoso.com -AllowLegacyDNMismatch

Alternatively, you can specify a top-level folder in the target mailbox in which to restore the contents from
the inactive mailbox. If the specified target folder or target folder structure doesn't already exist in the target
mailbox, it is created during the restore process.
This example copies mailbox items and subfolders from an inactive mailbox to a folder named "Inactive
Mailbox" in the top-level folder structure of the target mailbox.

New-MailboxRestoreRequest -SourceMailbox $InactiveMailbox.DistinguishedName -TargetMailbox


newemployee@contoso.com -TargetRootFolder "Inactive Mailbox" -AllowLegacyDNMismatch

Restore the archive from an inactive mailbox


If an inactive mailbox has an archive mailbox, you can also restore it to the archive mailbox of an existing mailbox.
To restore the archive from an inactive mailbox, you have to add the SourceIsArchive and TargetIsAchive switches
to the command used to restore an inactive mailbox.
1. Create a variable that contains the properties of the inactive mailbox.

$InactiveMailbox = Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox>

IMPORTANT
In the previous command, use the value of the DistinguishedName or ExchangeGUID property to identify the
inactive mailbox. These properties are unique for each mailbox in your organization, whereas it's possible that an
active and an inactive mailbox might have the same primary SMTP address.

2. Restore the contents of the archive from the inactive mailbox (source archive) to the archive of an existing
mailbox (target archive). In this example, the contents from the source archive are copied to a folder named
"Inactive Mailbox Archive" in the archive of the target mailbox.

New-MailboxRestoreRequest -SourceMailbox $InactiveMailbox.DistinguishedName -SourceIsArchive -


TargetMailbox newemployee@contoso.com -TargetIsArchive -TargetRootFolder "Inactive Mailbox Archive" -
AllowLegacyDNMismatch

More information
What's the main difference between recovering and restoring an inactive mailbox? When you
recover an inactive mailbox, the mailbox is basically converted to a new mailbox, the contents and folder
structure of the inactive mailbox are retained, and the mailbox is linked to a new user account. After it's
recovered, the inactive mailbox no longer exists, and any changes made to the content in the new mailbox
will affect the content that was originally on hold in the inactive mailbox. Conversely, when you restore an
inactive mailbox, the contents are merely copied to another mailbox. The inactive mailbox is preserved and
remains an inactive mailbox. Any changes made to the content in the target mailbox won't affect the
original content held in the inactive mailbox. The inactive mailbox can still be searched by using the Content
Search tool in the Office 365 Security & Compliance Center, its contents can be restored to another
mailbox, or it can be recovered or deleted at a later date.
How do you find inactive mailboxes? To get a list of the inactive mailboxes in your organization and
display information that is useful for restoring an inactive mailbox, you can run this command.

Get-Mailbox -InactiveMailboxOnly | FL
Name,PrimarySMTPAddress,DistinguishedName,ExchangeGUID,LegacyExchangeDN,ArchiveStatus

Use a Litigation Hold or Office 365 retention policy to retain inactive mailbox content. If you want
to retain the state of an inactive mailbox after it's restored, you can place the target mailbox on Litigation
Hold or apply an Office 365 retention policy before you restore the inactive mailbox. This will prevent the
permanent deletion of any items from the inactive mailbox after they're restored to the target mailbox.
Enable retention hold on the target mailbox before you restore an inactive mailbox. Because
mailbox items from an inactive mailbox could be old, you might consider enabling retention hold on the
target mailbox before you restore an inactive mailbox. When you put a mailbox on retention hold, the
retention policy that's assigned to it won't be processed until the retention hold is removed or until the
retention hold period expires. This gives the owner of the target mailbox time to manage old messages
from the inactive mailbox. Otherwise, the retention policy might delete old items (or move items to the
archive mailbox, if it's enabled) that have expired based on the retention settings configured for the target
mailbox. For more information, see Place a mailbox on retention hold in Exchange Online.
What does the AllowLegacyDNMismatch switch do? In the previous examples to restore an inactive
mailbox, the AllowLegacyDNMismatch switch is used to allow restoring the inactive mailbox to a
different target mailbox. In a typical restore scenario, the goal is to restore content where the source and
target mailboxes are the same mailbox. So by default, the New-MailboxRestoreRequest cmdlet checks to
make sure that the value of the LegacyExchangeDN property on the source and target mailboxes is the
same. This helps prevents you from accidentally restoring a source mailbox into the wrong target mailbox.
If you try to restore an inactive mailbox without using the AllowLegacyDNMismatch switch, the
command might fail if the source and target mailboxes have different values for the LegacyExchangeDN
property.
You can use other parameters with the New-MailboxRestoreRequest cmdlet to implement
different restore scenarios for inactive mailboxes. For example, you can run this command to restore
the archive from the inactive mailbox into the primary mailbox of the target mailbox.

New-MailboxRestoreRequest -SourceMailbox <inactive mailbox> -SourceIsArchive -TargetMailbox <target


mailbox> -TargetRootFolder "Inactive Mailbox Archive" -AllowLegacyDNMismatch

You can also restore the inactive primary mailbox into the archive of the target mailbox by running this
command.

New-MailboxRestoreRequest -SourceMailbox <inactive mailbox> -TargetMailbox <target mailbox> -


TargetIsArchive -TargetRootFolder "Inactive Mailbox" -AllowLegacyDNMismatch

What does the TargetRootFolder parameter do? As previously explained, you can use the
TargetRootFolder parameter to specify a folder in the top of the folder structure (also called the root) in
the target mailbox in which to restore the contents of the inactive mailbox. If you don't use this parameter,
mailbox items from the inactive mailbox are merged into the corresponding default folders of the target
mailbox, and custom folders are re-created in the root of the target mailbox. The following illustrations
highlight these differences between not using and using the TargetRootFolder parameter.
Folder hierarchy in the target mailbox when the TargetRootFolder parameter isn't used

Folder hierarchy in the target mailbox when the TargetRootFolder parameter is used
Delete an inactive mailbox in Office 365
9/13/2018 • 10 minutes to read • Edit Online

An inactive mailbox is used to preserve a former employee's email after he or she leaves your organization. When
you no longer need to preserve the contents of an inactive mailbox, you can permanently delete the inactive
mailbox by removing the hold. Also, it's possible that multiple holds might be placed on an inactive mailbox. For
example, an inactive mailbox might be placed on Litigation Hold and on one or more In-Place Holds. Additionally,
an Office 365 retention policy (created in the Office 365 Security & Compliance Center) might be applied to the
inactive mailbox. You have to remove all holds and Office 365 retention policies from an inactive mailbox to delete
it. After you remove the holds and retention policies, the inactive mailbox is marked for deletion and is
permanently deleted after it's processed.

IMPORTANT
We've postponed the July 1, 2017 deadline for creating new In-Place Holds to make a mailbox inactive. But later this year or
early next year, you won't be able to create new In-Place Holds in Exchange Online. At that time, only Litigation Holds and
Office 365 retention policies can be used to create an inactive mailbox. However, existing inactive mailboxes that are on In-
Place Hold will still be supported, and you can continue to manage the In-Place Holds on inactive mailboxes. This includes
changing the duration of an In-Place Hold and permanently deleting an inactive mailbox by removing the In-Place Hold.

See the More information section for a description of what happens after holds are removed from an inactive
mailbox.

Before you begin


You have to use Exchange Online PowerShell to remove a Litigation Hold from an inactive mailbox. You
can't use the Exchange admin center (EAC ). For step-by-step instructions, see Connect to Exchange Online
PowerShell. You can use Exchange Online PowerShell or the EAC to remove an In-Place Hold from an
inactive mailbox.
You can copy the contents of an inactive mailbox to another mailbox before you remove the hold and delete
an inactive mailbox. For details, see Restore an inactive mailbox in Office 365.
If you remove the hold or Office 365 retention policy from an inactive mailbox and the soft-deleted mailbox
retention period for the mailbox has expired, the mailbox will be permanently deleted. After it's deleted, it
can't be recovered. Before you remove the hold, be sure that you no longer need the contents in the
mailbox. If you want to re-activate an inactive mailbox, you can recover it. For details, see Recover an
inactive mailbox in Office 365.
For more information about inactive mailboxes, see Inactive mailboxes in Office 365.

Step 1: Identify the holds on an inactive mailbox


As previously stated, a Litigation Hold, In-Place Hold, or Office 365 retention policy might be placed on an inactive
mailbox. The first step is to identify the holds on an inactive mailbox.
Run the following command to display the hold information for all inactive mailboxes in your organization.

Get-Mailbox -InactiveMailboxOnly | FL DisplayName,Name,IsInactiveMailbox,LitigationHoldEnabled,InPlaceHolds


The value of True for the LitigationHoldEnabled property indicates that the inactive mailbox is on Litigation
Hold. If an In-Place Hold is placed on an inactive mailbox, the GUID for the hold is displayed as the value for the
InPlaceHolds property. For example, the following results for two inactive mailboxes show that a Litigation Hold
is placed on Ann Beebe and that two In-Place Holds are placed on Pilar Pinilla.

DisplayName : Ann Beebe


Name : annb
IsInactiveMailbox : True
LitigationHoldEnabled : True
InPlaceHolds : {}
...
DisplayName : Pilar Pinilla
Name : pilarp
IsInactiveMailbox : True
LitigationHoldEnabled : False
InPlaceHolds : {c0ba3ce811b6432a8751430937152491, ba6f4ba25b62490aaaa253eea27426ab}

TIP
If a lot of In-Place Holds are placed on an inactive mailbox, not all of the In-Place Hold GUIDs will be displayed. You can run
the following command to display all the In-Place Hold GUIDs:
Get-Mailbox -InactiveMailboxOnly -Identity <identity of inactive mailbox> | Select-Object -ExpandProperty
InPlaceHolds

Step 2: Remove a hold from an inactive mailbox


After you identify what type of hold is placed on the inactive mailbox (and whether there are multiple holds), the
next step is to remove the holds on the mailbox. As previously stated, you have to remove all holds to permanently
delete an inactive mailbox.
Remove a Litigation Hold
As previously stated, you have to use Windows PowerShell to remove a Litigation Hold from an inactive mailbox.
You can't use the EAC. Run the following command to remove a Litigation Hold.

Set-Mailbox -InactiveMailbox -Identity <identity of inactive mailbox> -LitigationHoldEnabled $false

TIP
The best way to identify an inactive mailbox is by using its Distinguished Name or Exchange GUID value. Using one of these
values helps prevent accidentally specifying the wrong mailbox.

Remove In-Place Holds


There are two ways to remove an In-Place Hold from an inactive mailbox:
Delete the In-Place Hold object If the inactive mailbox that you want to permanently delete is the only
source mailbox for an In-Place Hold, you can just delete the In-Place Hold object.

NOTE
You have to disable the hold before you can delete an In-Place Hold object. If you try to delete an In-Place Hold
object that has the hold enabled, you'll receive an error message.

Remove the inactive mailbox as a source mailbox of an In-Place Hold If you want to retain other
source mailboxes for an In-Place Hold, you can remove the inactive mailbox from the list of source
mailboxes and keep the In-Place Hold object.
Use the EAC to delete an In-Place Hold
1. If you know the name of the In-Place Hold that you want to delete, you can go to the next step. Otherwise, run
the following command to get the name of the In-Place Hold that is placed on the inactive mailbox that you
want to permanently delete. Use the In-Place Hold GUID that you obtained in Step 1: Identify the holds on an
inactive mailbox.

Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID> | FL Name

2. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.


3. Select the In-Place Hold you want to delete, and then click Edit .
4. On the In-Place eDiscovery & Hold properties page, click In-Place Hold, uncheck the Place content
matching the search query in selected mailboxes on hold box, and then click Save.

5. On the In-Place eDiscovery & Hold page, select the In-Place Hold again, and then click Delete .
6. On the warning, click Yes to delete the In-Place Hold.
Use Exchange Online PowerShell to delete an In-Place Hold
1. Create a variable that contains the properties of the In-Place Hold that you want to delete. Use the In-Place
Hold GUID that you obtained in Step 1: Identify the holds on an inactive mailbox.

$InPlaceHold = Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID>

2. Disable the hold on the In-Place Hold.

Set-MailboxSearch $InPlaceHold.Name -InPlaceHoldEnabled $false

3. Delete the In-Place Hold.

Remove-MailboxSearch $InPlaceHold.Name

Use the EAC to remove an inactive mailbox from an In-Place Hold


1. If you know the name of the In-Place Hold that's placed on the inactive mailbox, you can go to the next step.
Otherwise, run the following command to get the name of the In-Place Hold placed on the mailbox. Use the In-
Place Hold GUID that you obtained in Step 1: Identify the holds on an inactive mailbox.

Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID> | FL Name

2. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.


3. Select the In-Place Hold that is placed on the inactive mailbox, and then click Edit .
4. On the In-Place eDiscovery & Hold properties page, click Sources.
5. In the list of source mailboxes, click the name of the inactive mailbox that you want to remove, and then
click Remove .
6. Click Save to save the change. A message is displayed saying the operation was successfully completed.
7. Repeat steps 1 through 6 to remove other In-Place Holds placed on the inactive mailbox.
Use Exchange Online PowerShell to remove an inactive mailbox from an In-Place Hold
If the In-Place Hold contains a large number of source mailboxes, it's possible the inactive mailbox won't be listed
on the Sources page in the EAC. Up to 3,000 mailboxes are displayed on the Sources page when you edit an In-
Place Hold. If an inactive mailbox isn't listed on the Sources page, you can use Exchange Online PowerShell to
remove it from the In-Place Hold.
1. Create a variable that contains the properties of the In-Place Hold placed on the inactive mailbox. Use the In-
Place Hold GUID that you obtained in Step 1: Identify the holds on an inactive mailbox.

$InPlaceHold = Get-MailboxSearch -InPlaceHoldIdentity <In-Place Hold GUID>

2. Verify that the inactive mailbox is listed as a source mailbox for the In-Place Hold.

$InPlaceHold.Sources

Note: The Sources property of the In-Place Hold identifies the source mailboxes by their LegacyExchangeDN
properties. Because this property uniquely identifies inactive mailboxes, using the Sources property from the In-
Place Hold helps prevent removing the wrong mailbox. This also helps to avoid issues if two mailboxes have the
same alias or SMTP address.
3. Remove the inactive mailbox from the list of source mailboxes in the variable. Be sure to use the
LegacyExchangeDN of the inactive mailbox that's returned by the command in the previous step.

$InPlaceHold.Sources.Remove("<LegacyExchangeDN of the inactive mailbox>")

For example, the following command removes the inactive mailbox for Pilar Pinilla.

$InPlaceHold.Sources.Remove("/o=contoso/ou=Exchange Administrative Group


(FYDIBOHF23SPDLT)/cn=Recipients/cn=9c8dfff651ec4908950f5df60cbbda06-pilarp")

4. Verify that the inactive mailbox is removed from the list of source mailboxes in the variable.

$InPlaceHold.Sources

5. Modify the In-Place Hold with the updated list of source mailboxes, which doesn't include the inactive mailbox.

Set-MailboxSearch $InPlaceHold.Name -SourceMailboxes $InPlaceHold.Sources

6. Verify that the inactive mailbox is removed from the list of source mailboxes for the In-Place Hold.

Get-MailboxSearch $InPlaceHold.Name | FL Sources

More information
An inactive mailbox is a type of soft-deleted mailbox. In Exchange Online, a soft-deleted mailbox is a
mailbox that's been deleted but can be recovered within a specific retention period. The soft-deleted
mailbox retention period in Exchange Online is 30 days. This means that the mailbox can be recovered
within 30 days of being soft-deleted. After 30 days, a soft-deleted mailbox is marked for permanent
deletion and can't be recovered.
What happens after you remove the hold on an inactive mailbox? The mailbox is treated like other
soft-deleted mailboxes and is marked for permanent deletion after the 30-day soft-deleted mailbox
retention period expires. This retention period starts on the date when the mailbox was first made inactive.
This date is known as the soft-deleted date, which is the date the corresponding Office 365 user account
was deleted or when the Exchange Online mailbox was deleted with the Remove-Mailbox cmdlet. The
soft-deleted date isn't the date on which you remove the hold.
Is an inactive mailbox permanently deleted immediately after the hold is removed? If the soft-
deleted date for an inactive mailbox is older than 30 days, the mailbox won't be permanently deleted as
soon as you remove the hold. The mailbox will be marked for permanent deletion and is deleted the next
time it's processed.
How does the soft-deleted mailbox retention period affect inactive mailboxes? If the soft-deleted
date for an inactive mailbox is more than 30 days before the date the hold was removed, the mailbox is
marked for permanent deletion. But if an inactive mailbox has a soft-deleted date within the last 30 days
and you remove the hold, you can recover the mailbox up until the soft-deleted mailbox retention period
expires. For details, see Delete or restore user mailboxes in Exchange Online. After the soft-deleted mailbox
retention period expires, you have follow the procedures for recovering an inactive mailbox. For details, see
Recover an inactive mailbox in Office 365.
How do you display information about an inactive mailbox after the hold is removed? After a hold
is removed and the inactive mailbox is reverted back to a soft-deleted mailbox, it won't be returned by
using the InactiveMailboxOnly parameter with the Get-Mailbox cmdlet. But you can display information
about the mailbox by using the Get-Mailbox -SoftDeletedMailbox command. For example:

Get-Mailbox -SoftDeletedMailbox -Identity pilarp | FL Name,Identity,LitigationHoldEnabled,In


Placeholds,WhenSoftDeleted,IsInactiveMailbox
Name : pilarp
Identity : Soft Deleted Objects\pilarp
LitigationHoldEnabled : False
InPlaceHolds : {}
WhenSoftDeleted : 10/30/2014 1:19:04 AM
IsInactiveMailbox : False

In the above example, the WhenSoftDeleted property identifies the soft-deleted date, which in this example is
October 30, 2014. If this soft-deleted mailbox was previously an inactive mailbox for which the hold was removed,
it will be permanently deleted 30 days after the value of the WhenSoftDeleted property. In this case, the mailbox is
permanently deleted after November 30, 2014.
View the data governance reports
8/21/2018 • 2 minutes to read • Edit Online

After you create your labels, you'll want to verify that they're being applied to content as you intended. With the
data governance reports in the Office 365 Security & Compliance Center, you can quickly view:
Top 5 labels This report shows the count of the top 5 labels that have been applied to content. Click this
report to view a list of all labels that have been recently applied to content. You can see each label's count,
location, how it was applied, its retention actions, whether it's a record, and its disposition type.
Manual vs Auto apply This report shows the count of all content that's been labeled manually or
automatically, and the percentage of content that's been labeled manually vs automatically.
Records tagging This report shows the count of all content that's been tagged as a record or non-record,
and the percentage of content that's been tagged as a record vs. non-record.
Labels trend over the past 90 days This report shows the count and location of all labels that have been
applied in the last 90 days.
All these reports show labeled content from Exchange, SharePoint, and OneDrive for Business.
You can find these reports in the Security & Compliance Center > Data Governance > Dashboard.

You can filter the data governance reports by date (up to 90 days) and location (Exchange, SharePoint, and
OneDrive for Business). The most recent data can take up to 24 hours to appear in the reports.
View label activity for documents
10/12/2018 • 2 minutes to read • Edit Online

After you create your labels, you'll want to verify that they're being applied to content as you intended. With the
Label Activity Explorer in the Office 365 Security & Compliance Center, you can quickly search and view label
activity for all content across SharePoint and OneDrive for Business over the past 30 days. This is real-time data
that gives you a clear view into what's happening in your tenant.
For example, with the Label Activity Explorer, you can:
View how many times each label was applied on each day (up to 30 days).
See who labeled exactly which file on which date, along with a link to the site where that file resides.
View which files had labels changed or removed, what the old and new labels are, and who made the
change.
Filter the data to see all the label activity for a specific label, file, or user. You can also filter label activity by
location (SharePoint or OneDrive for Business) and whether the label was applied manually or auto-applied.
View label activity for folders as well as individual documents. Coming soon is the ability to show how many
files inside that folder got labeled as a result of the folder getting labeled.
You can find the Label Activity Explorer in the Security & Compliance Center > Data governance > Label
Activity Explorer.
Note that the Label Activity Explorer requires an Office 365 Enterprise E5 subscription.

View label activities for files or folders


At the top of the Label Activity Explorer, you can choose whether to view activities for files or folders. Note that
folder activity includes only the folder itself, not the files inside the folder.
You might want to see label activity for folders because if you label a folder, all files inside that folder also get that
label (except for files that have had a label applied explicitly to them). Therefore, labeling folders might affect a
significant number of files. For more information, see Applying a default retention label to all content in a
SharePoint library, folder, or document set.
Label activities
Label activities includes all label actions: adding, removing, or changing a label. You can use this view to get a
comprehensive look at how many files each label's been applied to per day.
Label changes
Label changes includes the potentially risky actions of removing or changing a label. You can use this view to
quickly see such risky actions and the user who performed them. In the activity list below the chart, you can select
a file, and then click a link to that file in the details pane on the right.

Filter label activity


You can quickly filter the data to see all the label activity for a specific label, file, or user. You can also filter label
activity by location (SharePoint or OneDrive for Business) and whether the label was applied manually or auto-
applied.
Configure supervision policies for your organization
11/30/2018 • 10 minutes to read • Edit Online

Use supervision policies to capture employee communications for examination by internal or external reviewers.

NOTE
Users monitored by supervision policies must have either an Office 365 Enterprise E3 license with the Advanced Compliance
add-on or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want
to try supervision, you can sign up for a trial of Office 365 Enterprise E5.

Follow these steps to set up and use supervision in your Office 365 organization:
Set up groups for Supervision
Before you start using supervision, determine who will have their communications reviewed and who will
perform those reviews. If you want to get started with just a few users to see how supervision works, you
can skip setting up groups for now.
Make supervision available in your organization
Add yourself to the Supervisory Review role group so you can set up policies. Anyone who has this role
assigned can access the Supervision page under Data Governance in the Security & Compliance Center.
Set up a supervision policy
You'll create supervision policies in the Security & Compliance Center. These policies define which
communications are subject to review in your organization, and specifies who should perform reviews.
Communications include email as well as 3rd-party platform communications (such as Facebook, Twitter,
etc.)
Use Outlook web app to review communications identified by a supervision policy
The Supervision add-in gives reviewers access to the supervision functionality right within Outlook web
app so they can assess and categorize each item. Support for the desktop version of Outlook is coming
soon.
Run the supervision report
Use the supervision reports to see the review activity at the policy and reviewer level. For each policy, you
can also view live statistics on the current state of review activity. For details, see Supervision reports.

Set up groups for Supervision


When you create a supervision policy, you'll determine who will have their communications reviewed and who will
perform those reviews. In the policy, you'll use email addresses to identify individuals or groups of people. To
simplify your setup, create groups for people who will have their communication reviewed and groups for people
who will review those communications. If you're using groups, you might need several—for example, if you want
to monitor communications between two distinct groups of people, or if you want to specify a group that isn't
going to be supervised. See Example distribution groups for details about how this works.
To supervise communications between or within groups in your organization, set up distribution groups in the
Exchange admin center (go to recipients > groups). For more information about setting up distribution groups,
see Manage distribution groups

NOTE
You can also use dynamic distribution groups or security groups for supervision if you prefer. To help you decide if these
better fit your organization needs, see Manage mail-enabled security groups, and Manage dynamic distribution groups.

Example distribution groups


This example includes a distribution group that has been set up for a financial organization called Contoso
Financial International.
In Contoso Financial International, a sampling of communications between brokers in the United States must be
supervised. However, compliance officers within that group do not require supervision. For this example, we can
create the following groups:

SET UP THIS DISTRIBUTION GROUP GROUP ADDRESS (ALIAS) DESCRIPTION

All US brokers US_Brokers@Contoso.com This group includes email addresses for


all US-based brokers who work for
Contoso.

All US compliance officers US_Compliance@Contoso.com This group includes email addresses for
all US-based compliance officers who
work for Contoso. Because this group is
a subset of all US-based brokers, you
can use this alias to exempt compliance
officers from a supervision policy.

The Set up a supervision policy section describes how you can use these groups when you configure the policy.

Make supervision available in your organization


To make Supervision available as a menu option in the Security & Compliance Center, you must be assigned the
Supervisory Review Administrator role.
To do this, you can either add yourself as a member of the Supervisory Review role group, or you can create a new
role group.
Add members to the Supervisory Review role group
1. Sign into https://protection.office.com using credentials for an admin account in your Office 365
organization.
2. In the Security & Compliance Center, go to Permissions.
3. Select the Supervisory Review role group and then click the Edit icon.
4. In the Members section, add the people who you want to manage supervision for your organization.
Create a new role group
1. Sign into https://protection.office.com using credentials for an admin account in your Office 365
organization.
2. In the Security & Compliance Center, go to Permissions and then click Add ( +).
3. In the Roles section, click Add ( +) and scroll down to Supervisory Review Administrator. Add this role
to the role group.
4. In the Members section, add the people who you want to manage supervision for your organization.
For more information about role groups and permissions, see Permissions in the Office 365 Security &
Compliance Center.

Set up a supervision policy


1. Sign into https://protection.office.com using credentials for an admin account in your Office 365
organization.
2. In the Security & Compliance Center, go to click Data governance > Supervision.
3. Click Create and then follow the wizard to set up the following pages of the policy.
Policy name and description
Enter a name and a description for your policy. For example purposes, we'll name the policy Contoso US Brokers.
Choose users to supervise
In the Supervise these users or groups box, choose the users or groups whose communications your
want to supervise. Sticking with our example for Contoso US Brokers, we'll choose the group
US_Brokers@Contoso.com here.
If you chose a group to supervise, you can use the Exclude these users box to choose members of the
group who are exempt from supervision . Using the example , we'll exclude the group
US_Compliance@Contoso.com here.
Choose communications to review
By default, the Direction is condition is displayed and can't be removed. If you want to scope the review further
(such as only reviewing content that contains certain words or phrases), click Add a condition. You can specify
multiple conditions if needed.
The conditions you choose will apply to communications from both email and 3rd-party sources in your
organization (like from Facebook or DropBox). For details about importing 3rd-party communications into your
Office 365 organization, see Archiving third-party data in Office 365.
The following table explains more about each condition.

CONDITION HOW TO USE THIS CONDITION

Direction is Choose Inbound to review communications that are sent to


the people you chose to supervise from people not included
in the policy.
Choose Outbound if you want to review communications
that are sent from the people you chose to supervise ** to **
people not included in the policy.
Choose Internal to review communications sent between the
people you identified in the policy.

Message contains any of these words To apply the policy when certain words or phrases are
Message contains none of these words included or excluded in a message, enter each word or phrase
on a separate line. Each line of words you enter will be applied
separately (only one of these lines must apply for the policy to
apply to the message). For more information about entering
words or phrases, see the next section Matching words and
phrases to emails or attachments.
CONDITION HOW TO USE THIS CONDITION

Attachment contains any of these words To apply the policy when certain words or phrases are
Attachment contains none of these words included or excluded in a message attachment (such as a
Word document), enter each word or phrase on a separate
line. Each line of words you enter will be applied separately
(only one line must apply for the policy to apply to the
attachment). For more information about entering words or
phrases, see the next section Matching words and phrases to
emails or attachments.

Attachment is any of these file types To supervise communications that include or exclude specific
Attachment is none of these file types types of attachments, enter the file extensions (such as .exe or
.pdf). If you want to include or exclude multiple file extensions,
enter these on separate lines. Only one attachment extension
needs to match for the policy to apply.

Message size is larger than To review messages based on a certain size, use these
Message size is not larger than conditions to specify the maximum or minimum size a
message can be before it is subject to review. For example, if
you specify Message size is larger than > 1.0 MB, all
messages that are 1.01 MB and larger will be subject to
review. You can choose bytes, kilobytes, megabytes, or
gigabytes for this condition.

Attachment is larger than To review messages based on the size of their attachments,
Attachment is not larger than specify the maximum or minimum size an attachment can be
before the message and its attachments are subject to review.
For example, if you specify Attachment is larger than > 2.0
MB, all messages with attachments 2.01 MB and over will be
subject to review. You can choose bytes, kilobytes, megabytes,
or gigabytes for this condition.

Matching words and phrases to emails or attachments

Each line of words you enter will be applied separately (only one line must apply for the policy condition to apply
to the email or attachment). For example, let's use the condition, Message contains any of these words, with the
keywords "banker" and "insider trading" on separate lines. The policy will apply to any messages that includes the
word "banker" or the phrase "insider trading". Only one of these words or phrases must occur for this policy
condition to apply. Words in the message or attachment must exactly match what you enter.
Entering multiple conditions

If you enter multiple conditions, Office 365 uses all the conditions together to determine when to apply the policy
to communication items. When you set up multiple conditions, they must all be met for the policy to apply, unless
you enter an exception. For example, let's say you need to create a policy that should apply if a message contains
the word "trade", and is larger than 2MB. However, if the message also contains the words "Approved by Contoso
financial", the policy should not apply. Thus, in this case, the three conditions would be as follows:
Message contains any of these words, with the keywords "trade"
Message size is larger than, with the value 2 MB
Message contains none of these words, with the keywords "Approved by Contoso financial team".
Specify percentage to review
If you want to reduce the amount of content to review, specify a percentage. We'll randomly select that amount of
content from the total that matched the conditions you chose. If you want reviewers to review all items, enter
100%.
Choose reviewers
The users and groups you choose will use the Supervision app in Outlook web app to examine the
communications that are returned by this policy. You can include email addresses for internal or external reviewers.
Review your settings
After you've completed all sections of the supervision policy, review your settings and then click Finish to save
your policy. It might take a few hours for the policy to start capturing communications. Supervision delivers all
communications for review into a shared folder that reviewers can access in Outlook web app.

Use Outlook web app to review communications identified by a


supervision policy
Reviewers will use the Supervision add-in for Outlook web app to review communications. The add-in is installed
automatically in Outlook web app for all reviewers you specified in the policy. Support for the desktop version of
Outlook is coming soon.
Reviewing communications in Outlook web app
1. In Outlook web app, expand the Supervision - <policy name> folder.
2. In the <policy name> subfolder, reviewers will see all the communications identified by that supervision
policy.

3. Open an item to review and click the Supervision add-in.


4. Use the add-in to classify the item as Compliant, Non-Compliant, Questionable, or Resolved. After
you've classified an item, it will be moved to the corresponding subfolder under the <policy name> folder.
Install the Supervision add-in for Outlook desktop
12/5/2018 • 2 minutes to read • Edit Online

To review communications identified by a supervision policy, reviewers use the Supervision add-in for Outlook and
Outlook web app. The add-in is installed automatically in Outlook web app for all reviewers you specified in the
policy. However, reviewers must run through some steps to install it in the desktop version of Outlook.

NOTE
Users monitored by supervision policies must have either an Office 365 Enterprise E3 license with the Advanced Compliance
add-on or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want
to try supervision, you can sign up for a trial of Office 365 Enterprise E5.

Step 1: Copy the address for the supervision mailbox


To install the add-in for Outlook desktop, you'll need the address for the supervision mailbox that was created as
part of the supervision policy setup.

NOTE
If someone else created the policy, you'll need to get this address from them to install the add-in.

To find the supervision mailbox address


1. Sign into the Security & Compliance Center using credentials for an admin account in your Office 365
organization.
2. Go to Data governance > Supervision.
3. Click the supervision policy that's gathering the communications you want to review.
4. In the policy details flyout, under ** Supervision mailbox **, copy the address.

Step 2: Configure the supervision mailbox for Outlook desktop access


Next, reviewers will need to run a couple Exchange Online PowerShell commands so they can connect Outlook to
the supervision mailbox.
1. Connect to Exchange Online PowerShell. How do I do this?
2. Run the following commands, where *SupervisoryReview {GUID }@domain.onmicrosoft.com* is the address
you copied in Step 1 above, and User is the name of the reviewer who will be connecting to the supervision
mailbox in Step 3.
Add-MailboxPermission "SupervisoryReview{GUID}@domain.onmicrosoft.com" -User <alias or email address
of the account that has reviewer permissions to the supervision mailbox> -AccessRights FullAccess
Set-Mailbox "<SupervisoryReview{GUID}@domain.onmicrosoft.com>" -HiddenFromAddressListsEnabled: $false

3. Wait at least an hour before moving on to Step 3 below.

Step 3: Create an Outlook profile to connect to the supervision mailbox


For the final step, reviewers will need to create an Outlook profile to connect to the supervision mailbox.

NOTE
To create a new Outlook profile, you'll use the Mail settings in the Windows Control Panel. The path you take to get to these
settings might depend on which Windows operating system (Windows 7, Windows 8, or Windows 10) you're using and
which version of Outlook is installed.

1. Open the Control Panel, and in the Search box at the top of the window, type Mail.
(Not sure how to get to the Control Panel? See Where is Control Panel?)
2. Open the Mail app.
3. In Mail Setup - Outlook, click Show Profiles.

4. In Mail, click Add. Then, in New Profile, enter a name for the supervision mailbox (such as Supervision).

5. In Connect Outlook to Office 365, click Connect to a different account.


6. In Auto Account Setup, choose Manual setup or additional server types, and then click Next.
7. In Choose Your Account Type, choose Office 365. Then, in the Email Address box, enter the address of
the supervision mailbox you copied previously.

8. When prompted, enter your Office 365 credentials.


9. If successful, you'll see the Supervision - <policy name> folder listed in the Folder List view in Outlook.
Supervision reports
11/30/2018 • 2 minutes to read • Edit Online

Supervision policies define which communications in your organization need review for compliance, and who will
perform those reviews. Use the supervision reports to see the review activity at the policy and reviewer level. For
each policy, you can also view live statistics on the current state of review activity. Learn more about supervision
policies .

NOTE
Users monitored by supervision policies must have either an Office 365 Enterprise E3 license with the Advanced Compliance
add-on or be included in an Office 365 Enterprise E5 subscription. If you don't have an existing Enterprise E5 plan and want
to try supervision, you can sign up for a trial of Office 365 Enterprise E5.

You can use the supervision reports to:


Verify that your policies are working as you intended.
Find out how many emails are being identified for review.
Find out how many emails aren't compliant and which ones are passing review. This information can help
you decide whether to fine-tune your policies or change the number of reviewers.

View the Supervision report


1. Sign into the Security & Compliance Center using the credentials for an admin account in your Office 365
organization that has permissions to view supervision reports..
2. Go to Reports > Dashboard. You'll see a reporting widget for supervision and other reports you have
access to.
3. Click the Supervision widget to open the detailed report page.

NOTE
If you aren't able to access the Reports page, check that you're a member of the Supervisory Review role group, as described
in Make supervision available in your organization. Being included in this role group lets you create and manage supervision
polices and run the report.

How to use the report


When a supervision policy identifies an email for review, the email is delivered to the reviewer's Supervision folder
in Outlook and Outlook web app. This report lists each policy's name and the number of communications at each
stage in the review process.
Use the report to:
View data for all or specific policies.
View data grouped by tag type (such as Compliant, Questionable, etc.), reviewer, or message type.
Export data to a CSV file.
Filter data based on review activity date, tag type, reviewer, message type.
Here's a breakdown of the values you might see in the Tag type column.

TAG TYPE WHAT IT MEANS

Not Reviewed The number of emails that have not been reviewed yet. These
emails are awaiting review in the reviewer's supervision folder
in Outlook.

Compliant The number of emails reviewed and marked as compliant. No


further action is needed.

Questionable The number of emails reviewed and marked questionable. This


acts as a flag; other reviewers can help check whether an email
needs investigation for compliance.

Non-Compliant (Active) The number of non-compliant emails that reviewers are


currently investigating.

Non-Compliant (Resolved) The number of non-compliant emails that reviewers


investigated and resolved.

More details
Supervision policies must first be provisioned before they will appear in this report.
If policies are deleted, historical data is still shown. However, they're indicated as a "Non-existent policy",
and the Export function isn't available.
If the report doesn't show any data by default, it might be because the current date range doesn't have any
data to show. In these cases, use the Filters control to change the date range.
Protect against threats in Office 365
11/27/2018 • 2 minutes to read • Edit Online

With Office 365 Enterprise, you can help protect your organization against a variety of threats, including spoofing,
malware, spam, phishing attempts, and unauthorized access to data. Use the resources on this page to learn about
threat protection and actions you can take.

Anti-spoofing
If you're using a custom domain in Office 365, help stop sender fraud from your organization, improve email
security, and protect your domain's reputation.
[Prevent spoofing with SPF ](Set up SPF in Office 365 to help prevent spoofing)
[Validate outbound email with DKIM ](Use DKIM to validate outbound email sent from your custom domain
in Office 365)
[Validate email with DMARC ](Use DMARC to validate email in Office 365)

Anti-spam & anti-malware


Learn about Office 365 anti-spam scoring, connection filtering, and malware capture, including default settings
and how to report malicious email.
Anti-spam & anti-malware protection
[Turn on logging for email](Enable mailbox auditing in Office 365)
Quarantine email messages in Office 365
[Submit suspicious content to Microsoft](Submitting malware and non-malware to Microsoft for analysis)

Advanced Threat Protection


Configure policies to manage spoofing, protect against phishing attacks, and catch malicious URLs or files in email
messages with Advanced Threat Protection (ATP ).
Learn about Office 365 ATP
Learn about spoof intelligence
Set up anti-phishing policies
Set up ATP Safe Links policies
Set up ATP Safe Attachments policies

Encryption
Get a primer on encryption, set up rights management policies and email encryption, and configure additional
encryption settings. Get details about the root certificate used by our mail servers for Office 365.
Learn about encryption in Office 365
Set up encryption in Office 365 Enterprise
Office 365 Message Encryption (OME )
Implement bring your own key (BYOK)

Managing devices & apps


Monitor and control how mobile devices access your Office 365 data, and ban or approve mobile apps in use at
your organization.
Create and deploy device security policies
Manage app permissions using Office 365 Cloud App Security

Threat intelligence
Identify, monitor, and understand attacks, and quickly address threats by using the insights and knowledge
available to prevent attacks.
Get an overview of Office 365 Threat Intelligence
Get started with Office 365 Threat Intelligence

Privileged access management


Help protect your organization from breaches that may use existing privileged admin accounts with standing
access to sensitive data or access to critical configuration settings. After enabling privileged access management,
users will need to request just-in-time access to complete elevated and privileged tasks through an approval
workflow that is highly scoped and time-bound.
Get an overview of privileged access management
Get started with privileged access management

Additional options
Get more information about related Microsoft technologies and processes that help secure Office 365 against
threats.
Learn about Azure Rights Management
Learn about Azure Key Vault
Learn about tenant isolation
Anti-spam and anti-malware protection in Office 365
9/25/2018 • 5 minutes to read • Edit Online

If you're an Office 365 customer whose mailboxes are hosted in Microsoft Exchange Online, your email messages
are automatically protected against spam and malware.
Spam is unsolicited (and typically unwanted) email messages. Malware is comprised of viruses and spyware.
Viruses infect other programs and data, and they spread throughout your computer looking for programs to
infect. Spyware refers to malware that gathers your personal information, such as sign-in information and
personal data, and sends it back to the malware author.
Office 365 has built-in malware and spam filtering capabilities that help protect inbound and outbound messages
from malicious software and help protect you from spam. Admins don't need to set up or maintain the filtering
technologies, which are enabled by default. However, they can make company-specific filtering customizations in
the Exchange admin center (EAC ).

TIP
We recommend viewing the following series of introductory videos about how to get started with protecting your email
messaging environment: Videos for getting started with protecting your email.

NOTE
If you use SharePoint Online as part of Office 365, anti-malware protection is also automatically provided for files that are
uploaded and saved to document libraries. This protection is provided by the Microsoft anti-malware engine that's also
integrated into Exchange. This anti-malware service runs on all SharePoint Online Content Front Ends (CFEs).

Manage your anti-spam settings in Exchange Online


The following table contains links to topics that explain how anti-spam protection works in Exchange Online and
how you can fine-tune your anti-spam configuration settings to best meet the needs of your organization.
We're still rolling out threat management, including anti-spam and anti-malware for the Security & Compliance
Center, so you might not see all of these there just yet. During the rollout, some features, for example Anti-
malware, DKIM, and others, will continue to be available through the Exchange Admin Center (EAC ) for a limited
time.
In some cases, there are minor differences between the EAC and the Security & Compliance Center
implementations. For example, supported characters for spam filters are different between the two platforms.
Articles are provided that give more information about specific differences when they occur.

Topic Description

Anti-Spam Protection Provides overview information about the main anti-spam


protection features included in the service.
Invalid characters in hosted spam filter rules and policies Provides help for administrators who have invalid characters
in spam filter rules and policies and then run into issues when
attempting to use these rules and policies with the Security &
Compliance Center.

Anti-Spam Protection FAQ Provides frequently asked questions and answers about anti-
spam protection.

Safe sender and blocked sender lists FAQ Explains what safe sender and blocked sender lists are and
provides information about the different ways you can
populate these lists in the service.

Configure the connection filter policy Shows how you can create safe sender and blocked sender
lists by specifying IP addresses in the connection filter policy.

Configure content filter policies Provides information about how you can configure the default
company-wide content filter policy, as well as create custom
content filter policies that you can apply to specified users,
groups, or domains in your organization.

Configure the outbound spam policy Shows how to configure the outbound spam policy, which
contains settings that help make sure that your users don't
send spam outbound through the service.

What's the difference between junk email and bulk email? Explains the difference between junk email and bulk email
messages and provides information about the different
options that are available for both in the service.

Spam Confidence Levels When an email message goes through spam filtering it's
assigned a spam score. This topic describes what these spam
scores mean.

Submitting spam and non-spam messages to Microsoft for Describes several ways in which administrators and end users
analysis can send spam and non-spam messages to Microsoft for
analysis.

Anti-spam message headers Describes the anti-spam fields placed in Internet headers,
which can help provide administrators with information about
the message and about how it was processed.

Manage spam sent to the hosted quarantine in Exchange Online


When you configure your content filter policies, one of the actions you can set is to send content-filtered
messages to the hosted quarantine (by default, they're sent to the recipient's Junk Email folder). The following
table contains links to topics that describe how to manage spam-quarantined messages.

Topic Description

Quarantine Provides overview information about the quarantine feature,


including information about how you can set up users to
access the end user spam quarantine.
Quarantine FAQ Provides frequently asked questions and answers about the
hosted quarantine.

Find and release quarantined messages as an administrator Describes how you can use the EAC to find and release any
quarantined message, and optionally report it as a false
positive (not junk) message to Microsoft. Content-filtered
spam messages and messages that match a transport rule
can be sent to the administrator quarantine.

Find and release quarantined messages as an end user Describes how end users can find and release their own
spam-quarantined messages in the spam quarantine user
interface, and report them as not junk to Microsoft.

Use end-user spam notifications to release and report spam- Describes how end users can release their own spam-
quarantined messages quarantined messages and optionally report them as not junk
via end-user spam notification messages.

Manage your anti-malware settings in Exchange Online


The following table contains links to topics that explain how anti-malware protection works in Exchange Online,
and how you can fine-tune your anti-malware configuration settings to best meet the needs of your organization.

Topic Description

Anti-Malware Protection Provides overview information about how the service offers
multi-layered malware protection that's designed to catch all
known malware traveling to or from your organization.

Anti-Malware Protection FAQ Provides a detailed list of frequently asked questions and
answers about anti-malware protection in the service.

Configure Anti-Malware Policies Describes the malware filter policy settings. For example, you
can select the action to take when malware is detected in a
message, and specify to send notification messages when a
message is detected as malware and the entire message is
deleted. Similar to the content filter policy, you can configure
the default company-wide malware filter policy, as well as
create custom malware filter policies that you can apply to
specified users, groups, or domains in your organization.
Anti-phishing protection in Office 365
10/11/2018 • 2 minutes to read • Edit Online

Office 365 offers a variety of protection against phishing attacks by default and also through additional offerings
such as ATP anti-phishing. This topic introduces the online resources you can use to learn about and implement
anti-phishing options and strategies in Office 365.

Protect your organization against phishing attacks in Office 365


As an Office 365 administrator, use these resources to learn how to use Office 365 to protect against
impersonation-based phishing attacks and to help you educate your end users so that they don't fall prey to
malicious phishing attacks.
Before you make any changes to your Office 365 configuration, ensure that you're up to date on the latest that
Office 365 has to offer. Visit the Microsoft Safety & Security Center.
The most important thing you can do to secure your environment is to educate your users about the dangers and
the warning signs of phishing attacks. To get started, familiarize your users with the information in Protect yourself
from phishing schemes and other forms of online fraud.
For Office 365 organizations with Office Enterprise E5, you can use ATP anti-phishing in the Security &
Compliance Center. ATP anti-phishing applies a set of machine learning models together with impersonation
detection algorithms to incoming messages to provide protection for commodity and spear phishing attacks. ATP
anti-phishing protects your organization according to policies that are set by your Office 365 global or security
administrators. To learn more, see ATP anti-phishing capabilities in Office 365 and Set up anti-phishing policies in
Office 365.
For more details about how Office 365 is configured by default to protect you from phishing attacks, see How
Office 365 validates the From: address to prevent phishing.

Related topics
How Office 365 validates the From: address to prevent phishing
Protect yourself from phishing schemes and other forms of online fraud
Office 365 Advanced Threat Protection
ATP anti-phishing capabilities in Office 365
ATP anti-phishing capabilities in Office 365
10/11/2018 • 4 minutes to read • Edit Online

ATP anti-phishing is offered as part of Office 365 Advanced Threat Protection. ATP anti-phishing applies a set of
machine learning models together with impersonation detection algorithms to incoming messages to provide
protection for commodity and spear phishing attacks. All messages are subject to an extensive set of machine
learning models trained to detect phishing messages, together with a set of advanced algorithms used to protect
against various user and domain impersonation attacks. ATP anti-phishing protects your organization according
to polices that are set by your Office 365 global or security administrators.
To learn more, see Set up anti-phishing policies in Office 365.

NOTE
ATP anti-phishing is only available in Advanced Threat Protection, available with Office 365 Enterprise E5. If your
organization is using another Office 365 Enterprise subscription, Advanced Threat Protection can be purchased as an add-
on. (As a global admin, in the Office 365 admin center, choose Billing > Add subscriptions.) For more information about
plan options, see Compare All Office 365 for Business Plans.

How ATP anti-phishing works


ATP anti-phishing checks incoming messages for indicators that the message may be phishing. Whenever a user
is covered by an ATP policy (safe attachments, safe links or anti-phishing) the incoming message is evaluated by
multiple machine learning models that analyze the message to determine if the policy applies to the message and
the appropriate action is taken, based on the configured policy.
ATP anti-phishing allows Office 365 global administrators or security admins to define policies that provide
protection against phishing attacks that include impersonation of either users or domains. (or both). Office 365
global administrators or security admins define within the policy which user and domains should be protected
from impersonation attacks using either a fixed list of users or domains or by using mailbox intelligence. Mailbox
intelligence is an advanced understanding of a user's email habits and personal contacts. ATP learns how each
individual user communicates with other users inside and outside the organization and builds up a map of these
relationships. This map allows ATP to understand more details about how to ensure the right messages are
identified as impersonation.
ATP anti-phishing polices can be applied to a specific set of people or groups in your organization, or to an entire
domain or all of your custom domains. To learn more, see Set up anti-phishing policies in Office 365.

How to get ATP anti-phishing


ATP anti-phishing is part of Advanced Threat Protection, which is included in Office 365 Enterprise E5. Advanced
Threat Protection can also be purchased as an add-on to Office 365 Enterprise E1 or Office 365 Enterprise E3. For
more information about plan options, see Compare All Office 365 for Business Plans.
ATP anti-phishing applies when an anti-phishing policy, such as an impersonation-based policy are set up. (See
Set up anti-phishing policies in Office 365.)

How to know if ATP anti-phishing is in place


ATP anti-phishing policies must be defined in order for protection to be active. For ATP anti-phishing machine
learning models to be active for a user, that user must be part of a defined safe attachment, safe links, or anti-
phishing policy. The following table describes a few example scenarios. In each of these examples, the organization
is using Office 365 Enterprise E5, which includes Advanced Threat Protection.

EXAMPLE SCENARIO DOES ATP ANTI-PHISHING APPLY IN THIS CASE?

Pat's organization has Office 365 Enterprise E5, but no one No. Although the feature is available, at least one ATP policy
has defined any policies for ATP safe attachments, ATP safe must be defined in order for the ATP machine learning models
links or ATP advanced phishing yet. to work. For impersonation an ATP anti-phishing policy must
also be in place.

Lee is an employee in the sales department at Contoso. Lee's No. In this case, ATP anti-phishing (machine models and
organization has an ATP anti-phishing policy in place that impersonation protection) would apply to finance employees,
applies to finance employees only. but other employees, including the sales department, would
not.

Yesterday, an Office 365 administrator at Jean's organization Yes. In this example, Jean has a license for Advanced Threat
set up an ATP anti-phishing policy that applies to all Protection, and an ATP anti-phishing policy that includes Jean
employees. Earlier today, Jean received an email message that has been defined. It typically takes about 30 minutes for a
includes an impersonation covered by the policy. new policy to take effect across datacenters; since a day has
passed in this case, the policy should be in effect.

Related topics
Office 365 Advanced Threat Protection
Anti-phishing protection in Office 365
Set up anti-phishing policies in Office 365
ATP safe links in Office 365
Set up ATP safe links policies in Office 365
ATP safe attachments in Office 365
Set up ATP safe attachments policies in Office 365
View the reports for Advanced Threat Protection
Set up Office 365 ATP anti-phishing and anti-
phishing policies
10/11/2018 • 11 minutes to read • Edit Online

ATP anti-phishing protection, part of Office 365 Advanced Threat Protection, can help protect your organization
from malicious impersonation-based phishing attacks and other phishing attacks. If you're an Office 365
Enterprise global or security administrator, you can set up ATP anti-phishing policies.
Phishing attacks come in a variety of forms from commodity-based attacks to targeted spear phishing or
whaling. With the growing complexity, it's difficult for even a trained eye to identify some of these sophisticated
attacks. Fortunately, Office 365 Advanced Threat Protection can help. You can set up an ATP anti-phishing policy
to help ensure that your organization is protected against such attacks.

NOTE
ATP anti-phishing is only available in Advanced Threat Protection, available with Office 365 Enterprise E5. If your
organization is using another Office 365 Enterprise subscription, Advanced Threat Protection can be purchased as an add-
on. (As a global admin, in the Office 365 admin center, choose Billing > Add subscriptions.) For more information about
plan options, see Compare All Office 365 for Business Plans. Make sure your organization is using the latest version of
Office 365 ProPlus on Windows to take full advantage of ATP anti-phishing protection.

Anti-phishing policy is now available for Office 365 Exchange Online Protection, with a limited set of anti-
spoofing protection that is intended to protect against authentication-based and deception-based attacks.
What to do:
1. Review the prerequisites.
2. Learn about anti-phishing and ATP anti-phishing policy options.
3. Set up an anti-phishing policy or an ATP anti-phishing policy.

Review the prerequisites


Make sure that you are a member of the Company administrators or Security admins role group.
Learn about ATP anti-phishing policy options (in this article).
You will probably set up multiple anti-phishing policies for your organization. Office 365 enforces these
policies in the order they're listed on the Anti-phishing page and ATP anti-phishing pages in the
Security & Compliance Center. Once you've reviewed the policy options, take some time to determine
how many policies you'll need and the priority for each.
Plan to spend about 5-15 minutes to set up your first anti-phishing policy.
Allow up to 30 minutes for your new or updated policy to spread to all Office 365 datacenters.

Set up an anti-phishing or ATP anti-phishing policy


Each organization in Office 365 has a default anti-phishing policy that applies to all users. You can create multiple
custom anti-phishing policies that you can scope to specific users, groups, or domains within your organization.
The custom policies you create take precedence over the default policy. You add, edit, and delete anti-phishing
policies in the Office 365 Security & Compliance Center.
1. Go to https://protection.office.com and sign in with your work or school account.
2. In the Office 365 Security & Compliance Center, in the left navigation pane, under Threat management,
choose Policy.
3. On the Policy page, choose Anti-phishing or ATP anti-phishing.
4. On the Anti-phishing or ATP anti-phishing page, do one of the following:
To add a new policy select + Create.
To edit an existing policy, select the policy name from the list displayed on the Anti-phishing page or
choose Default Policy above the list to edit the default poicy for your organization. On the page that
appears, choose Edit policy.
A wizard launches that steps you through defining your anti-phishing policy.
5. Specify the name, description, and settings for your policy. See Learn about ATP anti-phishing policy
options for more details.
6. Once you have reviewed your settings, choose Create this policy or Save as appropriate.

Learn about ATP anti-phishing policy options


As you set up or edit your ATP anti-phishing policies, you can choose from several options that provide the most
sophisticated and comprehensive protection, as described in the following table:

THIS SETTING DOES THIS USE WHEN YOU WANT TO:

Add users to protect Defines which email addresses will be When you want to ensure that mail
protected by the policy. You can add from outside your organization isn't an
up to 60 internal and external impersonation of one of the users on
addresses that you want to protect the list of users you are protecting.
from impersonation. Examples of users you might want to
protect are high-level executives,
business owners, external board
members, and so on.
This list of protected users is different
from the list of people to which the
policy applies, or rather, for which the
policy is enforced. You define the
applies to list in the Applied to section
of the policy options.
For example, if you add Mary Smith
<marys@contoso.com\> as a user to
protect, then apply the policy to the
group "All Users". This would ensure
that a mail that appeared to
impersonate "Mary Smith" sent to a
user in the "All Users" group would be
acted on by the policy.
THIS SETTING DOES THIS USE WHEN YOU WANT TO:

Add domains to protect Allows you to choose which domains Whenever you want to ensure that
you want to protect from mail from outside your organization
impersonation. You can specify that the isn't an impersonation of one of the
policy includes all of your custom domains defined in your list of verified
domains, a comma-separated list of domains or that of a partner domain.
domains, or a combination of the two.
If you choose Automatically include
domains that I own, and you later
add a domain to your Office 365
organization, this anti-phishing policy
will be in place for the new domain.

Choose actions Choose the action to take when Office When you want to take an action on
365 detects an impersonation attempt messages that Office 365 has
against the users and domains you determined to be an impersonation of
added to the policy. You can choose a user or domain as defined in the
different actions for users and domains policy.
in the same anti-phishing policy. These
actions apply to any incoming email
that has been identified by Office 365
as impersonating a user account or
domain that is under the protection of
this anti-phishing policy.
Quarantine message Email will be
sent to Office 365 quarantine. When
you choose this option, the email is not
sent to the original recipient.
Redirect message to another email
address Email will be sent to the email
address you specify. You can specify
multiple email addresses. When you
choose this option, the email is not
sent to the original recipient.
Move message to the recipients'
Junk email folder Email will be sent to
the recipients' Junk email folder. When
you choose this option, the email is still
sent to the original recipient but is not
placed in the recipient's inbox.
Deliver the message and add other
addresses to the Bcc line Email will
be delivered to the original recipient. In
addition, the users you identify will be
added to the bcc line of the message
before it's delivered. When you choose
this option, the email is still sent to the
original recipient's inbox.
Don't apply any action Email will be
delivered to the original recipient's
inbox. No other action will be taken on
the email message.
Turn on phishing protection tips
Enables anti-phishing safety tips in
email.
THIS SETTING DOES THIS USE WHEN YOU WANT TO:

Enable mailbox intelligence Enables or disables mailbox intelligence When you want to enhance
for this policy. You can only enable impersonation results for users based
mailbox intelligence for cloud-based on each user's individual sender map.
accounts, that is, accounts whose Mailbox intelligence is built around the
mailbox is hosted entirely in Office 365. people you send and receive mail from.
This intelligence allows Office 365 to
customize the impersonation policy at
a user-level in order to better handle
false positive results.

Add trusted senders and domains Defines email addresses and domains When users interact with domains or
that will not be considered users that trigger impersonation but
impersonations by this policy. are considered to be safe. For example,
Messages from the sender email if a partner has the same/similar
addresses and domains you add as display name or domain name as a
trusted senders and domains won't user defined on the list.
ever be classified as an impersonation-
based attack. As a result, the actions
and settings in this policy won't be
applied to messages from these
senders and domains.

Applied to Defines the recipients whose incoming Each policy must be associated with a
email messages will be subject to the set of users, for example, users in a
rules of the policy. You can create particular group or domain.
conditions and exceptions for the
recipients associated with the policy.
For example, you can create a global
policy for your organization by
applying the rule to all recipients in
your domain.
You can also create exception rules,
such as a rule that does not scan email
messages for a specific group of
recipients.

Advanced phishing thresholds Defines the level of settings for how When you want to be more aggressive
phishing messages are handled. in the treatment of potentially phishing
Standard Email suspected to be phish messages within Office 365. For
is handled in the standard way. example, messages with a very high
Aggressive Email suspected to be probability of being phish will have the
phish with a high or very high degree most aggressive actions taken on them
of confidence are handled by the while messages with a low probability
system in the same way. have less aggressive actions taken on
More aggressive Email suspected to them. This setting also impacts other
be phish with a medium, high, or very parts of the filtering system that
high degree of confidence are handled combine signals together. The chance
by the system in the same way. of moving good messages increases as
Most aggressive Email suspected to the level of settings increases.
be phish with a low, medium, high, or
very high degree of confidence are
handled by the system in the same
way.

Learn about anti-phishing policy options


As you set up or edit your anti-phishing, you can choose from several options, as described in the following table:
THIS SETTING DOES THIS USE WHEN YOU WANT TO:

Applied to Defines the recipients whose incoming Each policy must be associated with a
email messages will be subject to the set of users, for example, users in a
rules of the policy. You can create particular group or domain.
conditions and exceptions for the
recipients associated with the policy.
For example, you can create a global
policy for your organization by
applying the rule to all recipients in
your domain.
You can also create exception rules,
such as a rule that does not scan email
messages for a specific group of
recipients.

Choose actions Choose the action to take when Office When you want to take an action on
365 detects an intra-org or external- messages that Office 365 has
org spoofing attempt against your determined to be a spoofing attempt
users. These actions apply to any of internal or external domains as
incoming email that has been identified defined in the policy.
by Office 365 as a spoofing attempt for
users that are under the protection of
this anti-phishing policy.
Quarantine message Email will be
sent to Office 365 quarantine. When
you choose this option, the email is not
sent to the original recipient.
Move message to the recipients'
Junk email folder Email will be sent to
the recipients' Junk email folder. When
you choose this option, the email is still
sent to the original recipient but is not
placed in the recipient's inbox.
Don't apply any action Email will be
delivered to the original recipient's
inbox. No other action will be taken on
the email message.

After your organization has set up anti-phishing policies or ATP anti-phishing policies, you can see how the
service is working by viewing reports for Advanced Threat Protection.

Example: Anti-phishing policy to protect a user and a domain


This example sets up a policy called "Domain and CEO" that provides both user and domain protection from
impersonation and then applies the policy to all email received by users within the domain contoso.com . The
security administrator has determined that the policy must meet these business requirements:
The policy needs to provide protection for the CEO's email account and the entire domain.
Messages that are determined to be impersonation attempts against the CEO's user account need to be
redirected to the security administrator's email address.
Messages that are determined to be impersonation attempts against the domain are less urgent and
should be quarantined for later review.
The security administrator at Contoso might use values like the following in order to create an anti-phishing
policy that meets these needs.
Setting or option Example

Name Domain and CEO

Description Ensure that the CEO and our domain are not being
impersonated.

Add users to protect The CEO's email address at a minimum.

Add domains to protect The organizational domain that includes the office of the
CEO.

Choose actions If email is sent by an impersonated user: Choose Redirect


message to another email address and then type the
email address of the security administrator, for example,
securityadmin@contoso.com .
If email is sent by an impersonated domain: Choose
Quarantine message.

Mailbox intelligence By default, mailbox intelligence is selected when you create a


new anti-phishing policy. Leave this setting On for best
results.

Add trusted senders and domains For this example, don't define any overrides.

Applied to Select The recipient domain is. Under Any of these, select
Choose. Select + Add. Select the checkbox next to the name
of the domain, for example, contoso.com , in the list and
then select Add. Select Done.

Delete an anti-phishing or ATP anti-phishing policy


You can delete custom policies that you created by using the Security & Compliance Center. You can't delete the
default policy for your organization. We recommend using the Security & Compliance Center to review or edit
any of your ATP policies.
1. Go to https://protection.office.com and sign in with your work or school account.
2. In the left navigation, under Threat management, choose Policy.
3. On the Policy page, choose Anti-phishing or ATP anti-phishing.
4. On the Anti-phishing or ATP anti-phishing page, select the policy name from the list.
5. On the page that appears, choose Delete policy. Allow up to 30 minutes for your changes to spread to all
Office 365 datacenters.

Related topics
Office 365 Advanced Threat Protection
Anti-phishing protection in Office 365
ATP anti-phishing capabilities in Office 365
Set up ATP safe links policies in Office 365
Set up ATP safe attachments policies in Office 365
View the reports for Advanced Threat Protection
How Office 365 validates the From address to
prevent phishing
9/12/2018 • 6 minutes to read • Edit Online

Office 365 and Outlook.com email accounts receive an increasingly large number of phishing attacks. One
technique phishers use is to send messages that have values for the From: address that are not compliant with
RFC 5322. The From: address is also called the 5322.From address. To help prevent this type of phishing, Office
365 and Outlook.com require messages received by the service to include an RFC -compliant From: address as
described in this article.

NOTE
The information in this article requires you to have a basic understanding of the general format of email addresses. For more
information, see RFC 5322 (particularly sections 3.2.3, 3.4, and 3.4.1), RFC 5321, as well as RFC 3696. This article is about
policy enforcement for the 5322.From address. This article is not about the 5321.MailFrom address.

Unfortunately, there are still some legacy email servers on the Internet that continue to send "legitimate" email
messages that have a missing or malformed From: address. If you regularly receive email from organizations that
use these legacy systems, encourage those organizations to update their mail servers to comply with modern
security standards.
Microsoft will start rolling out enforcement of the policies described in this article on November 9, 2017.

How Office 365 enforces the use of a valid From: address to prevent
phishing attacks
Office 365 is making changes to the way it enforces the use of the From: address in messages it receives in order
to better protect you from phishing attacks. In this article:
All messages must include a valid From: address
Format of the From: address if you don't include a display name
Format of the From: address if you include a display name
Additional examples of valid and invalid From: addresses
Suppress auto-replies to your custom domain without breaking the From: policy
Overriding the Office 365 From: address enforcement policy
Other ways to prevent and protect against cybercrimes in Office 365
Sending on behalf of another user is not affected by this change, for more details, read Terry Zink's blog "What do
we mean when we refer to the 'sender' of an email?".
All messages must include a valid From: address
Some automated messages don't include a From: address when they are sent. In the past, when Office 365 or
Outlook.com received a message without a From: address, the service added the following default From: address
to the message in order to make it deliverable:
From: <>

Starting November 9, 2017, Office 365 will be rolling out changes to its datacenters and mail servers which will
enforce a new rule where messages without a From: address will no longer be accepted by Office 365 or
Outlook.com. Instead, all messages received by Office 365 must already contain a valid From: address. Otherwise,
the message will be sent to either the Junk Email or Deleted Items folders in Outlook.com and Office 365.
Syntax overview: Valid format for the From: address for Office 365
The format for the value of the From: address is defined in detail across several RFCs. There are many variations
on addressing and what may be considered valid or invalid. To keep it simple, Microsoft recommends that you use
the following format and definitions:

From: "displayname " <emailaddress >

Where:
(Optional) displayname is a phrase that describes the owner of the email address. For example, this might
be a more user-friendly name to describe the sender than the name of the mailbox. Using a display name is
optional. However, if you choose to use a display name, Microsoft recommends that you always enclose it
within quotation marks as shown.
(Required) emailaddress is made up of:

local-part @domain

Where:
(Required) local-part is a string that identifies the mailbox associated with the address. This is unique
within the domain. Often, the mailbox owner's username or GUID is used as the value for the local-
part.
(Required) domain is the fully-qualified domain name (FQDN ) of the mail server that hosts the
mailbox identified by the local-part of the email address.
Format of the From: address if you don't include a display name
A properly formatted From: address that does not include a display name includes only a single email address with
or without angle brackets. Microsoft recommends that you do not separate the angle brackets with spaces. In
addition, don't include anything after the email address.
The following examples are valid:

From: sender@contoso.com

From: <sender@contoso.com>

The following example is valid but not recommended because it contains spaces between the angle brackets and
the email address:

From: < sender@contoso.com >

The following example is invalid because it contains text after the email address:
From: "Office 365" <sender@contoso.com> (Sent by a process)

Format of the From: address if you include a display name


For From: addresses that include a value for the display name, the following rules apply:
If the sender address includes a display name, and the display name includes a comma, then the display
name must be enclosed within quotation marks. For example:
The following example is valid:

From: "Sender, Example" <sender.example@contoso.com>

The following example is not valid:

From: Sender, Example <sender.example@contoso.com>

Not enclosing the display name in quotation marks if that display name includes a comma is invalid
according to RFC 5322.
As a best practice, put quote marks around the display name regardless of whether or not there is a comma
within the display name.
If the sender address includes a display name, then the email address must be enclosed within angle
brackets.
As a best practice, Microsoft strongly recommends that you insert a space between the display name and
the email address.
Additional examples of valid and invalid From: addresses
Valid:

From: "Office 365" <sender@contoso.com>

Invalid. The email address is not enclosed with angle brackets:

From: Office 365 sender@contoso.com

Valid, but not recommended. The display name is not in quotes. As a best practice, always put quotation
marks around the display name:

From: Office 365 <sender@contoso.com>

Invalid. Everything is enclosed within quotation marks, not just the display name:

From: "Office 365 <sender@contoso.com>"

Invalid. There are no angle brackets around the email address:

From: "Office 365 <sender@contoso.com>" sender@contoso.com


Invalid. There is no space between the display name and left angle bracket:

From: Office 365<sender@contoso.com>

Invalid. There is no space between the closing quotation mark around the display name and the left angle
bracket.

From: "Office 365"<sender@contoso.com>

Suppress auto -replies to your custom domain without breaking the From: policy
With the new From: policy enforcement, you can no longer use From: <> to suppress auto-replies. Instead, you
need to set up a null MX record for your custom domain.
The mail exchanger (MX) record is a resource record in DNS that identifies the mail server that receives mail for
your domain. Auto-replies (and all replies) are naturally suppressed because there is no published address to
which the responding server can send messages.
When you set up a null MX record for your custom domain:
Choose a domain from which to send messages that doesn't accept (receive) email. For example, if your
primary domain is contoso.com, you might choose noreply.contoso.com.
Set up the null MX record for your domain. A null MX record consists of a single dot, for example:

noreply.contoso.com IN MX .

For more information about publishing a null MX, see RFC 7505.
Overriding the Office 365 From: address enforcement policy
Once roll out of the new policy is complete, you can only bypass this policy for inbound mail you receive from
Office 365 by using one of the following methods:
IP allow lists
Exchange Online mail flow rules
Microsoft strongly recommends against overriding the enforcement of the From: policy. Overriding this policy can
increase your organization's risk of exposure to spam, phishing, and other cybercrimes.
You cannot override this policy for outbound mail you send in Office 365. In addition, Outlook.com will not allow
overrides of any kind, even through support.
Other ways to prevent and protect against cybercrimes in Office 365
For more information on how you can strengthen your organization against cybercrimes like phishing, spamming,
data breaches, and other threats, see Security best practices for Office 365.

Related Topics
Backscatter messages and EOP
Anti-spoofing protection in Office 365
12/6/2018 • 37 minutes to read • Edit Online

This article describes how Office 365 mitigates against phishing attacks that uses forged sender domains, that is,
domains that are spoofed. It accomplishes this by analyzing the messages and blocking the ones that cannot be
authenticated using standard email authentication methods, nor other sender reputation techniques. This change is
being implemented to reduce the number of phishing attacks customers are exposed to.
This article also describes why this change is being made, how customers can prepare for this change, how to view
messages that will be affected, how to report on messages, how to mitigate false positives, as well as how senders
to Microsoft should prepare for this change.
Microsoft's anti-spoofing technology was initially deployed to its organizations that had an Office 365 Enterprise
E5 subscription or had purchased the Office 365 Advanced Threat Protection (ATP ) add-on for their subscription.
As of October, 2018 we've extended the protection to organizations that have Exchange Online Protection (EOP )
as well. Additionally, because of the way all of our filters learn from each other, Outlook.com users may also be
affected.

How spoofing is used in phishing attacks


When it comes to protecting its users, Microsoft takes the threat of phishing seriously. One of the techniques that
spammers and phishers commonly use is spoofing, which is when the sender is forged, and a message appears to
originate from someone or somewhere other than the actual source. This technique is often used in phishing
campaigns designed to obtain user credentials. Microsoft's Anti-spoof technology specifically examines forgery of
the 'From: header' which is the one that shows up in an email client like Outlook. When Microsoft has high
confidence that the From: header is spoofed, it identifies the message as a spoof.
Spoofing messages have two negative implications for real life users:
1. Spoofed messages deceive users
First, a spoofed message may trick a user into clicking a link and giving up their credentials, downloading malware,
or replying to a message with sensitive content (the latter of which is known as Business Email Compromise). For
example, the following is a phishing message with a spoofed sender of msoutlook94@service.outlook.com:
The above did not actually come from service.outlook.com, but instead was spoofed by the phisher to make it look
like it did. It is attempting to trick a user into clicking the link within the message.
The next example is spoofing contoso.com:

The message looks legitimate, but in fact is a spoof. This phishing message is a type of Business Email
Compromise which is a subcategory of phishing.
2. Users confuse real messages for fake ones
Second, spoofed messages create uncertainty for users who know about phishing messages but cannot tell the
difference between a real message and spoofed one. For example, the following is an example of an actual
password reset from the Microsoft Security account email address:
The above message did come from Microsoft, but at the same time, users are used to getting phishing messages
that may trick a user into clicking a link and giving up their credentials, downloading malware, or replying to a
message with sensitive content. Because it is difficult to tell the difference between a real password reset and a fake
one, many users ignore these messages, report them as spam, or unnecessarily report the messages back to
Microsoft as missed phishing scams.
To stop spoofing, the email filtering industry has developed email authentication protocols such as SPF, DKIM, and
DMARC. DMARC prevents spoofing examining a message's sender - the one that the user sees in their email client
(in the examples above, this is service.outlook.com, outlook.com, and accountprotection.microsoft.com) - with the
domain that passed SPF or DKIM. That is, the domain that the user sees has been authenticated and is therefore
not spoofed. For a more complete discussion, see the section "Understanding why email authentication is not
always enough to stop spoofing" later on in this document.
However, the problem is that email authentication records are optional, not required. Therefore, while domains
with strong authentication policies like microsoft.com and skype.com are protected from spoofing, domains that
publish weaker authentication policies, or no policy at all, are targets for being spoofed.As of March 2018, only 9%
of domains of companies in the Fortune 500 publish strong email authentication policies. The remaining 91% may
be spoofed by a phisher, and unless the email filter detects it using another policy, may be delivered to an end user
and deceive them:
The proportion of small-to-medium sized companies that are not in the Fortune 500 that publish strong email
authentication policies is smaller, and smaller still for domains that are outside of North America and western
Europe.
This is a big problem because while enterprises may not be aware of how email authentication works, phishers do
understand and take advantage of the lack of it.
For information on setting up SPF, DKIM, and DMARC, see the section "Customers of Office 365" later on in this
document.

Stopping spoofing with implicit email authentication


Because phishing and spear phishing is such a problem, and because of the limited adoption of strong email
authentication policies, Microsoft continues to invest in capabilities to protect its customers. Therefore, Microsoft is
moving ahead with implicit email authentication - if a domain doesn't authenticate, Microsoft will treat it as if it
had published email authentication records and treat it accordingly if it doesn't pass.
To accomplish this, Microsoft has built numerous extensions to regular email authentication including sender
reputation, sender/recipient history, behavioral analysis, and other advanced techniques. A message sent from a
domain that doesn't publish email authentication will be marked as spoof unless it contains other signals to
indicate that it is legitimate.
By doing this, end users can have confidence that an email sent to them has not been spoofed, senders can be
confident that nobody is impersonating their domain, and customers of Office 365 can offer even better protection
such as Impersonation protection.
To see Microsoft's general announcement, see A Sea of Phish Part 2 - Enhanced Anti-spoofing in Office 365.

Identifying that a message is classified as spoofed


Composite authentication
While SPF, DKIM, and DMARC are all useful by themselves, they don't communicate enough authentication status
in the event a message has no explicit authentication records. Therefore, Microsoft has developed an algorithm that
combines multiple signals into a single value called Composite Authentication, or compauth for short. Customers
in Office 365 have compauth values stamped into the Authentication-Results header in the message headers.

Authentication-Results:
compauth=<fail|pass|softpass|none> reason=<yyy>

COMPAUTH RESULT DESCRIPTION

fail Message failed explicit authentication (sending domain


published records explicitly in DNS) or implicit authentication
(sending domain did not publish records in DNS, so Office 365
interpolated the result as if it had published records).

pass Message passed explicit authentication (message passed


DMARC, or Best Guess Passed DMARC) or implicit
authentication with high confidence (sending domain does not
publish email authentication records, but Office 365 has
strong backend signals to indicate the message is likely
legitimate).

softpass Message passed implicit authentication with low-to-medium


confidence (sending domain does not publish email
authentication, but Office 365 has backend signals to indicate
the message is legitimate but the strength of the signal is
weaker).

none Message did not authenticate (or it did authenticate but did
not align), but composite authentication not applied due to
sender reputation or other factors.

Reason Description

0xx Message failed composite authentication.


000 means the message failed DMARC with an action of reject
or quarantine. - 001 means the message failed implicit email
authentication. This means that the sending domain did not
have email authentication records published, or if they did,
they had a weaker failure policy (SPF soft fail or neutral,
DMARC policy of p=none).
002 means the organization has a policy for the
sender/domain pair that is explicitly prohibited from sending
spoofed email, this setting is manually set by an administrator.
010 means the message failed DMARC with an action of reject
or quarantine, and the sending domain is one of your
organization's accepted-domains (this is part of self-to-self, or
intra-org, spoofing).
011 means the message failed implicit email authentication,
and the sending domain is one of your organization's accepted
domains (this is part of self-to-self, or intra-org, spoofing).

All other codes (1xx, 2xx, 3xx, 4xx, 5xx) Corresponds to various internal codes for why a message
passed implicit authentication, or had no authentication but
no action was applied.

By looking at the headers of a message, an administrator or even an end user can determine how Office 365
arrives at the conclusion that the sender may be spoofed.
Differentiating between different types of spoofing
Microsoft differentiates between two different types of spoofing messages:
Intra-org spoofing
Also known as self-to-self spoofing, this occurs when the domain in the From: address is the same as, or aligns
with, the recipient domain (when recipient domain is one of your organization's Accepted Domains); or, when the
domain in the From: address is part of the same organization.
For example, the following has sender and recipient from the same domain (contoso.com). Spaces are inserted into
the email address to prevent spambot harvesting on this page):
From: sender @ contoso.com
To: recipient @ contoso.com
The following has the sender and recipient domains aligning with the organizational domain (fabrikam.com):
From: sender @ foo.fabrikam.com
To: recipient @ bar.fabrikam.com
The following sender and recipient domains are different (microsoft.com and bing.com), but they belong to the
same organization (that is, both are part of the organization's Accepted Domains):
From: sender @ microsoft.com
To: recipient @ bing.com
Messages that fail intra-org spoofing contain the following values in the headers:
X-Forefront-Antispam-Report: ...CAT:SPM/HSPM/PHSH;...SFTY:9.11
The CAT is the category of the message, and it is normally stamped as SPM (spam), but occasionally may be
HSPM (high confidence spam) or PHISH (phishing) depending upon what other types of patterns occur in the
message.
The SFTY is the safety level of the message, the first digit (9) means the message is phishing, and second set of
digits after the dot (11) means it is intra-org spoofing.
There is no specific reason code for Composite Authentication for intra-org spoofing, that will be stamped later in
2018 (timeline not yet defined).
Cross-domain spoofing
This occurs when the sending domain in the From: address is an external domain to the receiving organization.
Messages that fail Composite Authentication due to cross-domain spoofing contain the following values in the
headers:
Authentication-Results: … compauth=fail reason=000/001
X-Forefront-Antispam-Report: ...CAT:SPOOF;...SFTY:9.22
In both cases, the following red safety tip is stamped in the message, or an equivalent that is customized to the
recipient mailbox's language:

It's only by looking at the From: address and knowing what your recipient email is, or by inspecting the email
headers, that you can differentiate between intra-org and cross-domain spoofing.
How customers of Office 365 can prepare themselves for the new anti-
spoofing protection
Information for administrators
As an administrator of an organization in Office 365, there are several key pieces of information you should be
aware of.
Understanding why email authentication is not always enough to stop spoofing
The new anti-spoofing protection relies on email authentication (SPF, DKIM, and DMARC ) to not mark a message
as spoofing. A common example is when a sending domain has never published SPF records. If there are no SPF
records or they are incorrectly set up, a sent message will be marked as spoofed unless Microsoft has back-end
intelligence that says the message is legitimate.
For example, prior to anti-spoofing being deployed, a message may have looked like the following with no SPF
record, no DKIM record, and no DMARC record:

Authentication-Results: spf=none (sender IP is 1.2.3.4)


smtp.mailfrom=example.com; contoso.com; dkim=none
(message not signed) header.d=none; contoso.com; dmarc=none
action=none header.from=example.com;
From: sender @ example.com
To: receiver @ contoso.com

After anti-spoofing, if you have Office 365 Enterprise E5, EOP, or ATP, the compauth value is stamped:

Authentication-Results: spf=none (sender IP is 1.2.3.4)


smtp.mailfrom=example.com; contoso.com; dkim=none
(message not signed) header.d=none; contoso.com; dmarc=none
action=none header.from=example.com; compauth=fail reason=001
From: sender @ example.com
To: receiver @ contoso.com

If example.com fixed this by setting up an SPF record but not a DKIM record, this would pass composite
authentication because the domain that passed SPF aligned with the domain in the From: address:

Authentication-Results: spf=pass (sender IP is 1.2.3.4)


smtp.mailfrom=example.com; contoso.com; dkim=none
(message not signed) header.d=none; contoso.com; dmarc=bestguesspass
action=none header.from=example.com; compauth=pass reason=109
From: sender @ example.com
To: receiver @ contoso.com

Or, if they set up a DKIM record but not an SPF record, this would also pass composite authentication because the
domain in the DKIM -Signature that passed aligned with the domain in the From: address:

Authentication-Results: spf=none (sender IP is 1.2.3.4)


smtp.mailfrom=example.com; contoso.com; dkim=pass
(signature was verified) header.d=outbound.example.com;
contoso.com; dmarc=bestguesspass action=none
header.from=example.com; compauth=pass reason=109
From: sender @ example.com
To: receiver @ contoso.com

However, a phisher may also set up SPF and DKIM and sign the message with their own domain, but specify a
different domain in the From: address. Neither SPF nor DKIM requires the domain to align with the domain in the
From: address, so unless example.com published DMARC records, this would not be marked as a spoof using
DMARC:

Authentication-Results: spf=pass (sender IP is 5.6.7.8)


smtp.mailfrom=maliciousDomain.com; contoso.com; dkim=pass
(signature was verified) header.d=maliciousDomain.com;
contoso.com; dmarc=none action=none header.from=example.com;
From: sender @ example.com
To: receiver @ contoso.com

In the email client (Outlook, Outlook on the web, or any other email client), only the From: domain is displayed, not
the domain in the SPF or DKIM, and that can mislead the user into thinking the message came from example.com,
but actually came from maliciousDomain.com.

For that reason, Office 365 requires that the domain in the From: address aligns with the domain in the SPF or
DKIM signature, and if it doesn't, contains some other internal signals that indicates that the message is legitimate.
Otherwise, the message would be a compauth fail.

Authentication-Results: spf=none (sender IP is 5.6.7.8)


smtp.mailfrom=maliciousDomain.com; contoso.com; dkim=pass
(signature was verified) header.d=maliciousDomain.com;
contoso.com; dmarc=none action=none header.from=contoso.com;
compauth=fail reason=001
From: sender@contoso.com
To: someone@example.com

Thus, Office 365 anti-spoofing protects against domains with no authentication, and against domains who set up
authentication but mismatch against the domain in the From: address as that is the one that the user sees and
believes is the sender of the message. This is true both of domains external to your organization, as well as
domains within your organization.
Therefore, if you ever receive a message that failed composite authentication and is marked as spoofed, even
though the message passed SPF and DKIM, it's because the domain that passed SPF and DKIM are not aligned
with the domain in the From: address.
Understanding changes in how spoofed emails are treated
Currently, for all organizations in Office 365 - ATP and non-ATP - messages that fail DMARC with a policy of reject
or quarantine are marked as spam and usually take the high confidence spam action, or sometimes the regular
spam action (depending on whether other spam rules first identify it as spam). Intra-org spoof detections take the
regular spam action. This behavior does not need to be enabled, nor can it be disabled.
However, for cross-domain spoofing messages, before this change they would go through regular spam, phish,
and malware checks and if other parts of the filter identified them as suspicious, would mark them as spam, phish,
or malware respectively. With the new cross-domain spoofing protection, any message that can't be authenticated
will, by default, take the action defined in the Anti-phishing > Anti-spoofing policy. If one is not defined, it will be
moved to a users Junk Email folder. In some cases, more suspicious messages will also have the red safety tip
added to the message.
This may result in some messages that were previously marked as spam still getting marked as spam but will now
also have a red safety tip; in other cases, messages that were previously marked as non-spam will start getting
marked as spam (CAT:SPOOF ) with a red safety tip added. In still other cases, customers that were moving all
spam and phish to the quarantine would now see them going to the Junk Mail Folder (this behavior can be
changed, see Changing your anti-spoofing settings).
There are multiple different ways a message can be spoofed (see Differentiating between different types of
spoofing earlier in this article) but as of March 2018 the way Office 365 treats these messages is not yet unified.
The following table is a quick summary, with Cross-domain spoofing protection being new behavior:

TYPE OF SPOOF CATEGORY SAFETY TIP ADDED? APPLIES TO

DMARC fail (quarantine or HSPM (default), may also be No (not yet) All Office 365 customers,
reject) SPM or PHSH Outlook.com

Self-to-self SPM Yes All Office 365 organizations,


Outlook.com

Cross-domain SPOOF Yes Office 365 Advanced Threat


Protection and E5 customers

Changing your anti-spoofing settings


To create or update your (cross-domain) anti-spoofing settings, navigate to the Anti-phishing > Anti-spoofing
settings under the Threat Management > Policy tab in the Security & Compliance Center. If you have never
created any anti-phishing settings, you will need to create one:
If you've already created one, you can select it to modify it:

Select the policy you just created and proceed through the steps as described on Learn More about Spoof
Intelligence.

To create a new policy via PowerShell:


$org = Get-OrganizationConfig
$name = "My first anti-phishing policy for " + $org.Name
# Note: The name should not exclude 64 characters, including spaces.
# If it does, you will need to pick a smaller name.
# Next, create a new anti-phishing policy with the default values
New-AntiphishPolicy -Name $Name
# Select the domains to scope it to
# Multiple domains are specified in a comma-separated list
$domains = "domain1.com, domain2.com, domain3.com"
# Next, create the anti-phishing rule, scope it to the anti-phishing rule
New-AntiphishRule -Name $name -AntiphishPolicy $name -RecipientDomainIs $domains

You may then modify the anti-phishing policy parameters using PowerShell, following the documentation at Set-
AntiphishPolicy. You may specify the $name as a parameter:

Set-AntiphishPolicy -Identity $name <fill in rest of parameters>

Later in 2018, rather than you having to create a default policy, one will be created for you that is scoped to all the
recipients in your organization so you don't have to specify it manually (the screenshots below are subject to
change before the final implementation).

Unlike a policy that you create, you cannot delete the default policy, modify its priority, or choose which users,
domains, or groups to scope it to.

To set up your default protection via PowerShell:

$defaultAntiphishPolicy = Get-AntiphishPolicy | ? {$_.IsDefault -eq $true}


Set-AntiphishPolicy -Identity $defaultAntiphishPolicy.Name -EnableAntispoofEnforcement <$true|$false>
You should only disable anti-spoofing protection if you have another mail server or servers in front of Office 365
(see Legitimate scenarios to disable anti-spoofing for more details).

$defaultAntiphishPolicy = Get-AntiphishiPolicy | ? {$_.IsDefault $true}


Set-AntiphishPolicy -Identity $defaultAntiphishPolicy.Name -EnableAntispoofEnforcement $false

IMPORTANT
If the first hop in your email path is Office 365, and you are getting too many legitimate emails marked as spoof, you should
first set up your senders that are allowed to send spoofed email to your domain (see the section "Managing legitimate
senders who are sending unauthenticated email" ). If you are still getting too many false positives (e.g., legitimate messages
marked as spoof), we do NOT recommend disabling anti-spoofing protection altogether. Instead, we recommend choosing
Basic instead of High protection. It is better to work through false positives than to expose your organization to spoofed
email which could end up imposing significantly higher costs in the long term.

Managing legitimate senders who are sending unauthenticated email


Office 365 keeps track of who is sending unauthenticated email to your organization. If the service thinks the
sender is not legitimate, it will mark it as a compauth failure. This will be classified as SPOOF although it depends
on your anti-spoofing policy that was applied to the message.
However, as an administrator, you can specify which senders are permitted to send spoofed email, overriding
Office 365's decision.
Method 1 - If your organization owns the domain, set up email authentication
This method can be used to resolve intra-org spoofing, and cross-domain spoofing in cases where you own or
interact with multiple tenants. It also helps resolve cross-domain spoofing where you send to other customers
within Office 365, and also third parties that are hosted in other providers.
For more details, see Customers of Office 365.
Method 2 - Use Spoof intelligence to configure permitted senders of unauthenticated email
You can also use Spoof Intelligence to permit senders to transmit unauthenticated messages to your organization.
For external domains, the spoofed user is the domain in the From address, while the sending infrastructure is
either the sending IP address (divided up into /24 CIDR ranges), or the organizational domain of the PTR record
(in the screenshot below, the sending IP might be 131.107.18.4 whose PTR record is
outbound.mail.protection.outlook.com, and this would show up as outlook.com for the sending infrastructure).
To permit this sender to send unauthenticated email, change the No to a Yes.
You can also use PowerShell to allow specific sender to spoof your domain:

$file = "C:\My Documents\Summary Spoofed Internal Domains and Senders.csv"

Get-PhishFilterPolicy -Detailed -SpoofAllowBlockList -SpoofType External | Export-CSV $file

In the previous image, additional line breaks have been added to make this screenshot fit, but in actuality all the
values would appear on a single line.
Edit the file and look for the line that corresponds to outlook.com and bing.com, and change the AllowedToSpoof
Entry from No to Yes:

Save the file, and then run:

$UpdateSpoofedSenders = Get-Content -Raw "C:\My Documents\Spoofed Senders.csv"


Set-PhishFilterPolicy -Identity Default -SpoofAllowBlockList $UpdateSpoofedSenders
This will now allow bing.com to send unauthenticated email from *.outlook.com.
Method 3 - Create an allow entry for the sender/recipient pair
You can also choose to bypass all spam filtering for a particular sender. For more details, see How to securely add a
sender to an allow list in Office 365.
If you use this method, it will skip spam and some of the phish filtering, but not malware filtering.
Method 4 - Contact the sender and ask them to set up email authentication
Because of the problem of spam and phishing, Microsoft recommends all senders set up email authentication. If
you know an administrator of the sending domain, contact them and request that they set up email authentication
records so you do not have to add any overrides. For more information, see Administrators of domains that are not
Office 365 customers" later in this article.
While it may be difficult at first to get sending domains to authenticate, over time, as more and more email filters
start junking or even rejecting their email, it will cause them to set up the proper records to ensure better delivery.
Viewing reports of how many messages were marked as spoofed
Once your anti-spoofing policy is enabled, you can use Threat Intelligence to get numbers around how many
messages are marked as phish. To do this, go into the Security & Compliance Center (SCC ) under Threat
Management > Explorer, set the View to Phish, and group by Sender Domain or Protection Status:

You can interact with the various reports to see how many were marked as phishing, including messages marked
as SPOOF. To learn more, see Get started with Office 365 Threat Intelligence.
You cannot yet split out which messages were marked due to spoofing vs. other types of phishing (general
phishing, domain or user impersonation, and so on). However, later in 2018, you will be able to do this through the
Security & Compliance Center. Once you do, you can use this report as a starting place to identify sending
domains that may be legitimate that are being marked as spoof due to failing authentication.
The following screenshot is a proposal for how this data will look, but may change when released:
For non-ATP and E5 customers, these reports will be available later in 2018 under the Threat Protection Status
(TPS ) reports, but will be delayed by at least 24 hours. This page will be updated as they are integrated into the
Security & Compliance Center.
Predicting how many messages will be marked as spoof
Later in 2018, once Office 365 updates its settings to let you turn the anti-spoofing enforcement Off, or on with
Basic or High enforcement, you will be given the ability to see how message disposition will change at the various
settings. That is, if anti-spoofing is Off, you will be able to see how many messages will be detected as Spoof if you
turn to Basic; or, if it's Basic, you will be able to see how many more messages will be detected as Spoof if you turn
it to High.
This feature is currently under development. As more details are defined, this page will be updated both with
screenshots of the Security and Compliance Center, and with PowerShell examples.
Understanding how spam, phishing, and advanced phishing detections are combined
Organizations that use Exchange Online, with or without ATP, can specify which actions to take when the service
identifies messages as malware, spam, high confidence spam, phishing, and bulk. With the ATP Anti-phishing
policies for ATP customers, and the Anti-phishing policies for EOP customers, and the fact that a message may hit
multiple detection types (for example, malware, phishing, and user-impersonation), there may be some confusion
as to which policy applies.
In general, the policy applied to a message is identified in the X-Forefront-Antispam-Report header in the CAT
(Category) property.

PRIORITY POLICY CATEGORY WHERE MANAGED? APPLIES TO

1 Malware MALW Malware policy All organizations

2 Phishing PHSH Hosted content filter All organizations


policy

3 High confidence spam HSPM Hosted content filter All organizations


policy

4 Spoofing SPOOF Anti-phishing policy, All organizations


Spoof intelligence

5 Spam SPM Hosted content filter All organizations


policy

6 Bulk BULK Hosted content filter All organizations


policy

7 Domain DIMP Anti-phishing policy Organizations with


Impersonation ATP only

8 User Impersonation UIMP Anti-phishing policy Organizations with


ATP only

If you have multiple different Anti-phishing policies, the one at the highest priority will apply. For example, suppose
you have two policies:

USER/DOMAIN
POLICY PRIORITY IMPERSONATION ANTI-SPOOFING

A 1 On Off

B 2 Off On

If a message comes in and is identified as both spoofing and user impersonation, and the same set of users is
scoped to Policy A and Policy B, then the message is treated as a spoof but no action is applied since Anti-spoofing
is turned off, and SPOOF runs at a higher priority (4) than User Impersonation (8).
To make other types of phishing policy apply, you will need to adjust the settings of who the various policies are
applied to.
Legitimate scenarios to disable anti-spoofing
Anti-spoofing better protects customers from phishing attacks, and therefore disabling anti-spoofing protection is
strongly discouraged. By disabling it, you may resolve some short-term false positives, but long term you will be
exposed to more risk. The cost for setting up authentication on the sender side, or making adjustments in the
phishing policies, are usually one-time events or require only minimal, periodic maintenance. However, the cost to
recover from a phishing attack where data has been exposed, or assets have been compromised is much higher.
For this reason, it is better to work through anti-spoofing false positives than to disable anti-spoof protection.
However, there is a legitimate scenario where anti-spoofing should be disabled, and that is when there are
additional mail-filtering products in the message routing, and Office 365 is not the first hop in the email path:

The other server may be an Exchange on-premise mail server, a mail filtering device such as Ironport, or another
cloud hosted service.
If the MX record of the recipient domain does not point to Office 365, then there is no need to disable anti-
spoofing because Office 365 looks up your receiving domain's MX record and suppresses anti-spoofing if it points
to another service. If you don't know if your domain has another server in front, you can use a website like MX
Toolbox to look up the MX record. It might say something like the following:

This domain has an MX record that does not point to Office 365, so Office 365 would not apply anti-spoofing
enforcement.
However, if the MX record of the recipient domain does point to Office 365, even though there is another service in
front of Office 365, then you should disable anti-spoofing. The most common example is through the use of a
recipient rewrite:
The domain contoso.com's MX record points to the on-premise server, while the domain @office365.contoso.net's
MX record points to Office 365 because it contains *.protection.outlook.com, or *.eo.outlook.com in the MX record:

Be sure to differentiate when a recipient domain's MX record does not point to Office 365, and when it has
undergone a recipient rewrite. It is important to tell the difference between these two cases.
If you are unsure whether or not your receiving domain has undergone a recipient-rewrite, sometimes you can tell
by looking at the message headers.
a) First, look at the headers in the message for the recipient domain in the Authentication-Results header:

Authentication-Results: spf=fail (sender IP is 1.2.3.4)


smtp.mailfrom=example.com; office365.contoso.net; dkim=fail
(body hash did not verify) header.d=simple.example.com;
office365.contoso.net; dmarc=none action=none
header.from=example.com; compauth=fail reason=001

The recipient domain is found in the bold red text above, in this case office365.contoso.net. This may be different
that the recipient in the To: header:
To: Example Recipient <recipient @ contoso.com>
Perform an MX-record lookup of the actual recipient domain. If it contains *.protection.outlook.com,
mail.messaging.microsoft.com, *.eo.outlook.com, or mail.global.frontbridge.com, that means that the MX points to
Office 365.
If it does not contain those values, then it means that the MX does not point to Office 365. One tool you can use to
verify this is MX Toolbox.
For this particular example, the following says that contoso.com, the domain that looks like the recipient since it
was the To: header, has MX record points to an on-prem server:
However, the actual recipient is office365.contoso.net whose MX record does point to Office 365:

Therefore, this message has likely undergone a recipient-rewrite.


b) Second, be sure to distinguish between common use cases of recipient rewrites. If you are going to rewrite the
recipient domain to *.onmicrosoft.com, instead rewrite it to *.mail.onmicrosoft.com.
Once you have identified the final recipient domain that is routed behind another server and the recipient domain's
MX record actually points to Office 365 (as published in its DNS records), you may proceed to disable anti-
spoofing.
Remember, you don't want to disable anti-spoofing if the domain's first hop in the routing path is Office 365, only
when it's behind one or more services.
How to disable anti-spoofing
If you already have an Anti-phishing policy created, set the EnableAntispoofEnforcement parameter to $false:

$name = "<name of policy>"


Set-AntiphishPolicy -Identity $name -EnableAntiSpoofEnforcement $false

If you don't know the name of the policy (or policies) to disable, you can display them:

Get-AntiphishPolicy | fl Name

If you don't have any existing anti-phishing policies, you can create one and then disable it (even if you don't have a
policy, anti-spoofing is still applied; later on in 2018, a default policy will be created for you and you can then
disable that instead of creating one). You will have to do this in multiple steps:

$org = Get-OrganizationConfig
$name = "My first anti-phishing policy for " + $org.Name
# Note: If the name is more than 64 characters, you will need to choose a smaller one
# Next, create a new anti-phishing policy with the default values
New-AntiphishPolicy -Name $Name
# Select the domains to scope it to
# Multiple domains are specified in a comma-separated list
$domains = "domain1.com, domain2.com, domain3.com"
# Next, create the anti-phishing rule, scope it to the anti-phishing rule
New-AntiphishRule -Name $name -AntiphishPolicy -RecipientDomainIs $domains
# Finally, scope the antiphishing policy to the domains
Set-AntiphishPolicy -Identity $name -EnableAntispoofEnforcement $false

Disabling anti-spoofing is only available via cmdlet (later in Q2 2018 it will be available in the Security &
Compliance Center). If you do not have access to PowerShell, create a support ticket.
Remember, this should only be applied to domains that undergo indirect routing when sent to Office 365. Resist
the temptation to disable anti-spoofing because of some false positives, it will be better in the long run to work
through them.
Information for individual users
Individual users are limited in how they can interact with the anti-spoofing safety tip. However, there are several
things you can do to resolve common scenarios.
Common scenario #1 - Mailbox forwarding
If you use another email service and forward your email to Office 365 or Outlook.com, your email may be marked
as spoofing and receive a red safety tip. Office 365 and Outlook.com plan to address this automatically when the
forwarder is one of Outlook.com, Office 365, Gmail, or any other service that uses the ARC protocol. However,
until that fix is deployed, users should use the Connected Accounts feature to import their messages directly, rather
than using the forwarding option.
To set up connected accounts in Office 365, select the Gear icon in the top right corner of the Office 365 web
interface > Mail > Mail > Accounts > Connected accounts.

In Outlook.com, the process is the Gear icon > Options > Mail > Accounts > Connected accounts.
Common scenario #2 - Discussion lists
Discussion lists are known to have problems with anti-spoofing due to the way they forward the message and
modify its contents yet retain the original From: address.
For example, suppose your email address is user @ contoso.com, and you are interested in Bird Watching and join
the discussion list birdwatchers @ example.com. When you send a message to the discussion list, you might send it
this way:
From: John Doe <user @ contoso.com>
To: Birdwatcher's Discussion List <birdwatchers @ example.com>
Subject: Great viewing of blue jays at the top of Mt. Rainier this week
Anyone want to check out the viewing this week from Mt. Rainier?
When the email list receives the message, they format the message, modify its contents, and replay it to the rest of
the members on the discussion list which is made up of participants from many different email receivers.
From: John Doe <user @ contoso.com>
To: Birdwatcher's Discussion List <birdwatchers @ example.com>
Subject: [BIRDWATCHERS ] Great viewing of blue jays at the top of Mt. Rainier this week
Anyone want to check out the viewing this week from Mt. Rainier?

This message was sent to the Birdwatchers Discussion List. You can unsubscribe at any time.
In the above, the replayed message has the same From: address (user @ contoso.com) but the original message
has been modified by adding a tag to the Subject line, and a footer to the bottom of the message. This type of
message modification is common in mailing lists, and may result in false positives.
If you or someone in your organization is an administrator of the mailing list, you may be able to configure it to
pass anti-spoofing checks.
Check the FAQ at DMARC.org: I operate a mailing list and I want to interoperate with DMARC, what should
I do?
Read the instructions at this blog post: A tip for mailing list operators to interoperate with DMARC to avoid
failures
Consider installing updates on your mailing list server to support ARC, see https://arc-spec.org
If you do not have ownership of the mailing list:
You can request the maintainer of the mailing list to implement one of the options above (they should also
have email authentication set up for the domain the mailing list is relaying from)
You can create mailbox rules in your email client to move messages to the Inbox. You can also request your
organization's administrators to set up allow rules, or overrides as discussed in the section Managing
legitimate senders who are sending unauthenticated email
You can create a support ticket with Office 365 to create an override for the mailing list to treat it as
legitimate
Other scenarios
1. If neither of the above common scenarios applies to your situation, report the message as a false positive
back to Microsoft. For more information, see the section How can I report spam or non-spam messages
back to Microsoft? later in this article.
2. You may also contact your email administrator who can raise it as a support ticket with Microsoft. The
Microsoft engineering team will investigate why the message was marked as a spoof.
3. Additionally, if you know who the sender is and are confident they are not being maliciously spoofed, you
may reply back to the sender indicating that they are sending messages from a mail server that does not
authenticate. This sometimes results in the original sender contacting their IT administrator who will set up
the required email authentication records.
When enough senders reply back to domain owners that they should set up email authentication records, it spurs
them into taking action. While Microsoft also works with domain owners to publish the required records, it helps
even more when individual users request it.
4. Optionally, add the sender to your Safe Senders list. However, be aware that if a phisher spoofs that account, it
will be delivered to your mailbox. Therefore, this option should be used sparingly.

How senders to Microsoft should prepare for anti-spoofing protection


If you are an administrator who currently sends messages to Microsoft, either Office 365 or Outlook.com, you
should ensure that your email is properly authenticated otherwise it may be marked as spam or phish.
Customers of Office 365
If you are an Office 365 customer and you use Office 365 to send outbound email:
For your domains, Set up SPF in Office 365 to help prevent spoofing
For your primary domains, Use DKIM to validate outbound email sent from your custom domain in Office
365
Consider setting up DMARC records for your domain to determine who are your legitimate senders
Microsoft does not provide detailed implementation guidelines for each of SPF, DKIM, and DMARC. However,
there is a lot of information published online. There are also 3rd party companies dedicated to helping your
organization set up email authentication records.
Administrators of domains that are not Office 365 customers
If you are a domain administrator but are not an Office 365 customer:
You should set up SPF to publish your domain's sending IP addresses, and also set up DKIM (if available) to
digitally sign messages. You may also consider setting up DMARC records.
If you have bulk senders who are transmitting email on your behalf, you should work with them to send
email in a way such that the sending domain in the From: address (if it belongs to you) aligns with the
domain that passes SPF or DMARC.
If you have on-premise mail servers, or send from a Software-as-a-service provider, or from a cloud-hosting
service like Microsoft Azure, GoDaddy, Rackspace, Amazon Web Services, or similar, you should ensure that
they are added to your SPF record.
If you are a small domain that is hosted by an ISP, you should set up your SPF record according to the
instructions that is provided to you by your ISP. Most ISPs provide these types of instructions and can be
found on the company's support pages.
Even if you have not had to publish email authentication records before, and it worked fine, you must still
publish email authentication records to send to Microsoft. By doing so, you are helping in the fight against
phishing, and reducing the possibility that either you, or organizations you send to, will get phished.
What if you don't know who sends email as your domain?
Many domains do not publish SPF records because they do not know who all their senders are. That's okay, you do
not need to know who all of them are. Instead, you should get started by publishing an SPF record for the ones
you do know of, especially where your corporate traffic is located, and publish a neutral SPF policy, ?all:
example.com IN TXT "v=spf1 include:spf.example.com ?all"
The neutral SPF policy means that any email that comes out of your corporate infrastructure will pass email
authentication at all other email receivers. Email that comes from senders you don't know about will fall back to
neutral, which is almost the same as publishing no SPF record at all.
When sending to Office 365, email that comes from your corporate traffic will be marked as authenticated, but the
email that comes from sources you don't know about may still be marked as spoof (depending upon whether or
not Office 365 can implicitly authenticate it). However, this is still an improvement from all email being marked as
spoof by Office 365.
Once you've gotten started with an SPF record with a fallback policy of ?all, you can gradually include more and
more sending infrastructure and then publish a stricter policy.
What if you are the owner of a mailing list?
See the section Common scenario #2 - Discussion lists.
What if you are an infrastructure provider such as an Internet Service Provider (ISP), Email Service Provider
(ESP), or cloud hosting service?
If you host a domain's email, and it sends email, or provide hosting infrastructure that can send email, you should
do the following:
Ensure your customers have documentation detailing what to publish in their SPF records
Consider signing DKIM -signatures on outbound email even if the customer doesn't explicitly set it up (sign
with a default domain). You can even double-sign the email with DKIM signatures (once with the customer's
domain if they have set it up, and a second time with your company's DKIM signature)
Deliverability to Microsoft is not guaranteed even if you authenticate email originating from your platform, but at
least it ensures that Microsoft does not junk your email because it is not authenticated. For more details around
how Outlook.com filters email, see the Outlook.com Postmaster page.
For more details on service providers best practices, see M3AAWG Mobile Messaging Best Practices for Service
Providers.

Frequently Asked Questions


Why is Microsoft making this change?
Because of the impact of phishing attacks, and because email authentication has been around for over 15 years,
Microsoft believes that the risk of continue to allow unauthenticated email is higher than the risk of losing
legitimate email.
Will this change cause legitimate email to be marked as spam?
At first, there will be some messages that are marked as spam. However, over time, senders will adjust and then
the amount of messages mislabeled as spoofed will be negligible for most email paths.
Microsoft itself first adopted this feature several weeks before deploying it to the rest of its customers. While there
was disruption at first, it gradually declined.
Will Microsoft bring this feature to Outlook.com and non-Advanced Threat Protection customers of Office 365?
Microsoft's anti-spoofing technology was initially deployed to its organizations that had an Office 365 Enterprise
E5 subscription or had purchased the Office 365 Advanced Threat Protection (ATP ) add-on for their subscription.
As of October, 2018 we've extended the protection to organizations that have Exchange Online Protection (EOP )
as well. In the future, we may release it for Outlook.com. However, if we do, there may be some capabilities that are
not applied such as reporting and custom overrides.
How can I report spam or non-spam messages back to Microsoft?
You can either use the Report Message Add-in for Outlook, or if it isn't installed, Submit spam, non-spam, and
phishing scam messages to Microsoft for analysis.
I'm a domain administrator who doesn't know who all my senders are!
Please see Administrators of domains that are not Office 365 customers.
What happens if I disable anti-spoofing protection for my organization, even though Office 365 is my primary
filter?
We do not recommend this because you will be exposed to more missed phishing and spam messages. Not all
phishing is spoofing, and not all spoofs will be missed. However, your risk will be higher than a customer who
enables anti-spoofing.
Does enabling anti-spoofing protection mean I will be protected from all phishing?
Unfortunately, no, because phishers will adapt to use other techniques such as compromised accounts, or setting
up accounts of free services. However, anti-phishing protection works much better to detect these other types of
phishing methods because Office 365's protection layers are designed work together and build on top of each
other.
Do other large email receivers block unauthenticated email?
Nearly all large email receivers implement traditional SPF, DKIM, and DMARC. Some receivers have other checks
that are more strict than just those standards, but few go as far as Office 365 to block unauthenticated email and
treat them as a spoof. However, most of the industry is becoming more and more strict about this particular type
of email, particularly because of the problem of phishing.
Do I still need the Advanced Spam Filtering option enabled for "SPF Hard Fail" if I enable anti-spoofing?
No, this option is no longer required because the anti-spoofing feature not only considers SPF hard fails, but a
much wider set of criteria. If you have anti-spoofing enabled and the SPF Hard Fail option enabled, you will
probably get more false positives. We recommend disabling this feature as it would provide almost no additional
catch for spam or phish, and instead generate mostly false positives.
Does Sender Rewriting Scheme (SRS ) help fix forwarded email?
SRS only partially fixes the problem of forwarded email. By rewriting the SMTP MAIL FROM, SRS can ensure that
the forwarded message passes SPF at the next destination. However, because anti-spoofing is based upon the
From: address in combination with either the MAIL FROM or DKIM -signing domain (or other signals), it is not
enough to prevent forwarded email from being marked as spoofed.
Learn more about spoof intelligence
10/23/2018 • 10 minutes to read • Edit Online

Use spoof intelligence in the Security & Compliance Center on the Anti-spam settings page to review all
senders who are spoofing either domains that are part of your organization, or spoofing external domains. Spoof
intelligence is available as part of Office 365 Enterprise E5 or separately as part of Advanced Threat Protection
(ATP ) and as of October, 2018 Exchange Online Protection (EOP ).

What types of email spoofing can I review and which should I protect
against with spoof intelligence?
For domains you own, you can review senders who are spoofing your domain and then choose to allow the
sender to continue or block the sender. For external domains, you can allow the sender domain combined with the
sending infrastructure, although not an individual sending email address.
When a sender spoofs an email address, they appear to be sending mail on behalf of one or more user accounts
within one of your organization's domains, or an external domain sending to your organization. Surprisingly, there
are some legitimate business reasons for spoofing. For example, in these cases, you wouldn't block the sender
from spoofing your domain:
You have third-party senders who use your domain to send bulk mail to your own employees for company
polls.
You have hired an external company to generate and send out advertising or product updates on your
behalf.
An assistant who regularly needs to send email for another person within your organization.
An application that is configured to spoof its own organization in order to send internal notifications by
email.
External domains frequently send spoofed email, and many of these reasons are legitimate. For example, here are
some legitimate cases when external senders send spoofed email:
The sender is on a discussion mailing list, and the mailing list is relaying the email from the original sender
to all the participants on the mailing list.
An external company is sending email on behalf of another company (for example, an automated report, or
a software-as-a-service company).
You need a way to ensure that the mail sent by legitimate spoofers doesn't get caught up in spam filters in Office
365 or external email systems. Normally, Office 365 treats these email messages as spam. As an Office 365
admin, you have the ability to prevent this by setting up spoof filters in the Security & Compliance Center. If you
own the domain, you can configure SPF, DKIM, and DMARC to allow for these senders.
On the other hand, malicious spoofers, those senders that are spoofing your domain, or external domains, to send
spam or phishing email, need to be blocked. Spoofing is also a common way for phishers to get user credentials.
Office 365 has built-in spoof protection to help shield your organization from senders of these malicious emails.
Spoof protection for your organization's domains is always on for all Office 365 customers, and external domain
spoof protection is on by default for Advanced Threat Protection customers and as of October, 2018 EOP
customers as well. To further strengthen this protection, tell us which senders are authorized to spoof your
organization's domains and send email on your behalf, and if any external domains are permitted to spoof. Any
email sent from a sender that you don't authorize will be treated as spam or spoofing by Office 365. Keep an eye
on the senders spoofing your domain and help us improve spoof intelligence by using the Security & Compliance
Center.

Managing spoof intelligence in the Security & Compliance Center


The spoof intelligence policy you set up is always enforced by Office 365. You cannot disable it, but you can
choose how much you want to actively manage it.
You can review the senders who are spoofing your domain, or external domains, and then decide whether each
sender should be allowed to do so by using the Security & Compliance Center. For each spoofed user account that
a sender spoofs from your domain or an external domain, you can view the information in the following table.

PARAMETER DESCRIPTION

Sender Also called the true sender. This is usually the domain from
which the spoof email originates. Office 365 determines the
domain of the pointer (PTR) DNS record of the sending IP
address that is spoofing your organization. If no domain is
found, the report displays the sender's IP address instead.

Spoofed user The user account that is being spoofed by the sender.
Internal tab only. This field contains a single email address, or
if the sender is spoofing multiple user accounts, it contains
More than one.
External tab only. External domains only contain a sending
domain, and do not contain a full email address.
Tip! For advanced admins. The spoofed user is the From
(5322.From) address which is also the address displayed as
the From address by the mail client. This is sometimes called
the header.from address. The validity of this address is not
checked by SPF.

Number of messages The number of mail messages sent by the sender to your
organization on behalf of the identified spoofed sender or
senders within the last 30 days.

Number of user complaints Complaints filed by users against this sender by your users
within the last 30 days. Complaints are usually in the form of
junk submissions to Microsoft.

Authentication result This value is Passed if the sender passed Exchange Online
Protection (EOP) sender authentication checks, such as SPF or
DKIM, Failed if the sender failed EOP sender authentication
checks, or Unknown if the result of these checks isn't known.

Decision set by Shows whether the Office 365 administrator or the spoof
intelligence policy determined whether or not the sender is
allowed to spoof the user.

Last seen The last date on which a message was received by this sender
on behalf of this spoofed user.
PARAMETER DESCRIPTION

Allowed to spoof? Displays whether or not this sender is allowed to send email
on behalf of the spoofed user. Possible values include:
Yes All spoofed addresses from this spoofing sender will be
allowed to spoof your organization.
No Spoofed addresses from this spoofing sender won't be
allowed to spoof your organization. Instead, messages from
this sender will be marked as spam by Office 365.
Some users If a sender is spoofing multiple users, some
spoofed addresses from this sender will be allowed to spoof
your organization, the rest will be marked as spam. Use the
Detailed tab to see the specific addresses.

Spoof Type This value is Internal if the domain is one of your


organization's provisioned domains, otherwise the value is
External.

To manage senders who are spoofing your domain by using the Security & Compliance Center
1. Go to the Security & Compliance Center.
2. Sign in to Office 365 with your work or school account. Your account must have administrator credentials
in your Office 365 organization.
3. In the Security & Compliance Center, expand Threat Management > Policy > Anti-spam.

4. On the Anti-spam settings page in the right pane, select the Custom tab, and then scroll down and
expand Spoof intelligence policy.
5. To view the list of senders spoofing your domain, choose Review new senders and select the Your
Domains tab.
If you've already reviewed senders, and want to change some of your previous choices, you can choose
Show me senders I already reviewed instead. In either case, the following panel appears.
Each spoofed user is displayed in a separate row so that you can choose whether to allow or block the
sender from spoofing each user individually.
To add a sender to the allow list for a user, select Yes from the Allowed to spoof column. To add a sender
to the block list for a user, choose No.
To set the policy for domains you do not own, select the External Domains tab. Change any sender to Yes
in the Allowed to Spoof column to permit that sender to send unauthenticated email into your
organization. Alternatively, if you think Office 365 has made a mistake in permitting the sender to send
spoofed email, change the Allowed to spoof column to No.
6. Choose Save to save any changes.
If you have an Office 365 Enterprise E5 subscription or have separately purchased Advanced Threat Protection as
an add-on, you can also manage senders who are spoofing your domain through the Spoof Intelligence Insight.

Configuring the anti-spoofing policy


In addition to allowing or blocking a particular sender from sending spoofed email into your organization, you can
also configure how strict you want the filter to be, and the action to take when a spoofing message is found.
Anti-spoofing protection is applied to email from senders from domains that are external to your Office 365
organization. You can apply the policy to recipients whose mailboxes are licensed for Office 365 Enterprise E5,
Advanced Threat Protection and as of October, 2018 EOP customers as well. You manage the anti-spoofing policy
along with the other anti-phishing settings. For more information about anti-phishing settings, see Set up the
Office 365 anti-phishing policies.
Office 365 includes default anti-spoofing protection that's always running. This default protection is not visible in
the Security & Compliance Center or retrievable through Windows PowerShell cmdlets. You can't modify the
default anti-spoofing protection. Instead, you can configure how strictly Office 365 enforces the anti-spoofing
protection in each anti-phishing policy that you create.
Even though the anti-spoofing policy appears under the anti-phishing policy in the Security & Compliance Center,
it does not inherit its default behavior from the existing phishing setting under the Anti-spam configuration. If you
have settings under Anti-spam > Phishing that you want to replicate for anti-spoofing, you will need to create an
anti-phishing policy, then edit the spoof portion of the anti-phishing policy to reflect your spoof settings as
described in the following section, rather than accepting the default settings that run in the background.
To configure anti-spoofing protection within an anti-phishing policy by using the Security &
Compliance Center
1. Go to the Security & Compliance Center.
2. Sign in to Office 365 with your work or school account. Your account must have administrator credentials
in your Office 365 organization.
3. In the Security & Compliance Center, expand Threat Management > Policy > Anti-phishing.
4. On the Anti-phishing page in the right pane, select the anti-phishing policy you want to configure.
5. On the page that appears, in the Spoof row, choose Edit.
6. Next, configure the actions to take when a message is detected as a cross-domain spoof. The default
behavior is to move the message to the recipient's junk email folder. The other option is to send the
message to the quarantine. For more information about managing messages sent to quarantine, see
Quarantine email messages in Office 365.

7. Make your choice and then choose Save.

Other ways to manage spoofing and phishing with Office 365


Be diligent about spoofing and phishing protection. Here are related ways to check on senders spoofing your
domain and help prevent them from damaging your organization:
Check the Exchange Online Protection spoof mail report as part of your routine. You can use this report often
to view and help manage spoofed senders. For information, see Spoof mail report in Use mail protection
reports in Office 365 to view data about malware, spam, and rule detections.
For more advanced Office 365 admins, you can also complete these checks:
Review your Sender Policy Framework (SPF ) configuration. For a quick introduction to SPF and to get it
configured quickly, see Set up SPF in Office 365 to help prevent spoofing. For a more in-depth
understanding of how Office 365 uses SPF, or for troubleshooting or non-standard deployments such as
hybrid deployments, start with How Office 365 uses Sender Policy Framework (SPF ) to prevent spoofing.
Review your DomainKeys Identified Mail (DKIM ) configuration. You should use DKIM in addition to SPF
and DMARC to help prevent spoofers from sending messages that look like they are coming from your
domain. DKIM lets you add a digital signature to email messages in the message header. For information,
see Use DKIM to validate outbound email sent from your domain in Office 365.
Review your Domain-based Message Authentication, Reporting, and Conformance (DMARC )
configuration. Implementing DMARC with SPF and DKIM provides additional protection against spoofing
and phishing email. DMARC helps receiving mail systems determine what to do with messages sent from
your domain that fail SPF or DKIM checks. For information, see Use DMARC to validate email in Office
365.
Use the Get-PhishFilterPolicy Windows PowerShell cmdlet to gather detailed data on spoofed senders,
generate allow and block lists, and help you determine how to generate more comprehensive SPF, DKIM,
and DMARC DNS records without having your legitimate email get caught in external spam filters. For
more information, see How antispoofing protection works in Office 365.
Office 365 email anti-spam protection
7/18/2018 • 5 minutes to read • Edit Online

Are you concerned about too much spam in Office 365? We've built multiple spam filters into your Office 365 or
Exchange Online Protection (EOP ) service, so your email is protected from the moment you receive your first
message. In order to help prevent spam in Office 365, you may want to change a protection setting to deal with a
specific issue in your organization—say you're receiving a lot of spam from a particular sender, for example—or to
simply fine tune your settings so that they're tailored to best meet the needs of your organization. To do this, you
can change anti-spam settings in the Office 365 Security & Compliance Center.
This article is intended for Office 365 administrators. If you're not an administrator, but you are an Office 365 user
and you want to learn how to deal with spam you receive, this isn't the article you're looking for. Instead, if you use
Outlook for PC or Outlook for Mac, start with Overview of the Junk Email Filter. If you use Outlook on the web,
start with Learn about junk email and phishing.

These options help you prevent spam in Office 365


Connection filtering. When you use connection filtering, Office 365 checks the reputation of the sender before
allowing a message to get through. You can create an allow list, or safe sender list, to make sure you receive every
message sent to you from a specific IP address or IP address range. You can also create a list of IP addresses from
which to block messages, called a block list. For more information, see Configure the Connection Filter Policy. If
you're concerned about spam in Office 365, use connection filtering to help prevent spam.
For customers who have Office 365 Enterprise E5 or have purchased Advanced Threat Protection (ATP ) licenses,
connection filtering is used by spoof intelligence to create allow and block lists of senders who are spoofing your
domain. For more information, see Learn more about spoof intelligence.
Spam filtering. Office 365 checks for message characteristics consistent with spam by using spam filtering. You
can change what actions to take on messages identified as spam, and choose whether to filter messages written in
specific languages, or sent from specific countries or regions. You can also turn on advanced spam filtering
options if you want to pursue an aggressive approach to spam filtering. Additionally, you can configure end-user
spam notifications to inform users when messages intended for them were sent to the quarantine instead.
(Sending messages to the quarantine is one of the configurable actions.) From these notifications, end users can
release false positives and report them to Microsoft for analysis. For more information, see Configure your spam
filter policies. In order to help prevent spam in Office 365, use spam filtering, if you're concerned about too much
spam in Office 365, use connection filtering to help prevent spam.

NOTE
For EOP standalone customers: By default, the EOP spam filters send spam-detected messages to each recipients' Junk
Email folder. However, in order to ensure that the Move message to Junk Email folder action will work with on-premises
mailboxes, you must configure two Exchange transport rules on your on-premises servers to detect spam headers added by
EOP. For details, see Ensure that spam is routed to each user's Junk Email folder.

Extra information if you receive too much spam in Office 365


The following video provides an overview of configuring spam filtering in EOP.

For more details, see the Configure spam filter policies topic.
Check your outgoing messages to prevent spam in Office 365
Outbound filtering. Office 365 also checks to make sure that your users don't send spam. For instance, a user's
computer may get infected with malware that causes it to send spam messages, so we build protection against
that called outbound filtering . You can't turn off outbound filtering, but you can configure the settings described
in Configure the outbound spam policy. If you're concerned about too much spam in Office 365, use outbound
filtering to help prevent spam in Exchange Online.

Beyond the basics: More ways to prevent spam in Office 365


Mail flow rules. If you want to go beyond built-in spam filtering and create custom rules that are based on your
business policies, mail flow rules , also called transport rules , are another filter that help you prevent spam in
Office 365. For example, you can use mail flow rules to set the spam confidence level (SCL ) value for messages
that match specific conditions, as described in Use mail flow rules to set the spam confidence level (SCL ) in
messages.
Email authentication. Techniques that use the Domain Name System (DNS ) to add verifiable information to
email messages about the sender of an email message are called email authentication. More advanced Office 365
admins can make use of these email authentication methods:
Sender Policy Framework (SPF). SPF validates the origin of email messages by verifying the IP address
of the sender against the alleged owner of the sending domain. For a quick introduction to SPF and to get
it configured quickly, see Set up SPF in Office 365 to help prevent spoofing. For a more in-depth
understanding of how Office 365 uses SPF, or for troubleshooting or non-standard deployments such as
hybrid deployments, start with How Office 365 uses Sender Policy Framework (SPF ) to prevent spoofing.
DomainKeys Identified Mail (DKIM ). DKIM lets you attach a digital signature to email messages in the
message header of emails you send. Email systems that receive email from your domain use this digital
signature to determine if incoming email that they receive is legitimate. For information about DKIM and
Office 365, see Use DKIM to validate outbound email sent from your domain in Office 365.
Domain-based Message Authentication, Reporting, and Conformance (DMARC ). DMARC helps
receiving mail systems determine what to do with messages that fail SPF or DKIM checks and provides
another level of trust for your email partners. For information on setting up DMARC, see Use DMARC to
validate email in Office 365.
If you're concerned about spam, phishing, and spoofing in Office 365, use SPF, DKIM, and DMARC together to
help prevent spam and unwanted spoofing.
End-user managed settings. If you're looking for information about how end users can manage their own spam
settings, check out Overview of the Junk Email Filter (for Microsoft Outlook users) or Learn about Junk email and
phishing (for Outlook on the web users). If you're using EOP to protect on-premises mailboxes, be sure to use
directory synchronization to ensure that these settings are synced to the service. For more information about
setting up directory synchronization, see "Use directory synchronization to manage mail users" in Manage mail
users in EOP.

For more information


Blog: Why does spam and phishing get through Office 365?
Anti-Spam Protection FAQ
Prevent false positive email marked as spam with a safelist or other techniques
How to set up Office 365 spam filtering to help block junk messages
What's the Difference Between Junk Email and Bulk Email?
Anti-spam message headers
Backscatter Messages and EOP

Still need help?


How to prevent real email from being marked as
spam in Office 365
10/17/2018 • 4 minutes to read • Edit Online

Is your real email getting marked as spam in Office 365? Do this.


Exchange Online Protection (EOP ) attempts to filter out spam, keeping your Inbox clear of content that users don't
want to see. But sometimes, EOP filters out things that you do want to see.

Determine the reason why the message was marked as spam


Many issues with spam in Office 365 can be resolved by View e-mail message headers and determining what went
wrong. If you see a message header named X-Forefront-Antispam-Report that contains the string SFV:NSPM, this
means that Exchange Online Protection (EOP ) scanned the message and thought it was spam. In this case, we
strongly recommend that you Use the Report Message add-in to help us improve our filters. If you don't see this
value in the headers, it could mean either that the mail didn't pass through spam scanning, or that there was a
configuration issue which caused the message to be incorrectly classified as spam. You can learn more about anti-
spam message headers.
In the header, look for the following headings and values.
X -Forefront-Antispam-Report
SFV:BLK Indicates that the message was marked as spam because the sending address is on the recipient's
Blocked Senders List.
SFV:SKS Indicates that the message was marked as spam prior to the content filter. This could include a
transport rule marking the message as spam. Run a message trace to see if a transport rule triggered which
may have set a high spam confidence level (SCL ).
SFV:SKB Indicates that the message was marked as spam because it matched a block list in the spam filter
policy.
SFV:BULK Indicates that the Bulk Complaint Level (BCL ) value located in the x-microsoft-antispam header
is above the Bulk threshold that has been set for the content filter. Bulk email is email which users may have
signed up for, but may still be undesirable. In the message header find the BCL (Bulk Confidence Level)
property in the X-Microsoft-Antispam header. If the BCL value is less than the threshold set in the Spam
Filter, you may want to adjust the threshold to instead mark these types of bulk messages as spam. Different
users have different tolerances and preferences for how bulk email is handled. You can create different
policies or rules for different user preferences.
CAT:SPOOF or CAT:PHISH Indicates that the message appears to be spoofed, meaning that the message
source cannot be validated and could be suspicious. If valid, the sender will need to make sure that they have
proper SPF and DKIM configuration. Check the Authentication-Results header for more information.
Although it may be difficult to get all senders to use proper email authentication methods, bypassing these
checks can be extremely dangerous and is the top cause of compromises.
x-customspam
The presence of this header indicates that the message was marked as spam because one of the advanced spam
options is enabled in your spam filter. Unless you need these features, we recommend that you use the default
settings.
Solutions to additional causes of too much spam
In order to work effectively, Exchange Online Protection (EOP ) requires that administrators complete a few tasks. If
you are not the administrator for your Office 365 tenant and you are getting too much spam, then you may want to
work with your administrator on these tasks. Otherwise, you can skip to the user section.
For admins
Point your DNS records to Office 365 In order for EOP to provide protection, your mail exchanger (MX)
DNS record(s) for all domains must be pointed to Office 365 -- and only to Office 365. If your MX does not
point to Office 365, then EOP will not provide spam filtering for your users. In the situation where you wish
to use another service or appliance to provide spam filtering for your domain, you should consider disabling
the spam protection in EOP. You can do this by creating a transport rule that sets the SCL value to -1. If you
later decide to use EOP, make sure to remove this transport rule.
Disable SmartScreen filtering in Outlook If your users are using the Outlook desktop client, they should
disable the SmartScreen filtering functionality, which has been discontinued. If enabled, it can cause false
positives. This should not be required if running an updated desktop Outlook client.
Turn on the report message add-in for users We strongly recommend that you enable the report
message add-in for your users. As an administrator, you may also be able to view the feedback your users
are sending and use any patterns to adjust any settings that may be causing problems.
Immediately allow a sender In the case where you need to immediately allow a sender, we strongly
recommend that you ONLY allow a particular sender's IP address. Alternately, you can allow a sender
and also make sure that the sender passes an authentication check like SPF or DKIM by creating a transport
rule that looks for both the sender domain and a successful Authentication-Results header.
For users
Report spam to Microsoft Report spam messages to Microsoft by using the Use the Report Message add-
in. Additionally, you can send a message to junk@office365.microsoft.com and attach one or more
messages to report.
Important If you do not forward the messages as attachments, then the headers will be missing and we will
be unable to improve the junk mail filtering in Office 365.
Add a sender to your allow list - but use sparingly As a last resort, you can Block or allow (junk email
settings). If you do so, you should beware that a targeted phishing attempt may be allowed into your inbox.
How to reduce spam email in Office 365
8/21/2018 • 4 minutes to read • Edit Online

Are you getting too much spam in Office 365? Do this.


Many issues with spam in Office 365 can be resolved by View e-mail message headers and determining what went
wrong. If you see a message header named X-Forefront-Antispam-Report that contains the string SFV:NSPM, this
means that Exchange Online Protection (EOP ) scanned the message and didn't think it was spam. In this case, we
strongly recommend that you Use the Report Message add-in to help us improve our filters. If you don't see this
value in the headers, it could mean either that the mail didn't pass through spam scanning, or that there was a
configuration issue that caused the message to be ignored. In this case, consult the info below.
You can learn more about anti-spam message headers.

Solutions to common causes of getting too much spam


In order to protect you from getting too much spam, Exchange Online Protection (EOP ) requires that
administrators complete a few tasks. If you are not the administrator for your Office 365 tenant and you are getting
too much spam, then you may want to work with your administrator on these tasks. Otherwise, you can skip to the
user section.
For admins
Point your DNS records to Office 365 In order for EOP to provide protection, your mail exchanger (MX)
DNS record(s) for all domains must be pointed to Office 365 -- and only to Office 365. If your MX does not
point to Office 365, then EOP will not provide spam filtering for your users. See Create DNS records for
Office 365 when you manage your DNS records.
Enable the junk mail rule on all mailboxes By default, the spam filtering action is set to Move message
to Junk Email folder. If this is the preferred and current spam policy action, then each mailbox must also
have the junk mail rule enabled. To check this, you can run the Get-MailboxJunkEmailConfiguration cmdlet
against one or more mailboxes. For example, you might check all mailboxes for this by running the
following: Get-MailboxJunkEmailConfiguration -Identity * | Where {$_.Enabled -eq $false}
When viewing the output, the Enable property should be set to True. If it is set to False, you can run Set-
MailboxJunkEmailConfiguration to change it to True.
Check your mail flow rules and safe lists Look at the message header for a message that should have
been marked as spam. Find the SCL property in the X-Forefront-Antispam-Report header. If the SCL value
is -1, this indicates that the message was safe listed and bypassed EOP spam filtering. Investigate mail flow
rules, allow lists, and the recipient's allowed senders list. A Find and fix email delivery issues as an Office 365
for business admin will also be useful in providing details about why a message received an SCL of -1.
Create mail flow rules in on-premises Exchange Server If you are using Exchange Online Protection,
but your mailboxes are located in on-premises Exchange Server, then you will need to create a couple of
mail flow rules in on-premises Exchange Server. See the instructions for EOP -only.
Mark bulk email as spam Bulk email is email which users may have signed up for, but may still be
undesirable. In the message header find the BCL (Bulk Confidence Level) property in the X-Microsoft-
Antispam header. If the BCL value is less than the threshold set in the spam filter, you may want to adjust the
threshold to instead mark these types of bulk messages as spam. Different users have different tolerances
and preferences for how bulk email is handled. You can create different policies or rules for different user
preferences.
Immediately block a sender In the case where you need to immediately block a sender, you can block by
email address, domain, or IP address. See Block email spam with the Office 365 spam filter to prevent false
negative issues. An entry in an end-user allow list can override a block set by the administrator.
Turn on the report message add-in for users We strongly recommend that you enable the report
message add-in for you users. As an administrator, you may also be able to view the feedback your users are
sending and use any patterns to adjust any settings that may be causing problems.
For users
Enable the junk mail rule and check your allow list Check that the junk mail action rule is enabled and
that the sender or sender's domain is not set to bypass in your personal allow list. The best way to access
these settings is from Block or allow (junk email settings). While you are there, you may also choose to block
the sender's email address or domain.
Report spam to Microsoft Report spam messages to Microsoft by using the Use the Report Message add-
in. Additionally, you can send a message to junk@office365.microsoft.com and attach one or more
messages to report.
Important If you do not forward the messages as attachments, then the headers will be missing and we will
be unable to improve the junk mail filtering in Office 365.
Unsubscribe from bulk email If the message was something that you signed up for (newsletters, product
announcements, etc.) and contains an unsubscribe link from a reputable source, you may want to simply
unsubscribe. Office 365 does not typically treat these messages as spam. You can also choose to block the
sender, or ask your administrator to make a change that will cause all bulk mail to be treated as spam.
Prevent email from being marked as spam in Office
365 and Exchange Online Protection
8/21/2018 • 5 minutes to read • Edit Online

Exchange Online or Exchange Online Protection (EOP ) administrators with the appropriate access credentials can
use these steps to help ensure that an email message traveling through the service isn't marked as spam.
It can be frustrating to have legitimate, good email quarantined or blocked as spam and landing in a quarantine
folder. You can use a safe sender list or a mail flow rule to bypass spam filtering and prevent good email messages
from getting marked as junk mail. When a message is incorrectly marked as spam by the spam filter, it's called a
false positive. The Office 365 spam filter also provides some options that end users can customize in order to help
prevent false positives.
If you're looking for help with false negative mail, that is, a spam message that gets through when it shouldn't,
check out the tips in Block email spam with the Office 365 spam filter to prevent false negative issues.

EOP-only customers: use directory synchronization


EOP is a cloud-based email filtering service that helps protect your organization against spam and malware. If you
have mailboxes in Office 365, they are automatically protected by EOP since it is part of the service.
If you're an EOP -only customer, that is, you subscribe to the EOP service for use with your on-premises Exchange
Server, you should sync user settings with the service by using directory synchronization. Doing this ensures that
your safe senders lists are respected by EOP. For more information, see "Use directory synchronization to manage
mail users" in Manage Mail Users in EOP.

Prevent false positive email by using the connection filter's IP allow list
If you find that a sender's email is always moved to the Junk folders in your organization, you can add the email
sender's IP address to your connection filter's IP allow list. Normally, this prevents false positive responses for this
sender for all recipients within your organization. The exception is when a user enables the option "Safe Lists Only:
Only mail from people or domains on your Safe Senders list or Safe Recipients List will be delivered to your
Inbox" in Outlook and does not add that sender to the Safe Sender List. For information on overriding that option,
see Troubleshooting: A message ends up in the Junk folder even though EOP marked the message as non-spam.
To add an IP address to your connection filter's IP allow list
1. Obtain the header from a message sent by the sender that you want to allow. You can do this from your
mail client such as Outlook or Outlook on the Web, as described in Message Header Analyzer.
2. Manually search for the IP address following the CIP tag in the X-Forefront-Antispam-Report header or by
using the Message Analyzer tab of the Remote Connectivity Analyzer.
3. Add the IP address to the IP allow list by following the steps in "Use the EAC to edit the default connection
filter policy" in Configure the connection filter policy.

Prevent false positive email by configuring spam filter policies


You can add domains or individual email addresses to an allow list by following the steps in Configure your spam
filter policies.
Review your advanced spam filter policies
If you have special restrictions set up in a spam filter policy, for example, if you have blocked an entire domain, you
should review them to check if they may be causing false positives. See Configure your spam filter policies, and
turn off additional Advanced spam filtering options that might cause messages to be marked as spam.

Help your end users create a safe sender list to prevent good email
from being marked as spam
Tell your users to add addresses from senders that they trust to their safe sender list in Outlook or Outlook on the
Web. To get started in Outlook on the Web, choose Settings > Options > Block or allow. The following
diagram shows an example of adding something to a safe sender list.

EOP will honor your users' Safe Senders and Recipients, but not Safe Domains. This is true regardless of whether
the domain is added through the Outlook on the Web, or added in Outlook and synchronized using Directory
Sync.

Troubleshooting: A message ends up in the Junk folder even though


EOP marked the message as non-spam
If your users have the option in Outlook enabled for "Safe Lists Only: Only mail from people or domains on your
Safe Senders list or Safe Recipients List will be delivered to your Inbox", then all email will go to the junk folder for
a sender unless the sender is on the recipient's Safe Sender list. This will happen regardless of whether EOP marks
a message as non-spam, or if you have set up a rule in EOP to mark a message as non-spam.
You can disable the Safe Lists Only option for your Outlook users by following the instructions in Outlook: Policy
setting to disable the Junk E -mail UI and filtering mechanism.
If you view the message in Outlook on the Web, there will be a yellow safety tip that indicates that the message is
in the Junk folder because the sender is not on the recipient's Safe Senders list.
If you look at the header of a message, it may include the stamp SFV:SKN (IP Allow or ETR Allow ) or SFV:NSPM
(non-spam), but the message is still placed in the user's junk folder. There is nothing in the message header that
indicates that the user has "Safe Lists Only" enabled. This happens because the "Safe Lists Only" option set by
users in Outlook overrides the EOP setting.
To verify why a message from a safe sender is marked as non-spam in the message header, but still ends
up in the user's Junk folder
1. To learn how to connect to Exchange Online PowerShell, see Connect to Exchange Online PowerShell.
2. Run the following command to view the user's junk email configuration settings:

Get-MailboxJunkEmailConfiguration example@contoso.com | fl
TrustedListsOnly,ContactsTrusted,TrustedSendersAndDomains

If TrustedListsOnly is set to True, it means that this setting is enabled. If ContactsTrusted is set to True,
it means that the user trusts both Contacts and Safe Senders. The TrustedSendersAndDomains lists the contents
of the user's Safe Senders list.

Still need help?

See also
Overview of the Junk Email Filter
Block or allow (junk email settings)
Block email spam with the Office 365 spam filter to prevent false negative issues
Controlling outbound spam in Office 365
9/14/2018 • 4 minutes to read • Edit Online

We take managing outbound spam seriously because ours is a shared service. There are many customers behind a
shared pool of resources, where if one customer sends outbound spam, it can degrade the outbound IP reputation
of the service and affects the successful deliverability of email for other customers. It is unfair to Customer A if
Customer B spams and various 3rd party IP blocklists list the IP address that it uses.

What admins can do to control outbound spam


Enable notifications when an account is sending spam or shut down. Administrators can get bcc’ed
whenever a message is marked as outbound spam and sent through the High Risk pool. By monitoring this
mailbox, an admin can detect if they have a compromised account in their network or if the spam filter is
mistakenly marking their email as spam. More information on setting up the outbound spam policy can be
found here.
Manually review spam complaints from 3rd party email providers. Many 3rd party email services like
Outlook.com, Yahoo and AOL provide a Feedback Loop where if any user in their service marks an email
from our service as spam, the message is packaged up and sent back to us for review. To learn more about
sender support for Outlook.com, click here.

What EOP does to control outbound spam


1. Segregation of outbound traffic into separate pools of IPs. Every message that customers send outbound
through the service is scanned for spam. If the message is spam, it is routed through the High Risk Delivery
pool. This IP pool contains non-deliverable status notifications and spam. Delivery to the intended recipient is
not guaranteed as many third parties will not accept email because the quality of email it emits.
Splitting the traffic this way ensures that the lower quality email (spam, backscatter NDRs) does not drag down the
reputation of the regular outbound email pools. The high risk pool typically has low reputation at many receivers
around the Internet, although this is not universal.
2. Monitoring of IP reputation. Office 365 queries various 3rd party IP blocklists and generates alerts if any
of our outbound IPs are listed on them. This allows us to react quickly when spam has caused our reputation
to degrade. When an alert is generated, we have internal documentation outlying what steps to take to get
delisted.
3. Disabling of offending accounts when they send too much email marked as spam. Even though we
segregate our spam and non-spam into two separate outbound IP pools, the email accounts cannot send
spam indefinitely. We monitor which accounts are sending spam and if it exceeds an undisclosed limit, the
account is blocked from sending spam.
A single message marked as spam may be a misclassification by the spam engine and also known as a false
positive. We send it through the High Risk pool to give it a chance of going out; however, a large number of
messages in a short time frame is indicative of a problem and when that occurs, we block the account from sending
any more email. There are different thresholds that exist for individual email accounts as well as in aggregate for
the entire tenant.
4. Disabling of offending accounts when they send too much email in too short a time frame. In addition
to the limits above that look for a proportion of messages marked as spam, there are also limits that block
accounts when they reach an overall limit regardless of whether or not the messages are marked as spam. The
reason this limit exists is because a compromised account could send zero-day spam that is missed by the spam
filter. Because it is difficult, if not impossible, to sometimes tell the difference between a legitimate mass mailing
campaign and a massive spam campaign, these limits activate to limit any potential damage.

NOTE
For both #3 and #4, we do not advertise the exact limits. This is to prevent spammers from gaming the system and to ensure
that we can change the limits when we need to. The limits are high enough such that an average business user will never hit
them and low enough that it contains most of the damage a spammer can do.

Recommended workarounds for customers who want to send


outbound a lot of email through EOP
It is difficult to strike a balance between customers who want to send a large volume of email vs. protecting the
service from compromised accounts and bulk emailers with poor list acquisition practices. Again, the cost of an
outbound IP landing on a 3rd party blocklist is higher than blocking a customer from sending outbound email. As
described in the [Exchange Online Service Description](https://technet.microsoft.com/en-us/library/exchange-
online-limits.aspx#Receiving and sending limits), using EOP to send bulk email is not a supported use of the
service and is only permitted on a “best-effort” basis. For customers who do want to send bulk email, we
recommend the following:
a. Send the bulk email through its own on-premise mail servers. This means that the customer will have to
maintain its own email infrastructure for this type of email.
b. Use a 3rd party bulk emailer to send the mass communication. There are several 3rd party bulk emailers
whose sole business it is to send bulk email. They can work with customers to ensure that they have good emailing
practices and they have resources dedicated to enforcing it.
The Messaging, Mobile, Malware Anti-Abuse Working Group (MAAWG ) publishes its membership roster here.
Several bulk email providers are on the list and are known to be responsible Internet citizens.

For more information


Sample notification when a sender is blocked sending outbound spam
Office 365 email anti-spam protection
Anti-spoofing protection in Office 365
Spam confidence levels
Block email spam with the Office 365 spam filter to
prevent false negative issues
8/21/2018 • 6 minutes to read • Edit Online

Exchange Online Protection (EOP ) is a cloud-based email filtering service that helps protect your organization
against spam and malware. If you have mailboxes in Office 365, they are already protected by default with EOP.
You can help to ensure spam and junk messages are blocked by adjusting your Office 365 spam filter. This helps
to prevent the false negative issue, where email spam is allowed through to a user inbox. As an Exchange Online
or Exchange Online Protection (EOP ) administrator, use the following steps to adjust your Office 365 anti-spam
filter and help prevent spam from being delivered to your user's inboxes.

Customize the Office 365 anti-spam filter with these settings


An Admin can use several Office 365 spam filter settings to help prevent email spam from being sent to a user
inbox. The Office 365 spam filter will become better able to block email spam and prevent false negative
messages if you use the options listed here. In this context, a false negative refers to email spam or junk messages
that are getting sent to a user inbox.
Block IP addresses with a connection filter
Customize your Office 365 spam filter by adding the sender IP address to the connection filter IP block list:
1. Obtain the headers for the message you want to block in your mail client such as Outlook or Outlook Web
App, as described in Message Header Analyzer.
2. Search for the IP address following the CIP tag in the X-Forefront-Antispam-Report header using the
message header analyzer or manually.
3. Add the IP address to the IP Block list by following the steps in "Use the EAC to edit the default connection
filter policy" in Configure the Connection Filter Policy.
Block bulk mail with transport rules or the spam filter
Is the spam primarily bulk mail, for example, newsletters or promotions? You can customize the spam filter in
Office 365 if you Use transport rules to aggressively filter bulk email messages or turn on the Bulk mail setting
in your spam filter's Advanced Spam Filtering Options. In the Exchange Admin center, get started by clicking
Protection > Content filter and then double click the filter policy you want to adjust. Click Spam and bulk
mail actions to adjust the settings, as shown here.
Block email spam using spam filter block lists
Configure your spam filter policies to add the sender address to the sender block list or domain to the domain
block list in the spam filter. Emails from a sender or domain on a spam filter block list will marked as spam.
Advanced spam filtering options
Configure your spam filter policies and turn on additional Advanced Spam Filtering Options.
For more spam settings that apply to the whole organization, take a look at Prevent false positive email marked as
spam with a safelist or other techniques. This is helpful if you have administrator-level control and you want to
prevent false positives.

Email users can also help ensure that false negative and email spam is
blocked with Office 365 spam filter
It will help your Office 365 anti-spam efforts to prevent false negatives and junk mail if you tell your users to add
the spam sender address to their blocked sender list in Outlook or Outlook Web App. In Outlook Web App, get
started by clicking Settings > Options > Block or allow, and then adding the address to the Blocked senders
list, as shown here.

NOTE
For more detailed information about safe sender lists, see Safe Sender and Blocked Sender Lists FAQ.

The previous paragraphs in this subsection applies only to customers who use EOP as service to protect on-
premises email systems or as part of a hybrid email deployment. Learn more about EOP at the Exchange Online
Protection home page.

EOP-only customers: Set up the Office 365 spam filter to block email
spam
For EOP -only customers with on-premises mailboxes: If you setup a spam filter for the default action, Move
message to Junk Email folder, follow the required steps provided in Ensure that spam is routed to each user's Junk
Email folder. We've tried to make this easy by providing the Exchange Management Shell commands in a separate
topic, as well as a link to more general information about how to get started with the shell.
It will help you to avoid false negative email spam if you sync user settings with the service via directory
synchronization to ensure that your blocked senders are respected. For more information, see "Use directory
synchronization to manage mail users" in Manage mail users in EOP.

EOP-only customers who are not using directory synchronization


The EOP service is designed to honor the user's safe and blocked senders, if the information has been shared with
the service. If you are an EOP customer using Outlook, but do not have Directory Synchronization configured to
sync your users to Office 365, you can still stop messages from being delivered to your users' inbox using blocked
senders. However, you may have to set up some Exchange mail flow rules in the following situations:
If a message goes through regular spam filtering through EOP and then is delivered to a local on-premises
Exchange server, and EOP assigns a spam verdict of SCL 1-4 (non-spam), then your users' local blocked
senders list will override the EOP spam filter verdict and deliver it to their junk email folder.
If a message in EOP is assigned SCL -1 by an Exchange mail flow rule or because the IP address or domain
is in your allow list, the SCL is propagated to the on-premise Exchange server using connectors. In this
case, your user's blocked senders list will not be enforced. To change this, you can create a local mail flow
rule that sets the SCL to 0. This will cause Outlook to enforce your user's local blocked senders list.
To set up a mail flow rule to stop messages from being delivered to your users' inbox by using the
blocked senders list
1. Open the Exchange Management Shell on your on-premises server. To learn how to open the Shell in your
on-premises Exchange organization, see Open the Exchange Management Shell.
2. Run the following command to route content-filtered spam messages to the Junk Email folder in order to
update the SCL on every message that was marked with SCL -1:

New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" -


HeaderContainsWords "SCL:-1" -SetSCL 0

Because the SCL is 0 in your on-premises Exchange server, non-spam will be delivered to your users' inboxes
but still allow for users' local blocked senders list to send them to junk email. If you are using spam
quarantine in EOP, it is still possible that senders who are on your user's safe list will be identified as
spam and sent to quarantine. If you are using the Junk Mail Folder in your local mailbox, however, this will
allow delivery to the Inbox for safe senders.

WARNING
If you use a mail flow rule to change the SCL value to 0 (or any value other than -1), then all of the Outlook junk mail
options will apply to the message. This means that blocked and safe lists will be honored, but also means that messages
that do not have addresses from the blocked or safe lists will potentially be marked as junk by the client side junk mail filter
processing. If you want to have Outlook process the blocked and safe lists, but not use the client side junk mail filter, you
must set the option to "No Automatic Filtering" in Outlook Junk Mail Options. "No Automatic Filtering" is the default option
in the latest versions of Outlook, but you should confirm that the this setting is in place to ensure the client side junk mail
filter is not applied to the messages. As an administrator, you can enforce disabling the Outlook Junk Email filtering by
following the instructions in Outlook: Policy setting to disable the Junk E-mail UI and filtering mechanism.

See Also
Office 365 Email Anti-Spam Protection
Prevent false positive email marked as spam with a safelist or other techniques
Zero-hour auto purge - protection against spam and
malware
12/5/2018 • 3 minutes to read • Edit Online

Overview
Zero-hour auto purge (ZAP ) is an email protection feature that detects messages with phish, spam, or malware
that have already been delivered to your users' inboxes, and then renders the malicious content harmless. How
ZAP does this depends on the type of malicious content detected; mail can be zapped due to mail content, URLs, or
attachments.
ZAP is available with the default Exchange Online Protection that is included with any Office 365 subscription that
contains Exchange Online mailboxes.
ZAP is turned on by default, but the folowing conditions must be met:
Spam action is set to Move message to Junk Email folder.
You can also create a new spam filter policy that applies only to a set of users if you don't want all mailboxes
to be screened by ZAP.
Users have kept their default junk mail settings, and have not turned off junk email protection. (See Change
the level of protection in the Junk Email Filter for details about user options in Outlook.)

How does ZAP work?


Office 365 updates anti-spam engine and malware signatures in real-time on a daily basis. However, your users
might still get malicious messages delivered to their inboxes for a variety of reasons, including if content is
weaponized after being delivered to users. ZAP addresses this by continually monitoring updates to the Office 365
spam and malware signatures. ZAP can find and remove previously delivered messages that are already in users'
inboxes.
For mail that is identified as spam, ZAP moves unread messages to users' Junk mail folder.
For mail that is identified as spam, ZAP moves messages to users' Junk mail folder, regardless of whether
the email has been read.
For newly detected malware, ZAP removes attachments from email messages, regardless of whether the
email has been read.
The ZAP action is seamless for the mailbox user; they are not notified if an email message is moved.
Allow lists, mail flow rules, and end user rules or additional filters take precedence over ZAP.

To review or set up a spam filter policy


1. Go to https://protection.office.com and sign in using your work or school account for Office 365.
2. Under Threat management, choose Anti-spam.
3. Review the standard settings.
4. If you want to customize your settings, select the Custom tab, and turn on Custom settings. Edit your
settings and if you want, choose + Create a policy to add a new policy.
To see if ZAP moved your message
If you want to see if ZAP moved your message, you can use either the Threat Protection Status report (or Threat
Explorer).

To disable ZAP
If you want to disable ZAP for your Office 365 tenant, or a set of users, use the ZapEnabled parameter of Set-
HostedContentFilterPolicy, an EOP cmdlet.
In the following example, ZAP is disabled for a content filter policy named "Test".

Set-HostedContentFilterPolicy -Identity Test -ZapEnabled $false

FAQ
What happens if a legitimate message is moved to the junk mail folder?
You should follow the normal reporting process for false-positives. The only reason the message would be moved
from the inbox to the junk mail folder would be because the service has determined that the message was spam or
malicious.
What if I use the Office 365 quarantine instead of the junk mail folder?
ZAP doesn't move messages into quarantine from the Inbox at this time.
What If I have a custom mail flow rule (Block/ Allow Rule )?
Rules created by admins (mail flow rules) or Block and Allow rules take precedence. Such messages are excluded
from the feature criteria.

Related Topics
Office 365 Email Anti-Spam Protection
Block email spam with the Office 365 spam filter to prevent false negative issues
Encryption in Office 365
9/23/2018 • 4 minutes to read • Edit Online

Encryption is an important part of your file protection and information protection strategies. Read this article to
get an overview of encryption used for all versions of Office 365, and get help with encryption tasks, from setting
up encryption for your organization to password-protecting Office documents.
If you're looking for information about certificates and technologies like TLS, see Technical reference details
about encryption in Office 365.
If you are looking for information about how to configure or set up encryption for your organization, see
Set up encryption in Office 365 Enterprise.

What is encryption, and how does it work in Office 365?


At a high level, encryption is the process of encoding your data (referred to as plaintext) into ciphertext that
cannot be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an
encryption key that only authorized users have. Encryption helps ensure that only authorized recipients can
decrypt your content, such as email messages and files.
Encryption by itself does not prevent content, such as files, email messages, calendar entries, and so on, from
getting into the wrong hands. Encryption is part of a larger information protection strategy for your organization.
By using encryption, you can help ensure that only those who should be able to use encrypted data are able to.
You can have multiple layers of encryption in place at the same time. For example, you can encrypt email
messages and also the communication channels through which your email flows. With Office 365, your data is
encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Transport
Layer Security/Secure Sockets Layer (TLS/SSL ), Internet Protocol Security (IPSec), and Advanced Encryption
Standard (AES ).

Encryption for data at rest and data in transit


Examples of data at rest include files that have been uploaded to a SharePoint library, Project Online data,
documents that have been uploaded in a Skype for Business meeting, email messages and attachments that are
stored in folders in your Office 365 mailbox, and files uploaded to OneDrive for Business.
Examples of data in transit include mail messages that are in the process of being delivered, or conversations
that are taking place in an online meeting. In Office 365, data is in transit whenever a user's device is
communicating with an Office 365 server, or when an Office 365 server is communicating with another server.
With Office 365, you can have multiple layers and kinds of encryption working together to secure your data. The
following table includes some examples, with links to additional information.

KINDS OF CONTENT ENCRYPTION TECHNOLOGIES RESOURCES TO LEARN MORE


KINDS OF CONTENT ENCRYPTION TECHNOLOGIES RESOURCES TO LEARN MORE

Files on a device. This can include email BitLocker in Microsoft datacenters. Windows IT Center: BitLocker
messages saved in a folder, Office BitLocker can also be used on client Microsoft Trust Center: Encryption
documents saved on a computer, machines, such as Windows computers Cloud security controls series:
tablet, or phone, or data saved to the and tablets Encrypting Data at Rest
Microsoft cloud. Distributed Key Manager (DKM) in How Exchange Online secures your
Microsoft datacenters email secrets
Customer Key for Office 365 Controlling your data in Office 365
using Customer Key

Files in transit between users. This can TLS for files in transit Data Encryption in OneDrive for
include Office documents or SharePoint Business and SharePoint Online
list items shared between users. Skype for Business Online: Security and
Archiving

Email in transit between recipients. This Office 365 Message Encryption with Office 365 Message Encryption (OME)
includes email hosted by Exchange Azure Rights Management, S/MIME, Email encryption in Office 365
Online. and TLS for email in transit How Exchange Online uses TLS to
secure email connections in Office 365

What if I need more control over encryption to meet security and


compliance requirements?
In addition to Microsoft-managed solutions of volume encryption, file encryption, and mailbox encryption in
Office 365, customer-managed options can be used to meet more stringent security and compliance
requirements. Such solutions use Azure Rights Management (Azure RMS ) together with Office 365.
See the following resources to learn more:
What is Azure Rights Management?
Activate Rights Management in the Office 365 admin center
Set up Information Rights Management (IRM ) in SharePoint admin center

How do I...
TO DO THIS TASK SEE THESE RESOURCES

Set up encryption for my organization Set up encryption in Office 365 Enterprise

View details about certificates, technologies, and TLS cipher Technical details about encryption in Office 365
suites in Office 365

Work with encrypted messages on a mobile device View encrypted messages on your Android device
View encrypted messages on your iPhone or iPad

Encrypt a document using password protection Add or remove protection in your document, workbook, or
presentation (Choose an Add protection section, and then
Currently, password protection is not supported in Office see Encrypt with Password )
Online. Use desktop versions of Word, Excel, and PowerPoint
for password protection.

Remove encryption from a document Add or remove protection in your document, workbook, or
presentation (Choose a Remove protection section, and
then see Remove password encryption )
Related topics
Plan for Office 365 security and information protection capabilities
Security and Compliance in Office 365 for business - Admin Help
Email encryption in Office 365
10/31/2018 • 5 minutes to read • Edit Online

This article compares encryption options in Office 365 including Office Message Encryption (OME ), S/MIME,
Information Rights Management (IRM ), and introduces Transport Layer Security (TLS ).
Office 365 delivers multiple encryption options to help you meet your business needs for email security. This
article presents three ways to encrypt email in Office 365. If you want to learn more about all security features in
Office 365, visit the Office 365 Trust Center. This article introduces the three types of encryption available for
Office 365 administrators to help secure email in Office 365:
Office Message Encryption (OME ).
Secure/Multipurpose Internet Mail Extensions (S/MIME ).
Information Rights Management (IRM ).

What is email encryption and how does Office 365 use it?
Encryption is the process by which information is encoded so that only an authorized recipient can decode and
consume the information. Office 365 uses encryption in two ways: in the service, and as a customer control. In the
service, encryption is used in Office 365 by default; you don't have to configure anything. For example, Office 365
uses Transport Layer Security (TLS ) to encrypt the connection, or session, between two servers.
Here's how email encryption typically works:
A message is encrypted, or transformed from plain text into unreadable ciphertext, either on the sender's
machine, or by a central server while the message is in transit.
The message remains in ciphertext while it's in transit in order to protect it from being read in case the
message is intercepted.
Once the message is received by the recipient, the message is transformed back into readable plain text in
one of two ways:
The recipient's machine uses a key to decrypt the message, or
A central server decrypts the message on behalf of the recipient, after validating the recipient's
identity.
For more information on how Office 365 secures communication between servers, such as between organizations
within Office 365 or between Office 365 and a trusted business partner outside of Office 365, see How Exchange
Online uses TLS to secure email connections in Office 365.
Watch this video for an introduction to Encryption in Office 365.

Comparing email encryption options available in Office 365


What is it? Office 365 Message IRM is an encryption S/MIME is a certificate-based
Encryption (OME) is a solution that also applies encryption solution that
service built on Azure Rights usage restrictions to email allows you to both encrypt
Management (Azure RMS) messages. It helps prevent and digitally sign a message.
that lets you send encrypted sensitive information from The message encryption
email to people inside or being printed, forwarded, or helps ensure that only the
outside your organization, copied by unauthorized intended recipient can open
regardless of the destination people. and read the message. A
email address (Gmail, Yahoo! IRM capabilities in Office 365 digital signature helps the
Mail, Outlook.com, etc.). use Azure Rights recipient validate the identity
As an admin, you can set up Management (Azure RMS). of the sender.
transport rules that define Both digital signatures and
the conditions for message encryption are
encryption. When a user made possible through the
sends a message that use of unique digital
matches a rule, encryption is certificates that contain the
applied automatically. keys for verifying digital
To view encrypted messages, signatures and encrypting or
recipients can either get a decrypting messages.
one-time passcode, sign in To use S/MIME, you must
with a Microsoft account, or have public keys on file for
sign in with a work or school each recipient. Recipients
account associated with have to maintain their own
Office 365. Recipients can private keys, which must
also send encrypted replies. remain secure. If a recipient's
They don't need an Office private keys are
365 subscription to view compromised, the recipient
encrypted messages or send needs to get a new private
encrypted replies. key and redistribute public
keys to all potential senders.

What does it do? OME: IRM: S/MIME addresses sender


Encrypts messages sent to Uses encryption and usage authentication with digital
internal or external restrictions to provide online signatures, and message
recipients. and offline protection for confidentiality with
Allows users to send email messages and encryption.
encrypted messages to any attachments.
email address, including Gives you, as an admin, the
Outlook.com, Yahoo! Mail, ability to set up transport
and Gmail. rules or Outlook protection
Allows you, as an admin, to rules to automatically apply
customize the email viewing IRM to select messages.
portal to reflect your Lets users manually apply
organization's brand. templates in Outlook or
Microsoft securely manages Outlook Web App.
and stores the keys, so you
don't have to.
No special client side
software is needed as long
as the encrypted message
(sent as an HTML
attachment) can be opened
in a browser.
What does it not do? OME doesn't let you apply Some applications may not S/MIME doesn't allow
usage restrictions to support IRM emails on all encrypted messages to be
messages. For example, you devices. For more scanned for malware, spam,
can't use it to stop a information about these and or policies.
recipient from forwarding or other products that support
printing an encrypted IRM email, see Client device
message. capabilities.

Recommendations and We recommend using OME We recommend using IRM We recommend using
example scenarios when you want to send when you want to apply S/MIME when either your
sensitive business usage restrictions as well as organization or the
information to people encryption. For example: recipient's organization
outside your organization, A manager sending requires true peer-to-peer
whether they're consumers confidential details to her encryption.
or other businesses. For team about a new product S/MIME is most commonly
example: applies the "Do Not used in the following
A bank employee sending Forward" option. scenarios:
credit card statements to An executive needs to share Government agencies
customers a bid proposal with another communicating with other
A doctor's office sending company, which includes an government agencies
medical records to a patient attachment from a partner A business communicating
An attorney sending who is using Office 365, and with a government agency
confidential legal information require both the email and
to another attorney the attachment to be
protected.

What encryption options are available for my Office 365 subscription?


For information about email encryption options for your Office 365 subscription see the Exchange Online service
description. Here, you can find information about the following encryption features:
Azure RMS, including both IRM capabilities and OME
S/MIME
TLS
Encryption of data at rest (through BitLocker)

What about encryption for data at rest?


"Data at rest" refers to data that isn't actively in transit. In Office 365, email data at rest is encrypted using
BitLocker Drive Encryption. BitLocker encrypts the hard drives in Office 365 datacenters to provide enhanced
protection against unauthorized access. To learn more, see BitLocker Overview.

More information about email encryption options in Office 365


For more information about the email encryption options in this article as well as TLS, see these articles:
OME
Office 365 Message Encryption (OME )
IRM
Information Rights Management in Exchange Online
What is Azure Rights Management?
S/MIME
S/MIME for message signing and encryption
Understanding S/MIME
Understanding Public Key Cryptography
TLS
Configure custom mail flow by using connectors in Office 365
Manage Office 365 Message Encryption
8/21/2018 • 6 minutes to read • Edit Online

Once you've finished setting up Office 365 Message Encryption (OME ), you can customize the configuration of
your deployment in a number of ways. For example, you can configure whether to enable one-time pass codes,
display the Protect button in Outlook on the web, and more. The tasks in this article describe how.

This article is part of a larger series of articles about Office 365 Message Encryption. This article is intended for administrators and
IT Pros. If you're just looking for information on sending or receiving an encrypted message, see the list of articles in Office 365
Message Encryption (OME) and locate the article that best fits your needs.

Managing whether Google, Yahoo, and Microsoft Account recipients


can use these accounts to sign in to the Office 365 Message Encryption
portal
By default, when you set up the new Office 365 Message Encryption capabilities, users in your organization can
send messages to recipients that are outside of your Office 365 organization. If the recipient uses a social ID such
as a Google account, Yahoo account, or Microsoft account, the recipient can sign in to the OME portal using the
social ID. If you want, you can choose not to allow recipients to use social IDs to sign in to the OME portal.
To manage whether or not to allow recipients to use social IDs to sign in to the OME portal
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-OMEConfiguration cmdlet with the SocialIdSignIn parameter as follows:

Set-OMEConfiguration -Identity <"OMEConfigurationIdParameter "> -SocialIdSignIn <$true |$false >

For example, to disable social IDs:

Set-OMEConfiguration -Identity "OME Configuration" -SocialIdSignIn $false

To enable social IDs:

Set-OMEConfiguration -Identity "OME Configuration" -SocialIdSignIn $true

Managing the use of one-time pass codes for signing in to the Office
365 Message Encryption portal
By default, if the recipient of a message encrypted by OME doesn't use Outlook, regardless of the account used by
the recipient, the recipient receives a limited-time web-view link that lets them read the message. This includes a
one-time pass code. As an administrator, you can manage whether or not one-time pass codes can be used to sign-
in to the OME portal.
To manage whether or not one-time pass codes are generated for OME
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-OMEConfiguration cmdlet with the OTPEnabled parameter as follows:

Set-OMEConfiguration -Identity <"OMEConfigurationIdParameter "> -OTPEnabled <$true |$false >

For example, to disable one-time pass codes:

Set-OMEConfiguration -Identity "OME Configuration" -OTPEnabled $false

To enable one-time pass codes:

Set-OMEConfiguration -Identity "OME Configuration" -OTPEnabled $true

Managing the display of the Protect button in Outlook on the web


By default, the Protect button in Outlook on the web is not enabled when you set up OME. As an administrator,
you can manage whether or not to display this button to end users.
To manage whether or not the Protect button appears in Outlook on the web
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-IRMConfiguration cmdlet with the -SimplifiedClientAccessEnabled parameter as follows:

Set-IRMConfiguration -SimplifiedClientAccessEnabled <$true |$false >

For example, to disable the **Protect** button:

Set-IRMConfiguration -SimplifiedClientAccessEnabled $false

To enable the **Protect** button:

Set-IRMConfiguration -SimplifiedClientAccessEnabled $true

Enable service-side decryption of email messages for iOS mail app


users
The iOS mail app can't decrypt messages protected with Office 365 Message Encryption. As an Office 365
administrator, you can apply service-side decryption for messages delivered to the iOS mail app. When you choose
to do this, the service sends a decrypted copy of the message to the iOS device. The message is stored decrypted
on the client device. The message also retains information about usage rights even though the iOS mail app
doesn't apply client-side usage rights to the user. This means that the user can copy or print the message even if
they did not originally have the rights to do so. However, if the user attempts to complete an action that requires
the Office 365 mail server, such as forwarding the message, the server will not permit the action if the user did not
originally have the usage right to do so. However, end-users can work around Do Not Forward usage restriction by
forwarding the message from a different account in their iOS mail app. Regardless of whether you set up service-
side decryption of mail, any attachments to encrypted and rights protected mail cannot be viewed in the iOS mail
app.
If you choose not to allow decrypted messages to be sent to iOS mail app users, users receive a message that
states that they don't have the rights to view the message. By default, service-side decryption of email messages is
not enabled.
For more information, and for a view of the client experience, see the section, "View encrypted messages on your
iPhone or iPad" in View encrypted messages on your iPhone or iPad.
To manage whether or not iOS mail app users can view messages protected by Office 365 Message
Encryption
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-ActiveSyncOrganizations cmdlet with the AllowRMSSupportForUnenlightenedApps parameter
as follows:

Set-ActiveSyncOrganizationSettings -AllowRMSSupportForUnenlightenedApps <$true |$false >

For example, to configure the service to decrypt messages before they are sent to unenlightened apps such as
the iOS mail app:

Set-ActiveSyncOrganizationSettings -AllowRMSSupportForUnenlightenedApps $true

For example, to configure the service not to send decrypted messages to unenlightened apps:

Set-ActiveSyncOrganizationSettings -AllowRMSSupportForUnenlightenedApps $false

Enable service-side decryption of email attachments for web browser


mail clients
Normally, when you use Office 365 message encryption, attachments are automatically encrypted. As an Office
365 administrator, you can apply service-side decryption for email attachments that users download from a web
browser.
When you choose to do this, the service sends a decrypted copy of the file to the device. The message is still
encrypted. The email attachment also retains information about usage rights even though the browser does not
apply client-side usage rights to the user. This means that the user can copy or print the email attachment even if
they did not originally have the rights to do so. However, if the user attempts to complete an action that requires
the Office 365 mail server, such as forwarding the attachment, the server will not permit the action if the user did
not originally have the usage right to do so.
Regardless of whether you set up service-side decryption of attachments, any attachments to encrypted and rights
protected mail cannot be viewed in the iOS mail app.
If you choose not to allow decrypted email attachments, which is the default, users receive a message that states
that they don't have the rights to view the attachment. *** insert picture?
For more information about how Office 365 implements encryption for emails and email attachments with the
Encrypt-Only option, see Encrypt-Only option for emails.
To manage whether or not email attachments are decrypted on download from a web browser
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-IRMConfiguration cmdlet with the DecryptAttachmentFromPortal parameter as follows:

Set-IRMConfiguration -DecryptAttachmentFromPortal <$true |$false >

For example, to configure the service to decrypt email attachments when a user downloads them from a web
browser:

Set-IRMConfiguration -DecryptAttachmentFromPortal $true

To configure the service to leave encrypted email attachments as they are upon download:

Set-IRMConfiguration -DecryptAttachmentFromPortal $false

Customizing the appearance of email messages and the OME portal


For detailed information about how you can customize OME for your organization, see Add your organization's
brand to your encrypted messages.

Disabling the new capabilities for OME


We hope it doesn't come to it, but if you need to, disabling the new capabilities for OME is very straightforward.
First, you'll need to remove any mail flow rules you've created that use the new OME capabilities. For information
about removing mail flow rules, see Manage mail flow rules. Then, complete these steps in Exchange Online
PowerShell.
To disable the new capabilities for OME
1. Connect to Exchange Online Using Remote PowerShell.
2. If you enabled the Protect button in Outlook on the web, disable it by running the Set-IRMConfiguration
cmdlet with the SimplifiedClientAccessEnabled parameter as follows:

Set-IRMConfiguration -SimplifiedClientAccessEnabled $false

3. Run the Set-IRMConfiguration cmdlet with the AzureRMSLicensingEnabled parameter as follows:

Set-IRMConfiguration -AzureRMSLicensingEnabled $false


Set up new Office 365 Message Encryption
capabilities
9/12/2018 • 6 minutes to read • Edit Online

With the new Office 365 Message Encryption (OME ) capabilities, which leverage the protection features in Azure
Information Protection, your organization can easily share protected email with anyone on any device. Users can
send and receive protected messages with other Office 365 organizations as well as non-Office 365 customers
using Outlook.com, Gmail, and other email services.

Get started with OME by activating Azure Rights Management, part of


Azure Information Protection
It's now easy to get started with the new OME capabilities. As of February 2018, Office 365 automatically enables
the new OME capabilities for eligible organizations within our datacenters. Your organization is eligible if it is a
new Office 365 tenant and your organization has the appropriate subscriptions. If you have enabled Azure
Rights Management (Azure RMS ), part of Azure Information Protection, then we automatically enable
Office 365 Message Encryption for you. You don't have to do anything else to enable OME. To activate Azure
Rights Management, see Activating Azure Rights Management. For information on subscriptions, see "What
subscriptions do I need to use the new OME capabilities?" in the Office 365 Message Encryption FAQ. For
information about purchasing a subscription to Azure Information Protection, see Azure Information Protection.
If you are using Exchange Online with Active Directory Rights Management service (AD RMS ), you can't enable
these new capabilities right away. Instead, you need to migrate from AD RMS to Azure Information Protection
first. When you've finished the migration, you can successfully complete these steps.
If you choose to continue to use on-premises AD RMS with Exchange Online instead of migrating to Azure
Information Protection, you will not be able to use these new capabilities.

How the new capabilities for OME work


The new Office 365 Message Encryption capabilities use the protection capabilities, also called Azure Rights
Management (Azure RMS ), from Azure Information Protection. This includes encryption, identity, and
authorization policies to help secure your email. You can encrypt messages by using rights management
templates, the Do Not Forward option, and the encrypt-only option. Users can then encrypt email messages and a
variety of Office 365 attachments by using these options. For a full list of supported attachment types, see "File
types covered by IRM policies when they are attached to messages" in Introduction to IRM for email messages.
As an administrator, you can also define mail flow rules to apply this protection. For example, you can define a rule
where all unprotected messages that are addressed to a specific recipient or that contain specific words in the
subject line are protected from unauthorized access, and the recipients can't copy or print the contents of the
message.
Unlike the previous version of OME, these new capabilities provide a unified sender experience whether you're
sending mail inside your organization or to recipients outside of Office 365. In addition, recipients who receive a
protected email message sent to an Office 365 account in Outlook 2016 or Outlook on the web, don't have to take
any additional action to view the message. It works seamlessly. Recipients using other email clients and email
service providers also have an improved experience. For information, see Learn about protected messages in
Office 365 and How do I open a protected message.

Steps to manually set up the new capabilities for OME


If your organization does not automatically have OME enabled, or if you turned OME off, follow these steps to
manually set up the new capabilities for OME.
To manually set up the new capabilities for OME
1. Ensure you have the right subscription for your organization. For information on subscriptions, see "What
subscriptions do I need to use the new OME capabilities?" in the Office 365 Message Encryption FAQ. For
information about purchasing a subscription to Azure Information Protection, see Azure Information
Protection.
2. Decide whether you want Microsoft to manage the root key for Azure Information Protection (the default),
or generate and manage this key yourself (known as bring your own key, or BYOK). If you want to generate
and manage this key yourself, you need to complete some steps before you set up the new capabilities for
OME. For more information, see Planning and implementing your Azure Information Protection tenant
key. Microsoft recommends that you complete these steps before you set up OME.
3. Enable the new capabilities for OME by activating Azure Rights Management. For instructions, see
Activating Azure Rights Management. When you do this, Office 365 automatically enables the new OME
capabilities for you.

TIP
Outlook on the Web caches its UI, so it's a good idea to wait a day before you try applying the new capabilities for
OME to email messages using this client. Before the UI updates to reflect the new configuration, the new capabilities
for OME won't be available. After the UI updates, users can protect email messages by using the new capabilities for
OME.

4. (Optional) Set up new mail flow rules or update existing mail flow rules that define how and when you
want Office 365 to encrypt messages sent from your organization.

Verify that the new capabilities for OME are configured properly by
using Windows PowerShell
Follow these steps to verify that your tenant is properly configured to use the new capabilities for OME through
Exchange Online PowerShell.
1. Using a work or school account that has global administrator permissions in your Office 365 organization,
start a Windows PowerShell session and connect to Exchange Online. For instructions, see Connect to
Exchange Online PowerShell.
2. Run the Test-IRMConfiguration cmdlet using the following syntax:
Test-IRMConfiguration [-Sender <email address >]

For example:
Test-IRMConfiguration -Sender securityadmin@contoso.com

Where email address is the email address of a user in your Office 365 organization. While optional,
providing a sender email address forces the system to perform additional checks.
Your results should look like these:
Results : Acquiring RMS Templates ...
- PASS: RMS Templates acquired. Templates available: Contoso - Confidential View Only,
Contoso - Confidential, Do Not
Forward.
Verifying encryption ...
- PASS: Encryption verified successfully.
Verifying decryption ...
- PASS: Decryption verified successfully.
Verifying IRM is enabled ...
- PASS: IRM verified successfully.

OVERALL RESULT: PASS

Where Contoso is replaced with the name of your Office 365 organization.
The names of the default templates returned in the results may be different from those displayed in the
results above.
For an introduction to templates and information about the default templates, see Configuring and
managing templates for Azure Information Protection. For information about the Do Not Forward option,
encrypt-only option, and how to create additional templates, or find out what rights are included in an
existing template, see Configuring usage rights for Azure Rights Management.
3. Run the Remove-PSSession cmdlet to disconnect from the Rights Management service.
Remove-PSSession $session

Next steps: Define new mail flow rules that use the new OME
capabilities
This step is optional for new OME deployments, however, this step is required for existing OME deployments that
already have mail flow rules set up to encrypt outgoing mail. If you want to take advantage of the new OME
capabilities, you must update your existing mail flow rules. Otherwise, your users will continue to receive
encrypted mail that uses the previous HTML attachment format instead of the new, seamless OME experience.
Mail flow rules determine under what conditions email messages should be encrypted, as well as conditions for
removing that encryption. When you set an action for a rule, any messages that match the rule conditions are
encrypted when they're sent.
For more information about mail flow rules, see Define mail flow rules to encrypt email messages in Office 365.

Related Topics
Send, view, and reply to encrypted messages in Outlook
Enable-Aadrm
Connect to Exchange Online PowerShell
Define mail flow rules to encrypt email messages in Office 365
How Exchange Online secures your email secrets
8/21/2018 • 2 minutes to read • Edit Online

This article describes how Microsoft secures your email secrets in its datacenters.

How do we secure secret information provided by you?


In addition to the Office 365 Trust Center which provides Security, Privacy and Compliance Information for Office
365, you might want to know how Office 365 helps protects secrets you provide in its datacenters. We use a
technology called Distributed Key Manager (DKM ).
Distributed Key Manager (DKM ) is a client-side functionality that uses a set of secret keys to encrypt and decrypt
information. Only members of a specific security group in Active Directory Domain Services can access those keys
in order to decrypt the data that is encrypted by DKM. In Exchange Online, only certain service accounts under
which the Exchange processes run are part of that security group. As part of standard operating procedure in the
datacenter, no human is given credentials that are part of this security group and therefore no human has access to
the keys that can decrypt these secrets.
For debugging, troubleshooting, or auditing purposes, a datacenter administrator must request elevated access to
gain temporary credentials that are part of the security group. This process requires multiple levels of legal
approval. If access is granted, all activity is logged and audited. In addition access is only granted for a set interval
of time after which it automatically expires.
For extra protection, DKM technology includes automated key rollover and archiving. This also ensures that you
can continue to access your older content without having to rely on the same key indefinitely.

Where does Exchange Online make use of DKM?


Microsoft uses DKM to encrypt your secrets in Exchange Online datacenters. For example:
Email account credentials for connected accounts. Connected accounts are third-party accounts such as
Hotmail, Gmail, and Yahoo! mail accounts.
Rights Management service (RMS ) root keys. These are customer keys that are either imported from Azure
RMS or from customer's on-premises Active Directory Domain Services RMS deployments that are used
for encrypting and decrypting emails with RMS or Office 365 Message Encryption (OME ).

Related topics
Encryption in Office 365
Technical reference details about encryption in Office 365
Service assurance in the Office 365 Security & Compliance Center
Office 365 Message Encryption
8/21/2018 • 6 minutes to read • Edit Online

With Office 365 Message Encryption, your organization can send and receive encrypted email messages between
people inside and outside your organization. Office 365 Message Encryption works with Outlook.com, Yahoo!,
Gmail, and other email services. Email message encryption helps ensure that only intended recipients can view
message content.
This article is part of a larger series of articles about Office 365 Message Encryption. Use the following table to
quickly find the information you need.

Read this article... If you are...

Learn about protected messages in Office 365 An end user that wants to learn more about how encrypted
messages work and what options are available to you.

How do I open a protected message? An end user that wants to read a protected message that
was sent to you. This article includes information about
reading messages in several versions of Outlook and from
different email accounts, including those outside of Office 365
such as gmail and Yahoo! accounts.

Send, view, and reply to encrypted messages in Outlook An end user that wants to send, view, or reply to an
encrypted message from Outlook. Even if you're not a
member of an Office 365 organization, you still receive
notification of encrypted messages sent to you in Outlook.
Use this article for instructions on how to to view and reply
to encrypted messages sent from Office 365.

Send a digitally signed or encrypted message An end user that wants to send, view, or reply to encrypted
messages using Outlook for Mac. This article also covers
using encryption methods other than OME, such as S/MIME.

View encrypted messages on your Android device An end user who has received a message encrypted with
Office 365 Message Encryption on your Android device, you
can use the free OME Viewer app to view the message and
send an encrypted reply. This article explains how.

View encrypted messages on your iPhone or iPad An end user who has received a message encrypted with
Office 365 Message Encryption on your iPhone or iPad, you
can use the free OME Viewer app to view the message and
send an encrypted reply. This article explains how.

Office 365 Message Encryption (OME) (this article) An Office 365 or Exchange Online Protection administrator
that wants to learn where you can find additional resources.

Office 365 Message Encryption FAQ An Office 365 or Exchange Online Protection administrator
who wants answers to commonly asked questions including
licensing and a comparison between the new capabilities and
legacy OME.
Set up new Office 365 Message Encryption capabilities An Office 365 or Exchange Online Protection administrator
who wants to learn how to set up the new Office 365
Message Encryption capabilities for your Office 365
organization.

Define mail flow rules to encrypt email messages in Office An Office 365 or Exchange Online Protection administrator
365 who has already set up Office 365 Message Encryption and
you are ready to define mail flow rules to automatically
encrypt email messages sent from your organization.

Manage Office 365 Message Encryption An Office 365 or Exchange Online Protection administrator
who has already set up Office 365 Message Encryption and
wants to configure optional settings for OME.

Add your organization's brand to your encrypted messages An Office 365 or Exchange Online Protection administrator
who wants to apply your company branding to customize the
look of your organization's Office 365 Message Encryption
email messages and the contents of the OME portal.

Office 365 Message Encryption in the Message Policy and Looking for a detailed description of the Office 365 Message
Compliance service description Encryption feature, including supported SKUs, available from
Office 365.

Legacy information for Office 365 Message Encryption An Office 365 or Exchange Online Protection administrator
who has already set up Office 365 Message Encryption and
you want information about how OME worked before the
release of the new capabilities. While you cannot set up a new
deployment using OME without the new capabilities,
Microsoft continues to support existing deployments.

The rest of this article applies to the new OME capabilities.

How Office 365 Message Encryption works


Office 365 Message Encryption is an online service that's built on Microsoft Azure Rights Management (Azure
RMS ) which is part of Azure Information Protection. Office 365 administrators can define mail flow rules to
determine the conditions for encryption. For example, a rule can require the encryption of all messages
addressed to a specific recipient.
When someone sends an email message in Exchange Online that matches an encryption mail flow rule, the
message is encrypted before it's sent. All Office 365 end-users that use Outlook clients to read mail receive
native, first-class reading experiences for encrypted and rights-protected mail even if they're not in the same
organization as the sender. Supported Outlook clients include Outlook desktop, Outlook Mac, Outlook mobile on
iOS and Android, and Outlook Web App.
Recipients of encrypted messages who receive encrypted or rights-protected mail sent to their Outlook.com,
Gmail, and Yahoo accounts can easily authenticate to the OME portal using their Microsoft account, or Gmail or
Yahoo credentials.
End-users that read encrypted or rights-protected mail on clients other than Outlook also use the OME portal to
view encrypted and rights-protected messages that they receive.
We've increased the size limits for messages and attachments that you can encrypt using Office 365 Message
Encryption. For more information about limits, see Exchange Online Limits.

Defining rules for Office 365 Message Encryption


One way to enable the new capabilities for Office 365 Message Encryption is for Exchange Online and Exchange
Online Protection administrators to define mail flow rules. These rules determine under what conditions email
messages should be encrypted. When an encryption action is set for a rule, any messages that match the rule
conditions are encrypted before they're sent.
Mail flow rules are flexible, letting you combine conditions so you can meet specific security requirements in a
single rule. For example, you can create a rule to encrypt all messages that contain specified keywords and are
addressed to external recipients. The new capabilities for Office 365 Message Encryption also encrypt replies
from recipients of encrypted email.
For more information about how to create mail flow rules to take advantage of the new OME capabilities, see
Define Rules for Office 365 Message Encryption.

Sending, viewing, and replying to encrypted email messages


With Office 365 Message Encryption, users can send encrypted email from Outlook and Outlook on the web.
Additionally, admins can set up mail flow rules in Office 365 to automatically encrypt emails based on keyword
matching or other conditions.
Recipients of encrypted messages who are in Office 365 organizations will be able to read those messages
seamlessly in any version Outlook, including Outlook for PC, Outlook for Mac, Outlook on the web, Outlook for
iOS, and Outlook for Android. Users that receive encrypted messages on other email clients can view the
messages in the OME portal.
For detailed guidance about how to send and view encrypted messages, take a look at these articles:
How do I open a protected message?
Send, view, and reply to encrypted messages in Outlook

Get started with the new OME capabilities


If you're ready to get started using the new OME capabilities within your organization, see Set up new Office 365
Message Encryption capabilities.
Office 365 Message Encryption email revocation
9/25/2018 • 2 minutes to read • Edit Online

This article is part of a larger series of articles about Office 365 Message Encryption. Right now, encrypted email
revocation is in preview. Expect updates and changes to the feature and the content as we continue to improve our
offering.
You may find it necessary to revoke an email that has already been sent. If the email was encrypted using Office
365 Message Encryption, and you are an Office 365 admin, you can do this for email under certain conditions. This
article describes under what circumstances this is possible and how to do it.

Encrypted emails that you can revoke


You can revoke encrypted emails if the recipient received a link-based, branded encrypted email. If the recipient
received a native inline experience in a supported Outlook client, then those emails cannot be revoked.
Whether a recipient receives a link-based experience or an inline experience depends on the recipient identity type:
Office 365 and Microsoft Account recipients (for example, outlook.com users) get an inline experience in supported
Outlook clients.
All other recipient types, such as Gmail recipients, get a link-based experience.
Coming soon, organizations will have the ability to force a link-based experience regardless of the recipient identity.
This way, all recipients will get a branded email with a link to the Office 365 Message Encryption portal where they
will be able to read and reply to encrypted emails. All such encrypted emails will be revocable.

Recipient experience for revoked encrypted emails


Once an email has been revoked, the recipient will get an error when trying to access the encrypted email through
the Office 365 Message Encryption portal: “The message has been revoked by the sender”.

How to revoke an encrypted email


Step 1. Obtain the Message ID of the email
Before you can revoke an encrypted mail you need to gather the Message ID of the mail. The MessageId is usually
of the format:
<xxxxxxxxxxxxxxxxxxxxxxx@xxxxxx.xxxx.prod.outlook.com>
There are multiple ways to find the Message ID of the email that you want to revoke. This section describes a
couple of options, but you can use any method that provides the ID.
To identify the Message ID of the email you want to revoke by using Message Trace in the Security & Compliance Center
1. Search for the email by sender or recipient using New Message Trace in Office 365 Security & Compliance
Center.
2. Once you've located the email select it to bring up the Message trace details pane. Expand More
Information to locate the Message ID.
To identify the Message ID of the email you want to revoke by using Office Message Encryption reports in the Security & Compliance
Center
1. In the Security & Compliance Center, navigate to the Message Encryption Report.
2. Choose the View details table and identify the message that you want to revoke.
3. Double-click the message to view details that include the Message ID.
Step 2. Revoke the mail
Once you know the Message ID of the email you want to revoke, you can revoke the email by using the Set-
OMEMessageRevocation cmdlet.
1. Connect to Exchange Online Using Remote PowerShell.
2. Run the Set-OMEMessageRevocation cmdlet as follows:

Set-OMEMessageRevocation -Revoke $true -MessageId "<messageId>"

3. To check whether the email was revoked, run the Get-OMEMessageStatus cmdlet as follows:

Get-OMEMessageStatus -MessageId "<messageId>"

If revocation was successful, the cmdlet returns the following result:


The encrypted email with the subject "<subject>" and Message ID "<messageId>" was successfully revoked.
Service encryption with Customer Key for Office 365
FAQ
10/16/2018 • 16 minutes to read • Edit Online

In addition to the baseline, volume-level encryption that's enabled through BitLocker and Distributed Key Manager
(DKM ), Office 365 offers an added layer of encryption at the application level for customer content in Office 365,
including data from Exchange Online, Skype for Business, SharePoint Online, and OneDrive for Business. This is
called service encryption.
Customer Key is built on service encryption and enables you to provide and control keys that are used to encrypt
your data at rest in Office 365 as described in the Online Services Terms (OST). Customer Key helps you meet
compliance obligations because you control the encryption keys that Office 365 uses to decrypt data.
To provide feedback on Customer Key, including the documentation, send your ideas, suggestions, and
perspectives to customerkeyfeedback@microsoft.com.

What is service encryption with Customer Key?


Customer Key enhances the ability of your organization to meet the demands of compliance requirements that
specify key arrangements with the cloud service provider. With Customer Key, you provide and control the
encryption keys for your Office 365 data at-rest at the application level. As a result, you may exercise control and
revoke your organization's keys, should you decide to exit the service. By revoking the keys, the data is unreadable
to the service. Key revocation is the first step on the path towards data deletion.

What Office 365 data at rest is covered by Customer Key?


SharePoint Online site content and the files stored on that site and files uploaded to OneDrive for Business are
covered. Exchange Online mailbox content (e-mail body, calendar entries, and content of email attachments) is
covered. Text conversations from Skype for Business are covered, but Skype Meeting Broadcast recordings and
Skype Meeting content uploads are not covered. Skype Meeting Broadcast and Skype Meeting content uploads
are encrypted along with all other content in Office 365, but we currently don't offer customer control of the
encryption keys.

What is the difference between Customer Key and Bring Your Own Key
(BYOK) with Azure Information Protection for Exchange Online?
Both options enable you to provide and control your own encryption keys; however, service encryption with
Customer Key encrypts your data at rest, residing in Office 365 servers at-rest, while BYOK with Azure Information
Protection for Exchange Online encrypts your data-in-transit and provides persistent online and offline protection
for email messages and attachments for Office 365. Customer Key and BYOK with Azure Information Protection
for Exchange Online are complementary, and whether you choose to use Microsoft's service-managed keys or
your own keys, encrypting your data-at-rest and in-transit can provide added protection from malicious attacks.
BYOK with Azure Information Protection for Exchange Online is offered in the Office 365 Message Encryption
capabilities.

Does Office 365 Message Encryption and Bring Your Own Key with
Azure Information Protection change Microsoft's approach to third-
party data requests such as subpoenas?
No. Office 365 Message Encryption and the option to provide and control your own encryption keys with Bring
Your Own Key (BYOK) for Azure Information Protection (AIP ) was not designed to respond to law enforcement
subpoenas. Office 365 Message Encryption with BYOK for AIP was designed for compliance focused customers
that need to meet their internal or external compliance obligations. Microsoft takes third-party requests for
customer data very seriously. As a cloud service provider, we always advocate for the privacy of customer data. In
the event we get a subpoena, we always attempt to redirect the third party to the customer to obtain the
information. (Please read Brad Smith's blog: Protecting customer data from government snooping). We
periodically publish detailed information of the request we receive here.
See the Microsoft Trust Center regarding third-party data requests and "Disclosure of Customer Data" in the
Online Services Terms (OST) for more information.

Does service encryption with Customer Key change Microsoft's


approach to third-party data requests such as subpoenas?
No. Customer Key was not designed to respond to law enforcement subpoenas. It was designed for regulated
customers to meet their internal or external compliance obligations. Microsoft takes third-party requests for
customer data very seriously. As a cloud service provider, we always advocate for the privacy of customer data. In
the event we get a subpoena, we always attempt to redirect the third party to the customer to obtain the
information. (Please read Brad Smith's blog: Protecting customer data from government snooping). We
periodically publish detailed information of the request we receive here.
See the Microsoft Trust Center regarding third-party data requests and "Disclosure of Customer Data" in the
Online Services Terms (OST) for more information.

Is FastTrack support available for implementing Customer Key?


No. FastTrack is only used to collect tenant and service configuration information that is required to register for
Customer Key. The Customer Key Offers are published via FastTrack so that it is convenient for customers and
partners to submit this required information using the same method and for ease of archiving the data that
customers provide in the Offer.
If you need additional support beyond the documentation, contact Microsoft Consulting Services (MCS ), Premier
Field Engineering (PFE ), or a Microsoft partner for assistance.

If my keys are destroyed, how can I recover?


The availability key provides you with the capability to recover from the unanticipated loss of root keys that you
manage. If you lose your root keys, contact Microsoft Support and Microsoft will assist you through the process of
enabling the availability key. You'll use the availability key to migrate to a new Data Encryption Policy with new
keys provisioned by you.

What is the availability key?


The availability key is a root key that is provisioned when you create a data encryption policy. The availability key is
stored and protected within Office 365 and is functionally similar to the two root keys that are supplied by you for
use with service encryption with Customer Key. Unlike the keys that you provide and manage in Azure Key Vault,
you can't directly access the availability key. Storage and control of the availability key are deliberately different
from Azure Key Vault keys for three reasons: first, the availability key provides a high-availability capability in the
event that Office 365 services are unable to reach keys hosted in Azure Key Vault; second, the availability key
provides a "break glass" capability in the event that both Azure Key Vault keys are lost; and third, the separation of
logical controls provides defense-in-depth and protects against the loss of all keys from a single attack or point of
failure. Sharing the responsibility to protect the keys, while using a variety of protections and processes for key
management, ultimately reduces the risk that all keys (and therefore your data) will be lost or destroyed. Microsoft
provides you with sole authority over the destruction of the availability key. By design, no one at Microsoft has
access to the availability key - it is only accessible by Office 365 service code.

How many data encryption policies (DEPs) can I create?


Exchange Online and Skype for Business: You can create up to 50 DEPs.
SharePoint Online and OneDrive for Business: A DEP applies to data in one geographic location, also called a
geo. If you use the multi-geo feature of Office 365, you can create one DEP per geo. If you are not using multi-geo,
you can create one DEP.

Can I assign a data encryption policy before migrating a mailbox to the


cloud?
Yes. You can use the Windows PowerShell cmdlet Set-MailUser to assign a data encryption policy (DEP ) to the
user prior to migrating the mailbox to Office 365. When you do this, the contents of the mailbox will be encrypted
using the assigned DEP as the content is migrated. This can be more efficient than assigning a DEP after the
mailbox has already been migrated and then waiting for encryption to take place, which can take hours or possibly
days.

How do I verify that encryption with Customer Key is activated and


Office 365 has finished encrypting with Customer Key?
Exchange Online and Skype for Business: You can connect to Exchange Online using remote PowerShell and
then use the [Get-MailboxStatistics] cmdlet for each mailbox that you want to check. In the output from the Get-
MailboxStatistics cmdlet, the IsEncrypted property returns a value of true if the mailbox is encrypted and a value of
false if it's not. If the mailbox is encrypted, the value returned for the DataEncryptionPolicyID property is the
GUID of the DEP with which the mailbox is encrypted. For more information on running this cmdlet, see Get-
MailboxStatistics and using PowerShell with Exchange Online.
If the mailboxes aren't encrypted after waiting 72 hours from the time you assigned the DEP, initiate a mailbox
move. To do this, connect to Exchange Online using remote PowerShell and then use the New -MoveRequest
cmdlet and provide the alias of the mailbox as follows:

New-MoveRequest <alias>

SharePoint Online and OneDrive for Business: You can connect to SharePoint Online PowerShell, and then
use the [Get-SPODataEncryptionPolicy] cmdlet to check the status of your tenant. The ** State** property
returns a value of registered if Customer Key encryption is enabled and all files in all sites have been encrypted. If
encryption is still in progress, this cmdlet provides information on what percentage of sites is complete.

If I want to switch to a different set of keys, how long does it take for
the new set of keys to protect my data?
Exchange Online and Skype for Business: It can take up to 72 hours to protect a mailbox according to a new
Data Encryption Policy (DEP ) from the time the new DEP is assigned to the mailbox.
SharePoint Online and OneDrive for Business: It can take up to four hours to re-encrypt your entire tenant
once a new key has been assigned.
Is my existing data stored without encryption at any time while it is
decrypted or encrypted with Customer Key?
No. Your data is always encrypted at rest in the Office 365 service with BitLocker and DKM. For more information,
see the "Security, Privacy, and Compliance Information for Office 365", and How Exchange Online secures your
email secrets.

If I no longer want to use customer-managed encryption keys, can I


switch to Microsoft-managed keys?
Exchange Online and Skype for Business: Not yet. This will be supported once service encryption in Office 365
with Microsoft-managed keys is rolled out broadly. We expect to roll this out in the service after we release service
encryption with Customer Key.
SharePoint Online and OneDrive for Business: Yes. You can choose to revert to using Microsoft-managed keys
separately for each geo (if you use the multi-geo feature) or for all your data if it is in a single geo.

If I lose my keys, how long does it take to recover service availability


using the recovery key?
Exchange Online and Skype for Business: Once you call in to use the availability key, mailboxes will be
accessible within minutes.
SharePoint Online and OneDrive for Business: This operation is proportional to the number of sites you have.
Once you call Microsoft to use the availability key, you will be fully online within about four hours.

How is the availability key used with Exchange Online?


There are three ways that the availability key is used with Exchange Online:
Service availability - in the event that Azure Key Vault keys are unreachable.
Actions initiated by Office 365 service code - such as search index creation or mailbox moves.
Recover from key loss - such as the loss of both Azure Key Vault keys associated with a single DEP.
Using the availability key for service availability in the event Azure Key Vault keys are unreachable.
Office 365 uses the availability key both for service availability and recovery from an unhealthy Customer Key
state for Exchange Online. There is a hierarchy of keys used by Customer Key. This hierarchy is illustrated in the
following figure.

If both Azure Key Vault keys of a single Data Encryption Policy (DEP ) are unavailable, Office 365 can use the
availability key to change to a new DEP. Office 365 determines whether to use the availability key for service
availability differently depending on whether a user-initiated activity, for example, when a user downloads email to
the Outlook client, or a system-initiated activity, such as indexing mailbox contents, or for eDiscovery searches,
triggered the process.
Office 365 follows this process in response to user-initiated actions to determine whether to use the availability
key for user mailboxes:
1. Office 365 reads the DEP to which the mailbox is assigned in order to determine the location of the two
customer keys in Azure Key Vault.
2. Office 365 randomly chooses one of the two customer keys from the DEP and sends a request to Azure Key
Vault to unwrap the DEP key using the customer key.
3. If the request to unwrap the DEP key using the customer key fails and returns an error, Office 365 sends a
second request to Azure Key Vault, this time instructing it to use the alternate (second) customer key.
4. If the second request to unwrap the DEP key using the customer key fails and returns an error, Office 365
examines the results of both requests:
If the examination determines that the errors DO NOT reflect an explicit action by a customer identity, then
Office 365 uses the availability key to decrypt the DEP key. The DEP key is then used to decrypt the mailbox
key and complete the user request.
In this case, Azure Key Vault is either unable to respond or unreachable for whatever reason. Office 365 has
no way of determining if the customer has intentionally revoked access to the keys.
If the examination indicates that deliberate action has been taken to render the customer keys unavailable,
then the availability key will not be used, the user request fails, and the user receives an error message, such
as login failure.
When this happens, the customer is made aware that service is impacted, and the condition of Customer
Key is unhealthy. For example, if a customer is using a single DEP for all mailboxes in the organization, the
customer may experience a widespread failure where users can't access their mailboxes. This ensures that
when both customer keys are unhealthy, the customer is made aware of the need to correct the situation
and restore the service to a healthy state.
Using the availability key for actions initiated by Office 365 service code.
Office 365 service code always has a valid login token and can't be blocked. Therefore, until the availability key has
been deleted, it can be used for actions initiated by, or internal to, Office 365 service code, such as search index
creation or moving mailboxes.
Using the availability key to recover from key loss.
You can use the availability key to recover from the loss of both Azure Key Vault keys that are associated with the
same DEP, as described in the answer to the FAQ entry "If my keys are destroyed, how can I recover?".

How is the availability key used with SharePoint Online and OneDrive
for Business?
The SharePoint Online and OneDrive for Business architecture and implementation for Customer Key and
availability key are different from Exchange Online and Skype for Business.
When a customer moves to customer-managed keys, Office 365 creates a tenant-specific intermediate key (TIK).
Office 365 encrypts the TIK twice, once with each of the customer keys, and stores the two encrypted versions of
the TIK. Only the encrypted versions of the TIK are stored, and a TIK can only be decrypted with the customer
keys. The TIK is then used to encrypt site keys, which are then used to encrypt blob keys. The blobs themselves are
encrypted and stored in the Microsoft Azure Blob storage service.
Office 365 follows this process to access a blob that has customer file data:
1. Decrypt the TIK using the Customer Key.
2. Use the decrypted TIK to decrypt a site key.
3. Use the decrypted site key to decrypt a blob key.
4. Use the decrypted blob key to decrypt the blob.
When decrypting a TIK, Office 365 issues two decryption requests to Azure Key Vault with a slight offset. The first
one to finish furnishes the result, canceling the other request.
In case the customer loses access to their customer keys, Office 365 also encrypts the TIK with an availability key
and stores this along with the TIKs encrypted with each customer key. The TIK encrypted with the availability key is
used only when the customer calls Microsoft to enlist the recovery path when they have lost access to their keys,
maliciously or accidentally.
For availability and scale reasons, decrypted TIKs are cached in a time-limited memory cache. Two hours before a
TIK cache is set to expire, Office 365 attempts to decrypt each TIK. Decrypting the TIKs extends the lifetime of the
cache. If TIK decryption fails for a significant amount of time, Office 365 generates an alert to notify engineering
prior to the cache expiration. Only if the customer calls Microsoft will Office 365 initiate the recovery operation,
which involves decrypting the TIK with the availability key stored in Microsoft's secret store and onboarding the
tenant again using the decrypted TIK and a new set of customer-supplied Azure Key Vault keys.
As of today, Customer Key is involved in the encryption and decryption chain of SharePoint Online file data stored
in the Azure blob store, but not SharePoint Online list items or metadata stored in the SQL database. Office 365
does not use the availability key for SharePoint Online or OneDrive for Business other than the case described
above, which is customer initiated. Human access to customer data is protected by Customer Lockbox.

How is Customer Key licensed?


Customer Key is offered in the Office 365 Enterprise Suite, "E5", and the Advanced Compliance SKU. Additionally,
customers must also purchase the appropriate license for using Azure Key Vault.
Each user benefiting from Customer Key needs to be licensed if they want to be covered by Customer Key.
For SharePoint Online, the Office 365 Administrator who configures Customer Key also needs to be licensed, to
perform the setup steps. Additionally, the users that are benefiting from the feature need to be licensed - this
includes the site owner and any users accessing files on one or more sites that are encrypted using Customer Key.
External users do not need to be licensed to access files on one or more sites that are encrypted using Customer
Key.
For Exchange Online, "user" mailboxes and "mail user" mailboxes must be licensed. All others, such as shared
mailboxes, are not required to have a license for Customer Key. To check that your Exchange Online mailbox is
properly licensed, run the following cmdlet:

(Get-Mailbox <alias >).PersistedCapabilities

If the string BPOS_S_EquivioAnalytics exists, then the mailbox is properly licensed. If not, you must apply the
proper license in order to use the Customer Key feature for this mailbox.

Can I enable Customer Key for a trial subscription?


No. By definition, trial subscriptions have a limited lifetime. Encryption keys that are hosted in trial subscriptions
can be lost at the end of the trial lifetime. Because Microsoft cannot and does not prevent customers from putting
important customer data in trial subscriptions, the use of Customer Key with trial subscriptions is prohibited.
How much will using Customer Key cost?
In addition to the licensing required for Customer Key, customers will incur a cost for Key Vault usage. Azure Key
Vault pricing details describes the cost model and will assist with estimating. There is no way to predict the exact
cost that any customer will incur because usage patterns vary. Experience has shown that the cost is very low and
generally falls within the range of $0.002 to $0.005 per user per month plus the cost of HSM -backed keys. The
cost will also vary according to the logging configuration chosen by the customer and the amount of Azure storage
used for Azure Key Vault logs.

For more information


To get started with Customer Key, see Controlling your data in Office 365 using Customer Key.
Set up encryption in Office 365 Enterprise
7/18/2018 • 2 minutes to read • Edit Online

Encryption can protect your content from being read by unauthorized users. Because encryption in Office 365 can
be done using various technologies and methods, there isn't one single place where you turn on or set up
encryption. This article provides information about various ways you can set up or configure encryption as part of
your information protection strategy.

TIP
If you are looking for more technical details about encryption, see Technical reference details about encryption in Office 365.

With Office 365, several encryption capabilities are available by default. Additional encryption capabilities can be
configured to meet certain compliance or legal requirements. The following table describes several encryption
methods for different scenarios.

SCENARIO ENCRYPTION METHODS

Files are saved on Windows computers Encryption at the computer level can be done using BitLocker
on Windows devices. As an enterprise administrator or IT Pro,
you can set this up using the Microsoft Deployment Toolkit
(MDT). See Set up MDT for BitLocker.

Files are saved on mobile devices Some kinds of mobile devices encrypt files that are saved to
those devices by default. With Capabilities of built-in Mobile
Device Management for Office 365, you can set policies that
determine whether to allow mobile devices to access data in
Office 365. For example, you can set a policy that allows only
devices that encrypt content to access Office 365 data. See
Create and deploy device security policies.
For additional control over how mobile devices interact with
Office 365, you can consider adding Microsoft Intune. See
Choose between MDM for Office 365 and Microsoft Intune.

You need control over the encryption keys used to encrypt As an Office 365 administrator, you can control your
your data in Microsoft's data centers organization's encryption keys and then configure Office 365
to use them to encrypt your data at rest in Microsoft's data
centers.
Controlling your data in Office 365 using Customer Key
Customer Key for Office 365 FAQ

People are communicating via email (Exchange Online) As an Exchange Online administrator, you have several
options for configuring email encryption. These include:
Using Office 365 message encryption (OME) with Azure
Rights Management (Azure RMS) to enable people to send
encrypted messages inside or outside your organization
Using S/MIME for message signing and encryption to encrypt
and digitally sign email messages
Using TLS to set up connectors for secure mail flow with
another organization
See Email encryption in Office 365.
SCENARIO ENCRYPTION METHODS

Files are accessed from team sites or document libraries When people are working with files saved to OneDrive for
(OneDrive for Business or SharePoint Online) Business or SharePoint Online, TLS connections are used. This
is built into Office 365 automatically. See Data Encryption in
OneDrive for Business and SharePoint Online.

Files are shared in online meetings and IM conversations When people are working with files using Skype for Business
(Skype for Business Online) Online, TLS is used for the connection. This is built into Office
365 automatically. See Security and Archiving (Skype for
Business Online).

Additional information
To learn more about file protection solutions that include encryption options, see File Protection Solutions in
Office 365.
Add your organization's brand to your encrypted
messages
7/18/2018 • 3 minutes to read • Edit Online

As an Exchange Online or Exchange Online Protection administrator, you can apply your company branding to
customize the look of your organization's Office 365 Message Encryption email messages and the contents of the
encryption portal. Using the Get-OMEConfiguration and Set-OMEConfiguration Windows PowerShell cmdlets,
you can customize the following aspects of the viewing experience for recipients of encrypted email messages:
Introductory text of the email that contains the encrypted message
Disclaimer text of the email that contains the encrypted message
Text that appears in the OME portal
Logo that appears in the email message and OME portal
Background color in the email message and OME portal
You can also revert back to the default look and feel at any time.

This article is part of a larger series of articles about Office 365 Message Encryption. This article is intended for administrators
and ITPros. If you're just looking for information on sending or receiving an encrypted message, see the list of articles in Office
365 Message Encryption (OME) and locate the article that best fits your needs.

To customize the look of the OME portal and email messages encrypted by OME with your
organization's brand
1. Connect to Exchange Online using Remote PowerShell, as described in Connect to Exchange Online Using
Remote PowerShell.
2. Use the Set-OMEConfiguration cmdlet as described in Set-OMEConfiguration or use the following table
for guidance.
Encryption customization options

TO CUSTOMIZE THIS FEATURE OF THE ENCRYPTION EXPERIENCE USE THESE COMMANDS

Default text that accompanies encrypted email messages. The Set-OMEConfiguration -Identity
default text appears above the instructions for viewing <OMEConfigurationIdParameter> -EmailText "<String up
to 1024 characters>"
encrypted messages
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
EmailText "Encrypted message from ContosoPharma
secure messaging system."
TO CUSTOMIZE THIS FEATURE OF THE ENCRYPTION EXPERIENCE USE THESE COMMANDS

Disclaimer statement in the email that contains the encrypted Set-OMEConfiguration -Identity
message <OMEConfigurationIdParameter> -DisclaimerText "
<Disclaimer statement. String of up to 1024
characters.>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
DisclaimerText "This message is confidential for the
use of the addressee only."

Text that appears at the top of the encrypted mail viewing Set-OMEConfiguration -Identity
portal <OMEConfigurationIdParameter> -PortalText "<Text for
your portal. String of up to 128 characters.>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
PortalText "ContosoPharma secure email portal."

Logo Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -Image <Byte[]>
Example:
Set-OMEConfiguration -Identity "OME configuration" -
Image (Get-Content "C:\Temp\contosologo.png" -
Encoding byte)
Supported file formats: .png, .jpg, .bmp, or .tiff
Optimal size of logo file: less than 40 KB
Optimal size of logo image: 170x70 pixels

Background color Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -BackgroundColor "
<Hexadecimal color code>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
BackgroundColor "#ffffff"

To remove brand customizations from the OME portal and email messages encrypted by OME
1. Connect to Exchange Online using Remote PowerShell, as described in Connect to Exchange Online Using
Remote PowerShell.
2. Use the Set-OMEConfiguration cmdlet as described in Set-OMEConfiguration. To remove your
organization's branded customizations from the DisclaimerText, EmailText, and PortalText values, set the
value to an empty string, "" . For all image values, such as Logo, set the value to "$null" .

Encryption customization options

USE THESE COMMANDS

Default text that accompanies encrypted email messages Set-OMEConfiguration -Identity


The default text appears above the instructions for viewing <OMEConfigurationIdParameter> -EmailText "<empty
string>"
encrypted messages
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
EmailText ""

Disclaimer statement in the email that contains the encrypted Set-OMEConfiguration -Identity
message <OMEConfigurationIdParameter> DisclaimerText "<empty
string>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
DisclaimerText ""
USE THESE COMMANDS

Text that appears at the top of the encrypted mail viewing Set-OMEConfiguration -Identity
portal <OMEConfigurationIdParameter> -PortalText "<empty
string>"
Example reverting back to default:
Set-OMEConfiguration -Identity "OME Configuration" -
PortalText ""

Logo Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -Image <"$null">
Example reverting back to default:
Set-OMEConfiguration -Identity "OME configuration" -
Image $null

Background color Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -BackgroundColor
<"$null">
Example reverting back to default:
Set-OMEConfiguration -Identity "OME configuration" -
BackgroundColor $null
Controlling your data in Office 365 using Customer
Key
9/13/2018 • 31 minutes to read • Edit Online

With Customer Key, you control your organization's encryption keys and then configure Office 365 to use them to
encrypt your data at rest in Microsoft's data centers. Data at rest includes data from Exchange Online and Skype
for Business that is stored in mailboxes and files that are stored in SharePoint Online and OneDrive for Business.
You must set up Azure before you can use Customer Key for Office 365. This topic describes the steps you need to
follow to create and configure the required Azure resources and then provides the steps for setting up Customer
Key in Office 365. After you have completed Azure setup, you determine which policy, and therefore, which keys,
to assign to mailboxes and files in your organization. Mailboxes and files for which you don't assign a policy will
use encryption policies that are controlled and managed by Microsoft. For more information about Customer Key,
or for a general overview, see the Customer Key for Office 365 FAQ.

IMPORTANT
We strongly recommend that you follow the best practices in this topic. These are called out as TIP and IMPORTANT.
Customer Key gives you control over root encryption keys whose scope can be as large as your entire organization. This
means that mistakes made with these keys can have a broad impact and may result in service interruptions or irrevocable
loss of your data.

Before you begin setting up Customer Key


Before you get started, be sure you have the appropriate licensing for your organization. Customer Key in Office
365 is offered in Office 365 E5 or the Advanced Compliance SKU.
Then, to understand the concepts and procedures in this topic, you should review the Azure Key Vault
documentation. Also, become familiar with the terms used in Azure, for example, tenant.
To provide feedback on Customer Key, including the documentation, send your ideas, suggestions and
perspectives to customerkeyfeedback@microsoft.com.

Overview of setting up Customer Key for Office 365


To set up Customer Key you will complete these tasks. The rest of this topic provides detailed instructions for each
task, or links out to more information for each step in the process.
In Azure and Microsoft FastTrack:
You will complete most of these tasks by remotely connecting to Azure PowerShell. For best results, use version
4.4.0 or later of Azure PowerShell.
Create two new Azure subscriptions
Register Azure subscriptions to use a mandatory retention period
Registration can take from one to five business days.
Submit a request to activate Customer Key for Office 365
Once you've created the two new Azure subscriptions, you'll need to submit the appropriate Customer Key
offer request by completing a web form that is hosted in the Microsoft FastTrack portal. The FastTrack team
doesn't provide assistance with Customer Key. Office simply uses the FastTrack portal to allow you to
submit the form and to help us track the relevant offers for Customer Key.
Once you have submitted a Customer Key offer, Microsoft reviews your request and notifies you when you can
proceed with the rest of the setup tasks. This process can take up to five business days.
Create a premium Azure Key Vault in each subscription
Assign permissions to each key vault
Enable and then confirm soft delete on your key vaults
Add a key to each key vault either by creating or importing a key
Check the recovery level of your keys
Backup Azure Key Vault
Validate Azure Key Vault configuration settings
Obtain the URI for each Azure Key Vault key
In Office 365:
Exchange Online and Skype for Business:
Create a data encryption policy (DEP ) for use with Exchange Online and Skype for Business
Assign a DEP to a mailbox
Validate mailbox encryption
SharePoint Online and OneDrive for Business:
Create a data encryption policy (DEP ) for each SharePoint Online and OneDrive for Business geo
Validate encryption of Group Sites, Team Sites, and OneDrive for Business

Complete tasks in Azure Key Vault and Microsoft FastTrack for


Customer Key
Complete these tasks in Azure Key Vault in order to set up Customer Key for Office 365. You will need to complete
these steps regardless of whether you intend to set up Customer Key for Exchange Online and Skype for Business
or SharePoint Online and OneDrive for Business or for all supported services in Office 365.
Create two new Azure subscriptions
Two Azure subscriptions are required for Customer Key. As a best practice, Microsoft recommends that you create
new Azure subscriptions for use with Customer Key. Azure Key Vault keys can only be authorized for applications
in the same Azure Active Directory (AAD ) tenant, you must create the new subscriptions using the same Azure AD
tenant used with your Office 365 organization where the DEPs will be assigned. For example, using your work or
school account that has global administrator privileges in your Office 365 organization. For detailed steps, see
Sign up for Azure as an organization.
IMPORTANT
Customer Key requires two keys for each data encryption policy (DEP). In order to achieve this, you must create two Azure
subscriptions. As a best practice, Microsoft recommends that you have separate members of your organization configure
one key in each subscription. In addition, these Azure subscriptions should only be used to administer encryption keys for
Office 365. This protects your organization in case one of your operators accidentally, intentionally, or maliciously deletes or
otherwise mismanages the keys for which they are responsible.
We recommend that you set up new Azure subscriptions that are solely used for managing Azure Key Vault resources for
use with Customer Key. There is no practical limit to the number of Azure subscriptions that you can create for your
organization. Following these best practices will minimize the impact of human error while helping to manage the resources
used by Customer Key.

Submit a request to activate Customer Key for Office 365


Once you've completed the Azure steps, you'll need to submit an offer request in the Microsoft FastTrack portal.
Once you have submitted a request through the FastTrack web portal, Microsoft verifies the Azure Key Vault
configuration data and contact information you provided. The selections that you make in the offer form regarding
the authorized officers of your organization is critical and necessary for completion of Customer Key registration.
The officers of your organization that you select in the form will be the used to ensure the authenticity of any
request to revoke and destroy all keys used with a Customer Key data encryption policy. You'll need to do this step
once to activate Customer Key for Exchange Online and Skype for Business coverage and a second time to
activate Customer Key for SharePoint Online and OneDrive for Business.
To submit an offer to activate Customer Key, complete these steps:
1. Using a work or school account that has global administrator permissions in your Office 365 organization,
log in to the Microsoft FastTrack portal.
2. Once you're logged in, browse to the Dashboard.
3. Choose Offers, and review the list of current offers.
4. Choose Learn More for the offer that applies to you:
Exchange Online and Skype for Business: Choose Learn More on the Customer Key for Exchange
offer.
SharePoint Online and OneDrive for Business: Chose Learn More on the Customer Key for
SharePoint and OneDrive for Business offer.
5. On the Offer details page, choose Create Request.
6. Fill out all applicable details and requested information on the offer form. Pay particular attention to your
selections for which officers of your organization you want to authorize to approve the permanent and
irreversible destruction of encryption keys and data. Once you've completed the form, choose Submit.
This process can take up to five business days once Microsoft has been notified of your request.
7. Continue on to the mandatory retention period section below.
Register Azure subscriptions to use a mandatory retention period
The temporary or permanent loss of root encryption keys can be very disruptive or even catastrophic to service
operation and can result in data loss. For this reason, the resources used with Customer Key require strong
protection. All the Azure resources that are used with Customer Key offer protection mechanisms beyond the
default configuration. Azure subscriptions can be tagged or registered in a way that will prevent immediate and
irrevocable cancellation. This is referred to as registering for a mandatory retention period. The steps required to
register Azure subscriptions for a mandatory retention period require collaboration with the Office 365 team. This
process can take from one to five business days. Previously, this was sometimes referred to as "Do Not Cancel".
Before contacting the Office 365 team, you must perform the following steps for each Azure subscription that you
use with Customer Key:
1. Log in to your Azure subscription with Azure PowerShell. For instructions, see Log in with Azure
PowerShell.
2. Run the Register-AzureRmProviderFeature cmdlet to register your subscriptions to use a mandatory
retention period.

Register-AzureRmProviderFeature -FeatureName mandatoryRetentionPeriodEnabled -ProviderNamespace


Microsoft.Resources

3. Contact Microsoft to have the process finalized. For the SharePoint and OneDrive for Business team,
contact spock@microsoft.com. For Exchange Online and Skype for Business, contact exock@microsoft.com.
The Service Level Agreement (SLA) for completion of this process is five business days once Microsoft has
been notified (and verified) that you have registered your subscriptions to use a mandatory retention
period. Include the following in your email:
Subject: Customer Key for <Your tenant's fully-qualified domain name>
Body: Subscription IDs for which you want to have the mandatory retention period finalized.
4. Once you receive notification from Microsoft that registration is complete, verify the status of your
registration by running the Get-AzureRmProviderFeature cmdlet as follows:

Get-AzureRmProviderFeature -ProviderNamespace Microsoft.Resources -FeatureName mandatoryRetentionPeriodEnabled

5. After verifying that the Registration State property from the Get-AzureRmProviderFeature cmdlet returns a
value of Registered, run the following command to complete the process:

Register-AzureRmResourceProvider -ProviderNamespace "Microsoft.KeyVault"

Create a premium Azure Key Vault in each subscription


The steps to create a key vault are documented in Getting Started with Azure Key Vault, which guides you through
installing and launching Azure PowerShell, connecting to your Azure subscription, creating a resource group, and
creating a key vault in that resource group.
When you create a key vault, you must choose a SKU: either Standard or Premium. The Standard SKU allows
Azure Key Vault keys to be protected with software - there is no Hardware Security Module (HSM ) key protection
- and the Premium SKU allows the use of HSMs for protection of Key Vault keys. Customer Key accepts key vaults
that use either SKU, though Microsoft strongly recommends that you use only the Premium SKU. The cost of
operations with keys of either type is the same, so the only difference in cost is the cost per month for each HSM -
protected key. See Key Vault pricing for details.

IMPORTANT
Use the Premium SKU key vaults and HSM-protected keys for production data, and only use Standard SKU key vaults and
keys for testing and validation purposes.

For each Office 365 service with which you will use Customer Key, create a key vault in each of the two Azure
subscriptions that you created. For example, for Exchange Online and Skype for Business only or SharePoint
Online and OneDrive for Business only, you will create only one pair of vaults. To enable Customer Key for both
Exchange Online and SharePoint Online, you will create two pairs of key vaults.
Use a naming convention for key vaults that reflects the intended use of the DEP with which you will associate the
vaults. See the Best Practices section below for naming convention recommendations.
Create a separate, paired set of vaults for each data encryption policy. For Exchange Online, the scope of a data
encryption policy is chosen by you when you assign the policy to mailbox. A mailbox can have only one policy
assigned, and you can create up to fifty policies. For SharePoint Online the scope of a policy is all of the data
within an organization in a geographic location, or geo.
The creation of key vaults also requires the creation of Azure resource groups, since key vaults need storage
capacity (though very small) and Key Vault logging, if enabled, also generates stored data. As a best practice
Microsoft recommends using separate administrators to manage each resource group, with the administration
aligned with the set of administrators that will manage all related Customer Key resources.

IMPORTANT
To maximize availability, your key vaults should be in regions close to your Office 365 service. For example, if your Exchange
Online organization is in North America, place your key vaults in North America. If your Exchange Online organization is in
Europe, place your key vaults in Europe.
Use a common prefix for key vaults, and include an abbreviation of the use and scope of the key vault and keys (e.g., for the
Contoso SharePoint service where the vaults will be located in North America, a possible pair of names is Contoso-O365SP-
NA-VaultA1 and Contoso-O365SP-NA-VaultA2. Vault names are globally unique strings within Azure, so you may need to
try variations of your desired names in case the desired names are already claimed by other Azure customers. As of July
2017 vault names cannot be changed, so a best practice is to have a written plan for setup and use a second person to
verify the plan is executed correctly.
If possible, create your vaults in non-paired regions. Paired Azure regions provide high availability across service failure
domains. Therefore, regional pairs can be thought of as each other's backup region. This means that an Azure resource that
is placed in one region is automatically gaining fault tolerance through the paired region. For this reason, choosing regions
for two vaults used in a DEP where the regions are paired means that only a total of two regions of availability are in use.
Most geographies only have two regions, so it's not yet possible to select non-paired regions. If possible, choose two non-
paired regions for the two vaults used with a DEP. This benefits from a total of four regions of availability. For more
information, see Business continuity and disaster recovery (BCDR): Azure Paired Regions for a current list of regional pairs.

Assign permissions to each key vault


For each key vault, you will need to define three separate sets of permissions for Customer Key, depending on
your implementation. For example, you will need to define one set of permissions for each of the following:
Key vault administrators that will perform day-to-day management of your key vault for your
organization. These tasks include backup, create, get, import, list, and restore.

IMPORTANT
The set of permissions assigned to key vault administrators does not include the permission to delete keys. This is
intentional and an important practice. Deleting encryption keys is not typically done, since doing so permanently
destroys data. As a best practice, do not grant this permission to key vault administrators by default. Instead,
reserve this for key vault contributors and only assign it to an administrator on a short term basis once a clear
understanding of the consequences is understood.

To assign these permissions to a user in your Office 365 organization, log in to your Azure subscription
with Azure PowerShell. For instructions, see Log in with Azure PowerShell.
Run the Set-AzureRmKeyVaultAccessPolicy cmdlet to assign the necessary permissions.
Set-AzureRmKeyVaultAccessPolicy -VaultName <vaultname>
-UserPrincipalName <UPN of user> -PermissionsToKeys create,import,list,get,backup,restore

For example:

Set-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365EX-NA-VaultA1


-UserPrincipalName alice@contoso.com -PermissionsToKeys create,import,list,get,backup,restore

Key vault contributors that can change permissions on the Azure Key Vault itself. You'll need to change
these permissions as employees leave or join your team, or in the extremely rare situation that the key vault
administrators legitimately need permission to delete or restore a key. This set of key vault contributors
needs to be granted the Contributor role on your key vault. You can assign this role by using Azure
Resource Manager. For detailed steps, see Use Role-Based Access Control to manage access to your Azure
subscription resources. The administrator who creates a subscription has this access implicitly, as well as
the ability to assign other administrators to the Contributor role.
If you intend to use Customer Key with Exchange Online and Skype for Business, you need to give
permission to Office 365 to use the key vault on behalf of Exchange Online and Skype for Business.
Likewise, if you intend to use Customer Key with SharePoint Online and OneDrive for Business, you need
to add permission for the Office 365 to use the key vault on behalf of SharePoint Online and OneDrive for
Business. To give permission to Office 365, run the Set-AzureRmKeyVaultAccessPolicy cmdlet using the
following syntax:

Set-AzureRmKeyVaultAccessPolicy -VaultName <vaultname> -PermissionsToKeys wrapKey,unwrapKey,get -


ServicePrincipalName <Office 365 appID>

Where:
vaultname is the name of the key vault you created.
For Exchange Online and Skype for Business, replace Office 365 appID with
00000002-0000-0ff1-ce00-000000000000

For SharePoint Online and OneDrive for Business, replace Office 365 appID with
00000003-0000-0ff1-ce00-000000000000

Example: Setting permissions for Exchange Online and Skype for Business:

Set-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365EX-NA-VaultA1


-PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000002-0000-0ff1-ce00-000000000000

Example: Setting permissions for SharePoint Online and OneDrive for Business

Set-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365SP-NA-VaultA1


-PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000003-0000-0ff1-ce00-000000000000

Enable and then confirm soft delete on your key vaults


When you can quickly recover your keys, you are less likely to experience an extended service outage due to
accidentally or maliciously deleted keys. You need to enable this configuration, referred to as Soft Delete, before
you can use your keys with Customer Key. Enabling Soft Delete allows you to recover keys or vaults within 90
days of deletion without having to restore them from backup.
To enable Soft Delete on your key vaults, complete these steps:
1. Log in to your Azure subscription with Windows Powershell. For instructions, see Log in with Azure
PowerShell.
2. Run the Get-AzureRmKeyVault cmdlet. In this example, vaultname is the name of the key vault for which
you are enabling soft delete:

$v = Get-AzureRmKeyVault -VaultName <vaultname>


$r = Get-AzureRmResource -ResourceId $v.ResourceId
$r.Properties | Add-Member -MemberType NoteProperty -Name enableSoftDelete -Value 'True'
Set-AzureRmResource -ResourceId $r.ResourceId -Properties $r.Properties

3. Confirm soft delete is configured for the key vault by running the Get-AzureRmKeyVault cmdlet. If soft
delete is configured properly for the key vault, then the Soft Delete Enabled? property returns a value of
True:

Get-AzureRmKeyVault -VaultName <vaultname> | fl

Add a key to each key vault either by creating or importing a key


There are two ways to add keys to an Azure Key Vault; you can create a key directly in Key Vault, or you can import
a key. Creating a key directly in Key Vault is the less complicated method, while importing a key provides total
control over how the key is generated.
To create a key directly in your key vault, run the Add-AzureKeyVaultKey cmdlet as follows:

Add-AzureKeyVaultKey -VaultName <vaultname> -Name <keyname> -Destination <HSM|Software> -KeyOps


wrapKey,unwrapKey

Where:
vaultname is the name of the key vault in which you want to create the key.
keyname is the name you want to give the new key.

TIP
Name keys using a similar naming convention as described above for key vaults. This way, in tools that show only
the key name, the string is self-describing.

If you intend to protect the key with an HSM, ensure that you specify HSM as the value of the Destination
parameter, otherwise, specify Software.
For example,

Add-AzureKeyVaultKey -VaultName Contoso-O365EX-NA-VaultA1 -Name Contoso-O365EX-NA-VaultA1-Key001 -Destination


Software -KeyOps wrapKey,unwrapKey

To import a key directly into your key vault, you need to have a Thales nShield Hardware Security Module.
Some organizations prefer this approach to establish the provenance of their keys, and the this method also
provides the following:
The toolset used for import includes attestation from Thales that the Key Exchange Key (KEK) that is used to
encrypt the key you generate is not exportable and is generated inside a genuine HSM that was
manufactured by Thales.
The toolset includes attestation from Thales that the Azure Key Vault security world was also generated on
a genuine HSM manufactured by Thales. This attestation proves to you that Microsoft is also using genuine
Thales hardware.
Check with your security group to determine if the above attestations are required. For detailed steps to create a
key on-premises and import it into your key vault, see How to generate and transfer HSM -protected keys for
Azure Key Vault. Use the Azure instructions to create a key in each key vault.
Check the recovery level of your keys
Office 365 requires that the Azure Key Vault subscription is set to Do Not Cancel and that the keys used by
Customer Key have soft delete enabled. You can confirm this by looking at the recovery level on your keys.
To check the recovery level of a key, in Azure PowerShell, run the Get-AzureKeyVaultKey cmdlet as follows:

(Get-AzureKeyVaultKey -VaultName <vaultname> -Name <keyname>).Attributes

If the Recovery Level property returns anything other than a value of Recoverable+ProtectedSubscription, you
will need to review this topic and ensure that you have followed all of the steps to put the subscription on the Do
Not Cancel list and that you have soft delete enabled on each of your key vaults.
Backup Azure Key Vault
Immediately following creation or any change to a key, perform a backup and store copies of the backup, both
online and offline. Offline copies should not be connected to any network, such as in a physical safe or commercial
storage facility. At least one copy of the backup should be stored in a location that will be accessible in the event of
a disaster. The backup blobs are the sole means of restoring key material should a Key Vault key be permanently
destroyed or otherwise rendered inoperable. Keys that are external to Azure Key Vault and were imported to
Azure Key Vault do not qualify as a backup because the metadata necessary for Customer Key to use the key does
not exist with the external key. Only a backup taken from Azure Key Vault can be used for restore operations with
Customer Key. Therefore, it is essential that a backup of Azure Key Vault be made once a key is uploaded or
created.
To create a backup of an Azure Key Vault key, run the Backup-AzureKeyVaultKey cmdlet as follows:

Backup-AzureKeyVaultKey -VaultName <vaultname> -Name <keyname>


-OutputFile <filename .backup>

Ensure that your output file uses the suffix .backup .


The output file resulting from this cmdlet is encrypted and cannot be used outside of Azure Key Vault. The backup
can be restored only to the Azure subscription from which the backup was taken.

TIP
For the output file, choose a combination of your vault name and key name. This will make the file name self-describing. It
will also ensure that backup file names do not collide.

For example:

Backup-AzureKeyVaultKey -VaultName Contoso-O365EX-NA-VaultA1 -Name Contoso-O365EX-NA-VaultA1-Key001 -


OutputFile Contoso-O365EX-NA-VaultA1-Key001-Backup-20170802.backup

Validate Azure Key Vault configuration settings


Performing validation before using keys in a DEP is optional, but highly recommended. In particular, if you use
steps to set up your keys and vaults other than the ones described in this topic, you should validate the health of
your Azure Key Vault resources before you configure Customer Key.
To verify that your keys have get, wrapKey, and unwrapKey operations enabled:
Run the Get-AzureRmKeyVault cmdlet as follows:

Get-AzureRMKeyVault -VaultName <vaultname>

In the output, look for the Access Policy and for the Exchange Online identity (GUID ) or the SharePoint Online
identity (GUID ) as appropriate. All three of the above permissions must be shown under Permissions to Keys.
If the access policy configuration is incorrect, run the Set-AzureRmKeyVaultAccessPolicy cmdlet as follows:

Set-AzureRmKeyVaultAccessPolicy -VaultName <vaultname> -PermissionsToKeys wrapKey,unwrapKey,get -


ServicePrincipalName <Office 365 appID>

For example, for Exchange Online and Skype for Business:

Set-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365EX-NA-VaultA1


-PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName 00000002-0000-0ff1-ce00-000000000000

For example, for SharePoint Online and OneDrive for Business:

Set-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365SP-NA-VaultA1


-PermissionsToKeys wrapKey,unwrapKey,get -ServicePrincipalName TBD

To verify that an expiration date is not set for your keys run the Get-AzureKeyVaultKey cmdlet as follows:

Get-AzureKeyVaultKey -VaultName <vaultname>

An expired key cannot be used by Customer Key and operations attempted with an expired key will fail, and
possibly result in a service outage. We strongly recommend that keys used with Customer Key do not have an
expiration date. An expiration date, once set, cannot be removed, but can be changed to a different date. If a key
must be used that has an expiration date set, change the expiration value to 12/31/9999. Keys with an expiration
date set to a date other than 12/31/9999 will not pass Office 365 validation.
To change an expiration date that has been set to any value other than 12/31/9999, run the Set-
AzureKeyVaultKeyAttribute cmdlet as follows:

Set-AzureKeyVaultKeyAttribute -VaultName <vaultname> -Name <keyname>


-Expires (Get-Date -Date "12/31/9999")

Cau t i on

Don't set expiration dates on encryption keys you use with Customer Key.
Obtain the URI for each Azure Key Vault key
Once you have completed all the steps in Azure to set up your key vaults and added your keys, run the following
command to get the URI for the key in each key vault. You will need to use these URIs when you create and assign
each DEP later, so save this information in a safe place. Remember to run this command once for each key vault.
In Azure PowerShell:
(Get-AzureKeyVaultKey -VaultName <vaultname>).Id

Office 365: Setting up Customer Key for Exchange Online and Skype
for Business
Before you begin, ensure that you have completed the tasks required to set up Azure Key Vault. See Complete
tasks in Azure Key Vault and Microsoft FastTrack for Customer Key for information.
To set up Customer Key for Exchange Online and Skype for Business, you will need to perform these steps by
remotely connecting to Exchange Online with Windows PowerShell.
Create a data encryption policy (DEP) for use with Exchange Online and Skype for Business
A DEP is associated with a set of keys stored in Azure Key Vault. You assign a DEP to a mailbox in Office 365.
Office 365 will then use the keys identified in the policy to encrypt the mailbox. To create the DEP, you need the
Key Vault URIs you obtained earlier. See Obtain the URI for each Azure Key Vault key for instructions.
Remember! When you create a DEP, you specify two keys that reside in two different Azure Key Vaults. Ensure
that these keys are located in two separate Azure regions to ensure geo-redundancy.
To create the DEP, follow these steps:
1. On your local computer, using a work or school account that has global administrator permissions in your
Office 365 organization, connect to Exchange Online PowerShell by opening Windows PowerShell and
running the following command.

$UserCredential = Get-Credential

2. In the Windows PowerShell Credential Request dialog box, enter your work or school account information,
click OK, and then enter the following command.

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri


https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -
AllowRedirection

3. Run the following command.

Import-PSSession $Session

4. To create a DEP, use the New -DataEncryptionPolicy cmdlet by typing the following command.

New-DataEncryptionPolicy -Name <PolicyName> -Description "PolicyDescription " -AzureKeyIDs


<KeyVaultURI1>, <KeyVaultURI2>

Where:
PolicyName is the name you want to use for the policy. Names cannot contain spaces. For example,
USA_mailboxes.
PolicyDescription is a user friendly description of the policy that will help you remember what the
policy is for. You can include spaces in the description. For example, Root key for mailboxes in USA
and its territories.
KeyVaultURI1 is the URI for the first key in the policy. For example,
https://contoso_EastUSvault01.vault.azure.net/keys/USA_key_01.
KeyVaultURI2 is the URI for the second key in the policy. For example,
https://contoso_EastUS2vault01.vault.azure.net/keys/USA_Key_02. Separate the two URIs by a
comma and a space.
Example:

New-DataEncryptionPolicy -Name USA_mailboxes -Description "Root key for mailboxes in USA and its
territories" -AzureKeyIDs https://contoso_EastUSvault01.vault.azure.net/keys/USA_key_01,
https://contoso_EastUS2vault01.vault.azure.net/keys/USA_Key_02

Assign a DEP to a mailbox


Assign the DEP to a mailbox by using the Set-Mailbox cmdlet. Once you assign the policy, Office 365 can encrypt
the mailbox with the key designated in the DEP.

Set-Mailbox -Identity <MailboxIdParameter> -DataEncryptionPolicy <PolicyName>

Where MailboxIdParameter specifies a mailbox. For more information about the Set-Mailbox cmdlet, see Set-
Mailbox.
Validate mailbox encryption
Encrypting a mailbox can take some time. For first time policy assignment, the mailbox must also complete the
move from one database to another before the service can encrypt the mailbox. We recommend that you wait 72
hours before you attempt to validate encryption after you change a DEP or the first time you assign a DEP to a
mailbox.
Use the Get-MailboxStatistics cmdlet to determine if a mailbox is encrypted.

Get-MailboxStatistics -Identity <GeneralMailboxOrMailUserIdParameter> | fl IsEncrypted

The IsEncrypted property returns a value of true if the mailbox is encrypted and a value of false if the mailbox is
not encrypted.
The time to complete mailbox moves depends on the number of mailboxes to which you assign a DEP for the first
time, as well as the size of the mailboxes. If the mailboxes have not been encrypted after a week from the time you
assigned the DEP, initiate a mailbox move for the unencrypted mailboxes by using the New -MoveRequest cmdlet.

New-MoveRequest <mailbox alias>

Office 365: Setting up Customer Key for SharePoint Online and


OneDrive for Business
Before you begin, ensure that you have completed the tasks required to set up Azure Key Vault. See Complete
tasks in Azure Key Vault and Microsoft FastTrack for Customer Key for information.
To set up Customer Key for SharePoint Online and OneDrive for Business, you will need to perform these steps by
remotely connecting to SharePoint Online with Windows PowerShell.
Create a data encryption policy (DEP) for each SharePoint Online and OneDrive for Business geo
A DEP is associated with a set of keys stored in Azure Key Vault. You apply a DEP to all of your data in one
geographic location, also called a geo. If you use the multi-geo feature of Office 365 (currently in Preview ), you
can create one DEP per geo. If you are not using multi-geo, you can create one DEP in Office 365 for use with
SharePoint Online and OneDrive for Business. Office 365 will then use the keys identified in the DEP to encrypt
your data in that geo. To create the DEP, you need the Key Vault URIs you obtained earlier. See Obtain the URI for
each Azure Key Vault key for instructions.
Remember! When you create a DEP, you specify two keys that reside in two different Azure Key Vaults. Ensure
that these keys are located in two separate Azure regions to ensure geo-redundancy.
To create a DEP, you need to remotely connect to SharePoint Online by using Windows PowerShell.
1. On your local computer, using a work or school account that has global administrator permissions in your
Office 365 organization, Connect to SharePoint Online Powershell.
2. In the Microsoft SharePoint Online Management Shell, run the Register-SPODataEncryptionPolicy cmdlet
as follows:

Register-SPODataEncryptionPolicy -Identity <SPOAdminSiteUrl> -PrimaryKeyVaultName <PrimaryKeyVaultName>


-PrimaryKeyName <PrimaryKeyName> -PrimaryKeyVersion <PrimaryKeyVersion> -SecondaryKeyVaultName
<SecondaryKeyVaultName> -SecondaryKeyName <SecondaryKeyName> -SecondaryKeyVersion <SecondaryKeyVersion>

When you register the DEP, encryption begins on the data in the geo. This can take some time.
Validate encryption of Group Sites, Team Sites, and OneDrive for Business
You can check on the status of encryption by running the Get-SPODataEncryptionPolicy cmdlet as follows:

Get-SPODataEncryptionPolicy -Identity <SPOAdminSiteUrl>

The output from this cmdlet includes:


The URI of the primary key.
The URI of the secondary key.
The encryption status for the geo. Possible states include:
Unregistered: Customer Key encryption has not yet been applied.
Registering: Customer Key encryption has been applied and your files are in the process of being
encrypted. If your geo is in this state, you'll also be shown information on what percentage of sites in
the geo are complete so that you can monitor encryption progress.
Registered: Customer Key encryption has been applied, and all files in all sites have been encrypted.
Rolling: A key roll is in progress. If your geo is in this state, you'll also be shown information on
what percentage of sites have completed the key roll operation so that you can monitor progress.

Managing Customer Key for Office 365


After you've set up Customer Key for Office 365, you can perform these additional management tasks.
Restore Azure Key Vault keys
Rolling or rotating a key in Azure Key Vault that you use with Customer Key
Manage key vault permissions
Determine the DEP assigned to a mailbox
Restore Azure Key Vault keys
Before performing a restore, use the recovery capabilities provided by soft delete. All keys that are used with
Customer Key are required to have soft delete enabled. Soft delete acts like a recycle bin and allows recovery for
up to 90 days without the need to restore. Restore should only be required in extreme or unusual circumstances,
for example if the key or key vault is lost. If you must restore a key for use with Customer Key, in Azure
PowerShell, run the Restore-AzureKeyVaultKey cmdlet as follows:

Restore-AzureKeyVaultKey -VaultName <vaultname> -InputFile <filename>

For example:

Restore-AzureKeyVaultKey -VaultName Contoso-O365EX-NA-VaultA1 -InputFile Contoso-O365EX-NA-VaultA1-Key001-


Backup-20170802.backup

If a key with the same name already exists in the key vault, the restore operation will fail. Restore-
AzureKeyVaultKey restores all key versions and all metadata for the key including the key name.
Rolling or rotating a key in Azure Key Vault that you use with Customer Key
Rolling keys is not required by either Azure Key Vault or by Customer Key. In addition, keys that are protected with
an HSM are virtually impossible to compromise. Even if a root key were in the possession of a malicious actor
there is no feasible means of using it to decrypt data, since only Office 365 code knows how to use it. However,
rolling a key is supported by Customer Key.
Cau t i on

Only roll an encryption key that you use with Customer Key when a clear technical reason exists or a compliance
requirement dictates that you have to roll the key. In addition, do not delete any keys that are or were associated
with policies. When you roll your keys, there will be content encrypted with the previous keys. For example, while
active mailboxes will be re-encrypted frequently, inactive, disconnected, and disabled mailboxes may still be
encrypted with the previous keys. SharePoint Online performs backup of content for restore and recovery
purposes, so there may still be archived content using older keys.
To ensure the safety of your data, SharePoint Online will allow no more than one Key Roll operation to be in
progress at a time. If you want to roll both of the keys in a key vault, you'll need to wait for the first key roll
operation to fully complete. Our recommendation is to stagger your key roll operations at different intervals, so
that this is not an issue.
When you roll a key, you are requesting a new version of an existing key. In order to request a new version of an
existing key, you use the same cmdlet, Add-AzureKeyVaultKey, with the same syntax that you used to create the
key in the first place.
For example:

Add-AzureKeyVaultKey -VaultName Contoso-O365EX-NA-VaultA1 -Name Contoso-O365EX-NA-VaultA1-Key001 -Destination


HSM -KeyOps @('wrapKey','unwrapKey') -NotBefore (Get-Date -Date "12/27/2016 12:01 AM")

In this example, since a key named Contoso-O365EX-NA -VaultA1-Key001 already exists in the Contoso-
O365EX-NA -VaultA1 vault, a new key version will be created. The operation adds a new key version. This
operation preserves the previous key versions in the key's version history, so that data previously encrypted with
that key can still be decrypted. Once you have completed rolling any key that is associated with a DEP, you must
then run an additional cmdlet to ensure Customer Key begins using the new key.
Enable Exchange Online and Skype for Business to use a new key after you roll or rotate keys in Azure Key Vault
When you roll either of the Azure Key Vault keys associated with a DEP used with Exchange Online and Skype for
Business, you must run the following command to update the DEP and enable Office 365 to start using the new
key.
To instruct Customer Key to use the new key to encrypt mailboxes in Office 365 run the Set-DataEncryptionPolicy
cmdlet as follows:

Set-DataEncryptionPolicy <policyname> -Refresh

Within 48 hours, the active mailboxes encrypted using this policy will become associated with the updated key.
Use the steps in Determine the DEP assigned to a mailbox to check the value for the DataEncryptionPolicyID
property for the mailbox. The value for this property will change once the updated key has been applied.
Enable SharePoint Online and OneDrive for Business to use a new key after you roll or rotate keys in Azure Key Vault
When you roll either of the Azure Key Vault keys associated with a DEP used with SharePoint Online and
OneDrive for Business, you must run the Update-SPODataEncryptionPolicy cmdlet to update the DEP and enable
Office 365 to start using the new key.

Update-SPODataEncryptionPolicy -Identity <SPOAdminSiteUrl> -KeyVaultName <ReplacementKeyVaultName> -KeyName


<ReplacementKeyName> -KeyVersion <ReplacementKeyVersion> -KeyType <Primary | Secondary>

This will start the key roll operation for SharePoint Online and OneDrive for Business. This action is not
immediate. To see the progress of the key roll operation, run the Get-SPODataEncryptionPolicy cmdlet as follows:

Get-SPODataEncryptionPolicy -Identity <SPOAdminSiteUrl>

Manage key vault permissions


Several cmdlets are available that enable you to view and, if necessary, remove key vault permissions. You might
need to remove permissions, for example, when an employee leaves the team.
To view key vault permissions, run the Get-AzureRmKeyVault cmdlet:

Get-AzureRmKeyVault -VaultName <vaultname>

For example:

Get-AzureRmKeyVault -VaultName Contoso-O365EX-NA-VaultA1

To remove an administrator's permissions, run the Remove-AzureRmKeyVaultAccessPolicy cmdlet:

Remove-AzureRmKeyVaultAccessPolicy -VaultName <vaultname>


-UserPrincipalName <UPN of user>

For example:

Remove-AzureRmKeyVaultAccessPolicy -VaultName Contoso-O365EX-NA-VaultA1


-UserPrincipalName alice@contoso.com

Determine the DEP assigned to a mailbox


To determine the DEP assigned to a mailbox, use the Get-MailboxStatistics cmdlet. The cmdlet returns a unique
identifier (GUID ).

Get-MailboxStatistics -Identity <GeneralMailboxOrMailUserIdParameter> | fl DataEncryptionPolicyID


Where GeneralMailboxOrMailUserIdParameter specifies a mailbox. For more information about the Get-
MailboxStatistics cmdlet, see Get-MailboxStatistics.
Use the GUID to find out the friendly name of the DEP to which the mailbox is assigned by running the following
cmdlet.

Get-DataEncryptionPolicy <GUID>

Where GUID is the GUID returned by the Get-MailboxStatistics cmdlet in the previous step.
Technical reference details about encryption in Office
365
11/6/2018 • 4 minutes to read • Edit Online

Refer to this article to learn about certificates, technologies, and TLS cipher suites used for encryption in Office
365. This article also provides details about planned deprecations.
If you're looking for overview information, see Encryption in Office 365.
If you're looking for setup information, see Set up encryption in Office 365 Enterprise.

Microsoft Office 365 certificate ownership and management


You do not need to purchase or maintain certificates for Office 365 because Microsoft uses its own certificates.

Current encryption standards and planned deprecations


In order to continue to provide best-in-class encryption for Office 365, Microsoft regularly reviews supported
encryption standards. Sometimes, we need to deprecate old standards as they become out of date and therefore
less secure. This topic describes currently supported cipher suites and other standards as well as details about
planned deprecations.

Versions of TLS supported by Office 365


Transport Layer Security (TLS ), and SSL that came before TLS, are cryptographic protocols that secure
communication over a network by using security certificates to encrypt a connection between computers. Office
365 supports several versions of TLS, including:
TLS version 1.2 (TLS 1.2)
TLS version 1.1 (TLS 1.1)
TLS version 1.0 (TLS 1.0)
TLS 1.0 and TLS 1.1 support will be deprecated October 31, 2018. See Deprecating support for TLS 1.0 and 1.1
and what this means for you for more information.

Deprecating support for TLS 1.0 and 1.1 and what this means for you
As of October 31, 2018, Office 365 will no longer support TLS 1.0 and 1.1. This means that Microsoft will not fix
new issues that are found in clients, devices, or services that connect to Office 365 by using TLS 1.0 and 1.1.
Note This doesn't mean Office 365 will block TLS 1.0 and 1.1 connections. There is no official date for disabling or
removing TLS 1.0 and 1.1 in the TLS service for customer connections. The eventual deprecation date will be
determined by customer telemetry and is not yet known. After a decision is made, there will be an announcement
six months in advance unless we become aware of a known compromise, in which case we may have to act in less
than six months to protect customers who use the services.
You should make sure that all client-server and browser-server combinations use TLS 1.2 (or a later version) to
maintain connection to Office 365 services. You may have to update certain client-server and browser-server
combinations. For information about how this impacts you, see Preparing for the mandatory use of TLS 1.2 in
Office 365.
Deprecating support for 3DES
As of October 31, 2018, Office 365 will no longer support the use of 3DES cipher suites for communication to
Office 365. More specifically, Office 365 will no longer support the TLS_RSA_WITH_3DES_EDE_CBC_SHA
cipher suite. Clients and servers communicating with O365 after this date must support at least one of the more
secure ciphers listed in this topic (see TLS cipher suites supported by Office 365 ).

Deprecating SHA-1 certificate support in Office 365


As of June 2016, Office 365 no longer accepts a SHA-1 certificate for outbound or inbound connections. If you
are currently using a certificate with SHA-1 in the certificate chain, you will need to update the chain to use SHA-
2 (Secure Hash Algorithm 2) or a stronger hashing algorithm.

Deprecating RC4 support in Office 365


In July 2015, support for the following RC4 cipher suites was discontinued:
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5

Deprecating Secure Sockets Layer (SSL) 3.0 support in Office 365


Starting December 1, 2014, Office 365 began disabling support for Secure Sockets Layer (SSL ) 3.0, the
predecessor to TLS. For more information, see Security advisory 3009008. For instructions on how to ensure
clients are using TLS 1.0 or higher and to disable SSL 3.0, see Protecting SSL 3.0 vulnerability.

TLS cipher suites supported by Office 365


A cipher suite is a collection of encryption algorithms that TLS uses to establish secure connections. Cipher suites
supported by Office 365 are listed in the following table in order of strength with the strongest cipher suite listed
first. When Office 365 receives a connection request, Office 365 first attempts to connect using the topmost
cipher suite then, if unsuccessful, tries the second cipher suite in the list and so on down the list. When Office 365
sends a connection request to another server or to a client, it's up to the receiving server or client to choose the
cipher suite or whether TLS will be used at all.

KEY EXCHANGE PERFECT AUTHENTICATION


CIPHER SUITE ALGORITHM/STRE FORWARD ALGORITHM/STRE
PROTOCOLS NAME NGTH SECRECY SUPPORT NGTH CIPHER/STRENGTH

TLS 1.2 TLS_ECDHE_RSA_ ECDH/192 Yes RSA/112 AES/256


WITH_AES_256_
CBC_SHA384_P3
84

TLS 1.2 TLS_ECDHE_RSA_ ECDH/128 Yes RSA/112 AES/128


WITH_AES_128_
CBC_SHA256_P2
56

TLS 1.0, 1.1, 1.2 TLS_ECDHE_RSA_ ECDH/192 Yes RSA/112 AES/256


WITH_AES_256_
CBC_SHA_P384
KEY EXCHANGE PERFECT AUTHENTICATION
CIPHER SUITE ALGORITHM/STRE FORWARD ALGORITHM/STRE
PROTOCOLS NAME NGTH SECRECY SUPPORT NGTH CIPHER/STRENGTH

TLS 1.0, 1.1, 1.2 TLS_ECDHE_RSA_ ECDH/128 Yes RSA/112 AES/128


WITH_AES_128_
CBC_SHA_P256

TLS 1.2 TLS_RSA_WITH_A RSA/112 No RSA/112 AES/256


ES_256_CBC_SH
A256

TLS 1.2 TLS_RSA_WITH_A RSA/112 No RSA/112 AES/128


ES_128_CBC_SH
A256

TLS 1.0, 1.1, 1.2 TLS_RSA_WITH_A RSA/112 No RSA/112 AES/256


ES_256_CBC_SH
A

TLS 1.0, 1.1, 1.2 TLS_RSA_WITH_A RSA/112 No RSA/112 AES/128


ES_128_CBC_SH
A

TLS 1.0, 1.1, 1.2 TLS_RSA_WITH_3 RSA/112 No RSA/112 3DES/192


DES_EDE_CBC_S
HA

Related topics
Encryption in Office 365
Set up encryption in Office 365 Enterprise
Schannel implementation of TLS 1.0 in Windows security status update: November 24, 2015
TLS/SSL Cryptographic Enhancements (Windows IT Center)
How Exchange Online uses TLS to secure email
connections in Office 365
8/30/2018 • 6 minutes to read • Edit Online

Learn how Exchange Online and Office 365 use Transport Layer Security (TLS ) and Forward Secrecy (FS ) to
secure email communications. Also provides information about the certificate issued by Microsoft for Exchange
Online.

TLS basics for Office 365 and Exchange Online


Transport Layer Security (TLS ), and SSL that came before TLS, are cryptographic protocols that secure
communication over a network by using security certificates to encrypt a connection between computers. TLS
supersedes Secure Sockets Layer (SSL ) and is often referred to as SSL 3.1. For Exchange Online, we use TLS to
encrypt the connections between our Exchange servers and the connections between our Exchange servers and
other servers such as your on-premises Exchange servers or your recipients' mail servers. Once the connection is
encrypted, all data sent through that connection is sent through the encrypted channel. However, if you forward a
message that was sent through a TLS -encrypted connection, that message isn't necessarily encrypted. This is
because, in simple terms, TLS doesn't encrypt the message, just the connection.
If you want to encrypt the message you need to use an encryption technology that encrypts the message contents,
for example, something like Office Message Encryption. See Email encryption in Office 365 and Office 365
Message Encryption (OME ) for information on message encryption options in Office 365.
We recommend using TLS in situations where you want to set up a secure channel of correspondence between
Office 365 and your on-premises organization or another organization, such as a partner. Exchange Online always
attempts to use TLS first to secure your email but cannot always do this if the other party does not offer TLS
security. Keep reading to find out how you can secure all mail to your on-premises servers or important partners
by using connectors.

How Exchange Online uses TLS between Exchange Online customers


Exchange Online servers always encrypt connections to other Exchange Online servers in our datacenters with
TLS 1.2. When you send mail to a recipient that is within your Office 365 organization, that email is automatically
sent over a connection that is encrypted using TLS. Also, all email that you send to other Office 365 customers is
sent over connections that are encrypted using TLS and are secured using Forward Secrecy.

How Office 365 uses TLS between Office 365 and external, trusted
partners
By default, Exchange Online always uses opportunistic TLS. This means Exchange Online always tries to encrypt
connections with the most secure version of TLS first, then works its way down the list of TLS ciphers until it finds
one on which both parties can agree. Unless you have configured Exchange Online to ensure that messages to
that recipient are only sent through secure connections, then by default the message will be sent unencrypted if
the recipient organization doesn't support TLS encryption. Opportunistic TLS is sufficient for most businesses.
However, for business that have compliance requirements such as medical, banking, or government organizations,
you can configure Exchange Online to require, or force, TLS. For instructions, see Configure mail flow using
connectors in Office 365.
If you decide to configure TLS between your organization and a trusted partner organization, Exchange Online can
use forced TLS to create trusted channels of communication. Forced TLS requires your partner organization to
authenticate to Exchange Online with a security certificate in order to send mail to you. Your partner will need to
manage their own certificates in order to do this. In Exchange Online, we use connectors to protect messages that
you send from unauthorized access before they arrive at the recipient's email provider. For information on using
connectors to configure mail flow, see Configure mail flow using connectors in Office 365.

TLS and hybrid Exchange Server deployments


If you are managing a hybrid Exchange deployment, your on-premises Exchange server needs to authenticate to
Office 365 using a security certificate in order to send mail to recipients whose mailboxes are only in Office 365.
As a result, you need to manage your own security certificates for your on-premises Exchange servers. You must
also securely store and maintain these server certificates. For more information about managing certificates in
hybrid deployments, see Certificate requirements for hybrid deployments.

How to set up forced TLS for Exchange Online in Office 365


For Exchange Online customers, in order for forced TLS to work to secure all of your sent and received email, you
need to set up more than one connector that requires TLS. You'll need one connector for email sent to your user
mailboxes and another connector for email sent from your user mailboxes. Create these connectors in the
Exchange admin center in Office 365. For instructions, see Configure mail flow using connectors in Office 365.

TLS certificate information for Exchange Online


The certificate information used by Exchange Online is described in the following table. If your business partner is
setting up forced TLS on their email server, you will need to provide this information to them. Be aware that for
security reasons, our certificates do change from time to time. We have rolled out an update to our certificate
within our datacenters. The new certificate is valid from September 3, 2018.
Current certificate information valid from September 3, 2018

ATTRIBUTE VALUE

Certificate authority root issuer GlobalSign Root CA – R1

Certificate name mail.protection.outlook.com

Organization Microsoft Corporation

Organization unit

Certificate key strength 2048

Deprecated certificate information valid until September 3, 2018


To help ensure a smooth transition, we will continue to provide the old certificate information for your reference
for some time, however, you should use the current certificate information from now on.

ATTRIBUTE VALUE

Certificate authority root issuer Baltimore CyberTrust Root

Certificate name mail.protection.outlook.com


ATTRIBUTE VALUE

Organization Microsoft Corporation

Organization unit Microsoft Corporation

Certificate key strength 2048

Prepare for the new Exchange Online certificate


The new certificate is issued by a different certificate authority (CA) from the previous certificate used by Exchange
Online. As a result, you may need to perform some actions in order to use the new certificate.
The new certificate requires connecting to the endpoints of the new CA as part of validating the certificate. Failure
to do so can result in mail flow being negatively affected. If you protect your mail servers with firewalls that only
let the mail servers connect with certain destinations you need to check if your server is able to validate the new
certificate. To confirm that your server can use the new certificate, complete these steps:
1. Connect to your local Exchange Server using Windows PowerShell and then run the following command:
certutil -URL http://crl.globalsign.com/gsorganizationvalsha2g3.crl
2. On the window that appears, choose Retrieve.
3. When the utility completes its check it returns a status. If the status displays OK, then your mail server can
successfully validate the new certificate. If not, you need to determine what is causing the connections to fail.
Most likely, you need to update the settings of a firewall. The full list of endpoints that need to be accessed
include:
ocsp.globalsign.com
crl.globalsign.com
secure.globalsign.com
Normally, you receive updates to your root certificates automatically through Windows Update. However some
deployments have additional security in place that prevents these updates from occurring automatically. In these
locked-down deployments where Windows Update can't automatically update root certificates, you need to ensure
that the correct root CA certificate is installed by completing these steps:
1. Connect to your local Exchange Server using Windows PowerShell and then run the following command:
certmgr.msc
2. Under Trusted Root Certification Authority/Certificates, confirm that the new certificate is listed.

Get more information about TLS and Office 365


For a list of supported cipher suites, see Technical reference details about encryption in Office 365.
Set up connectors for secure mail flow with a partner organization
Connectors with enhanced email security
Encryption in Office 365
Office 365 Message Encryption FAQ
10/11/2018 • 7 minutes to read • Edit Online

Have a question about how the new message protection capabilities in Office 365 work? Check for an answer
here. Also, take a look at Frequently asked questions about data protection in Azure Information Protection for
answers to questions about the data protection service, Azure Rights Management, in Azure Information
Protection.

What is Office 365 Message Encryption (OME)?


OME combines email encryption and rights management capabilities. Rights management capabilities are
powered by Azure Information Protection.

Who can use OME?


You can use the new capabilities for OME under the following conditions:
If you have never set up OME or IRM for Exchange Online in Office 365.
If you have set up OME and IRM, you can use these steps if you are using the Azure Rights Management
service from Azure Information Protection.
If you are using Exchange Online with Active Directory Rights Management service (AD RMS ), you can't
enable these new capabilities right away. Instead, you need to migrate AD RMS to Azure Information
Protection first. When you've finished the migration, you can successfully set up OME.
If you choose to continue to use on-premises AD RMS with Exchange Online instead of migrating to Azure
Information Protection, you will not be able to use these new capabilities.

What subscriptions do I need to use the new OME capabilities?


To use the new OME capabilities, you need one of the following plans:
Office 365 Message Encryption is offered as part of Office 365 E3 and E5, Microsoft E3 and E5, Office 365
A1, A3, and A5, and Office 365 G3 and G5. Customers do not need additional licenses to receive the new
protection capabilities powered by Azure Information Protection.
You can also add Azure Information Protection Plan 1 to the following plans to receive the new Office 365
Message Encryption capabilities: Exchange Online Plan 1, Exchange Online Plan 2, Office 365 F1, Office
365 Business Essentials, Office 365 Business Premium, or Office 365 Enterprise E1.
Each user benefiting from Office 365 Message Encryption needs to be licensed to be covered by the
feature.
For the full list see the Exchange Online service descriptions for Office 365 Message Encryption.

Can I use Exchange Online with bring your own key (BYOK) in Azure
Information Protection?
Yes! Microsoft recommends that you complete the steps to set up BYOK before you set up OME.
For more information about BYOK, see Planning and implementing your Azure Information Protection tenant key.
Do OME and BYOK with Azure Information Protection change
Microsoft's approach to third-party data requests such as subpoenas?
No. OME and the option to provide and control your own encryption keys, called BYOK, from Azure Information
Protection were not designed to respond to law enforcement subpoenas. OME, with BYOK for Azure Information
Protection, was designed for compliance-focused customers. Microsoft takes third-party requests for customer
data very seriously. As a cloud service provider, we always advocate for the privacy of customer data. In the event
we get a subpoena, we always attempt to redirect the third party to the customer to obtain the information.
(Please read Brad Smith's blog: Protecting customer data from government snooping). We periodically publish
detailed information of the request we receive. For more information regarding third-party data requests, see
Responding to government and law enforcement requests to access customer data on the Microsoft Trust Center.
Also, see "Disclosure of Customer Data" in the Online Services Terms (OST).

How is this feature related to legacy Office 365 Message Encryption


(OME) and Information Rights Management (IRM) features?
The new capabilities for Office 365 Message Encryption are an evolution of the existing IRM and legacy OME
solutions. The following table provides more details.
Comparison of legacy OME, IRM, and new OME capabilities

CAPABILITY PREVIOUS VERSIONS OF OME IRM NEW OME CAPABILITIES

Sending an encrypted Only through Exchange mail End-user initiated from End-user initiated from
email flow rules Outlook for PC, Outlook for Outlook for PC, Outlook for
Mac, or Outlook on the web; Mac, or Outlook on the web;
or through Exchange mail or through mail flow rules
flow rules

Rights management - Do Not Forward option and Do Not Forward option,


custom templates encrypt-only option, default
and custom templates

Supported recipient type External recipients only Internal recipients only Internal and external
recipients

Experience for recipient External recipients received Internal recipients only Internal and external
an HTML message that they received encrypted email in recipients receive email in
downloaded and opened in Outlook for PC, Outlook for Outlook for PC, Outlook for
a browser or downloaded Mac, and Outlook on the Mac, Outlook on the web,
mobile app. web. Outlook for Android, and
Outlook for iOS, or through
a web portal, regardless of
whether or not they are in
the same Office 365
organization or in any Office
365 organization. The OME
portal requires no separate
download.

Bring Your Own Key Not available Not available BYOK supported
support

How do I enable the new OME capabilities for my organization?


See Set up new Office 365 Message Encryption capabilities.
Will the previous version of OME be deprecated?
You can still use the previous version of OME, it will not be deprecated at this time. However, we highly encourage
organizations to use the new and improved OME solution. Customers that have not already deployed OME
cannot set up a new deployment of the previous version of OME.

My organization uses Active Directory Rights Management, can I use


this functionality?
No. If you are using Exchange Online with Active Directory Rights Management service (AD RMS ), you can't
enable these new capabilities right away. Instead, you need to migrate AD RMS to Azure Information Protection
first.

My organization has an Exchange Hybrid deployment. Can I use this


feature?
On-premises users can send encrypted mail using Exchange Online mail flow rules. In order to do this, you need
to route email through Exchange Online. For more information, see Part 2: Configure mail to flow from your email
server to Office 365.

What email client do I need to use in order to create an OME


encrypted message? What applications are supported for sending
protected messages?
You can create protected messages from Outlook 2016, and Outlook 2013 for PC and Mac, and from Outlook on
the web.

What email clients are supported to read and reply to protected


emails?
You can read and respond from Outlook for PC and Mac (2013 and 2016), Outlook on the web, and Outlook
mobile (Android and iOS ) if you are an Office 365 user. You can also use the iOS native mail client if your
organization allows it. If you are a non-Office 365 user, you can read and reply to encrypted messages on the web
through your web browser.

What file types are supported as attachments in protected emails? Do


attachments inherit the protection policies associated with protected
emails?
You can attach any file type to a protected mail, however protection policies are applied only on the file formats
mentioned here.
If a file format is supported, such as a Word, Excel, or PowerPoint file, the file is always protected, even after the
attachment has been downloaded by the recipient. For example, if an attachment is protected by Do Not Forward,
and the original recipient downloads and forwards the attachment to a new recipient, the new recipient will not be
able to open the protected file.

Are PDF file attachments supported?


If you attach a PDF file to a protected message, the message itself will be protected, but no additional protection
will be applied to the PDF file after the recipient has received it. This means that the recipient can Save As,
Forward, Copy, and Print the PDF file.

Are OneDrive for Business attachments supported?


Not yet. OneDrive for Business attachments are not supported and end-users can't encrypt a mail that contains a
cloud OneDrive for Business attachment.

Can I automatically encrypt messages by setting up policies?


Yes. Use mail flow rules in Exchange Online to automatically encrypt a message based on certain conditions. For
example, you can create policies that are based on recipient ID, recipient domain, or on the content in the body or
subject of the message. See Define mail flow rules to encrypt email messages in Office 365.

Can I automatically encrypt messages by setting up policies in Data


Loss Prevention (DLP) through the Security & Compliance Center?
Yes! You can set up mail flow rules in Exchange Online or by using DLP in the Security & Compliance Center.

Can I open encrypted messages sent to a Shared Mailbox?


Currently encrypted messages are not supported for a Shared Mailbox.

Can I customize encrypted messages with my company branding?


Yes! For information on customizing email messages and the OME portal, see Add your organization's brand to
your encrypted messages. See Add your organization's brand to your encrypted messages.

Are there any reporting capabilities or insights for encrypted emails?


Not at this time but coming soon.

Can I use message encryption with compliance features such as


eDiscovery?
Yes. All encrypted email messages are discoverable by Office 365 compliance features.
Legacy information for Office 365 Message
Encryption
8/21/2018 • 12 minutes to read • Edit Online

If you haven't yet moved your Office 365 organization to the new OME capabilities, but you have already deployed
OME, then the information in this article applies to your organization. Microsoft recommends that you make a
plan to move to the new OME capabilities as soon as it is reasonable for your organization. For instructions, see
Set up new Office 365 Message Encryption capabilities built on top of Azure Information Protection. If you want to
find out more about how the new capabilities work first, see Office 365 Message Encryption. The rest of this article
refers to OME behavior before the release of the new OME capabilities.
With Office 365 Message Encryption, your organization can send and receive encrypted email messages between
people inside and outside your organization. Office 365 Message Encryption works with Outlook.com, Yahoo,
Gmail, and other email services. Email message encryption helps ensure that only intended recipients can view
message content.
Here are some examples:
A bank employee sends credit card statements to customers
An insurance company representative provides policy details to customers
A mortgage broker requests financial information from a customer for a loan application
A health care provider sends health care information to patients
An attorney sends confidential information to a customer or another attorney

How Office 365 Message Encryption works without the new capabilities
Office 365 Message Encryption is an online service that's built on Microsoft Azure Rights Management (Azure
RMS ). With Azure RMS, administrators can define mail flow rules to determine the conditions for encryption. For
example, a rule can require the encryption of all messages addressed to a specific recipient.
Watch this short video to see how Office 365 Message Encryption works without the new capabilities.

When someone sends an email message in Exchange Online that matches an encryption rule, the message is sent
with an HTML attachment. The recipient opens the HTML attachment and follows instructions to view the
encrypted message on the Office 365 Message Encryption portal. The recipient can choose to view the message by
signing in with a Microsoft account or a work or school associated with Office 365, or by using a one-time pass
code. Both options help ensure that only the intended recipient can view the encrypted message. This process is
very different for the new OME capabilities.
The following diagram summarizes the passage of an email message through the encryption and decryption
process.
For more information, see Service information for legacy Office 365 Message Encryption prior to the release of the
new OME capabilities.

Defining mail flow rules for Office 365 Message Encryption that don't
use the new OME capabilities
To enable Office 365 Message Encryption without the new capabilities, Exchange Online and Exchange Online
Protection administrators define Exchange mail flow rules. These rules determine under what conditions email
messages should be encrypted, as well as conditions for removing message encryption. When an encryption
action is set for a rule, any messages that match the rule conditions are encrypted before they're sent.
Mail flow rules are flexible, letting you combine conditions so you can meet specific security requirements in a
single rule. For example, you can create a rule to encrypt all messages that contain specified keywords and are
addressed to external recipients. Office 365 Message Encryption also encrypts replies from recipients of encrypted
email, and you can create a rule that decrypts those replies as a convenience for your email users. That way, users
in your organization won't have to sign in to the encryption portal to view replies.
For more information about how to create Exchange mail flow rules, see Define Rules for Office 365 Message
Encryption.

Sending, viewing, and replying to encrypted email messages


With Office 365 Message Encryption, email messages are encrypted automatically, based on administrator-defined
rules. An email that bears an encrypted message arrives in the recipient's Inbox with an attached HTML file.
Recipients follow instructions in the message to open the attachment and authenticate by using a Microsoft
account or a work or school associated with Office 365. If recipients don't have either account, they're directed to
create a Microsoft account that will let them sign in to view the encrypted message. Alternatively, recipients can
choose to get a one-time pass code to view the message. After signing in or using a one-time pass code, recipients
can view the decrypted message and send an encrypted reply.

Customize encrypted messages with Office 365 Message Encryption


As an Exchange Online and Exchange Online Protection administrator, you can customize your encrypted
messages. For example, you can add your company's brand and logo, specify an introduction, and add disclaimer
text in encrypted messages and in the portal where recipients view your encrypted messages. Using Windows
PowerShell cmdlets, you can customize the following aspects of the viewing experience for recipients of encrypted
email messages:
Introductory text of the email that contains the encrypted message
Disclaimer text of the email that contains the encrypted message
Portal text that will appear in the message viewing portal
Logo that will appear in the email message and viewing portal
You can also revert back to the default look and feel at any time.
The following example shows a custom logo for ContosoPharma in the email attachment:
To customize encryption email messages and the encryption portal with your organization's brand
1. Connect to Exchange Online using Remote PowerShell, as described in Connect to Exchange Online Using
Remote PowerShell.
2. Use the Set-OMEConfiguration cmdlet as described here: Set-OMEConfiguration or use the following table
for guidance.
Encryption customization options

TO CUSTOMIZE THIS FEATURE OF THE ENCRYPTION EXPERIENCE USE THESE WINDOWS POWERSHELL COMMANDS

Default text that accompanies encrypted email messages Set-OMEConfiguration -Identity


The default text appears above the instructions for viewing <OMEConfigurationIdParameter> -EmailText "<string of
up to 1024 characters>"
encrypted messages
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
EmailText "Encrypted message from ContosoPharma
secure messaging system"

Disclaimer statement in the email that contains the encrypted Set-OMEConfiguration -Identity
message <OMEConfigurationIdParameter> DisclaimerText "<your
disclaimer statement, string of up to 1024
characters>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
DisclaimerText "This message is confidential for the
use of the addressee only"

Text that appears at the top of the encrypted mail viewing Set-OMEConfiguration -Identity
portal <OMEConfigurationIdParameter> -PortalText "<text for
your portal, string of up to 128 characters>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
PortalText "ContosoPharma secure email portal"

Logo Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -Image <Byte[]>
Example:
Set-OMEConfiguration -Identity "OME configuration" -
Image (Get-Content "C:\Temp\contosologo.png" -
Encoding byte)
Supported file formats: .png, .jpg, .bmp, or .tiff
Optimal size of logo file: less than 40 KB
Optimal size of logo image: 170x70 pixels

To remove brand customizations from encryption email messages and the encryption portal
1. Connect to Exchange Online using Remote PowerShell, as described in Connect to Exchange Online Using
Remote PowerShell.
2. Use the Set-OMEConfiguration cmdlet as described here: Set-OMEConfiguration. To remove your
organization's branded customizations from the DisclaimerText, EmailText, and PortalText values, set the
value to an empty string, "" . For all image values, such as Logo, set the value to "$null" .
Encryption customization options

TO REVERT THIS FEATURE OF THE ENCRYPTION EXPERIENCE BACK


TO THE DEFAULT TEX T AND IMAGE USE THESE WINDOWS POWERSHELL COMMANDS
TO REVERT THIS FEATURE OF THE ENCRYPTION EXPERIENCE BACK
TO THE DEFAULT TEX T AND IMAGE USE THESE WINDOWS POWERSHELL COMMANDS

Default text that accompanies encrypted email messages Set-OMEConfiguration -Identity


The default text appears above the instructions for viewing <OMEConfigurationIdParameter> -EmailText "<empty
string>"
encrypted messages
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
EmailText ""

Disclaimer statement in the email that contains the encrypted Set-OMEConfiguration -Identity
message <OMEConfigurationIdParameter> DisclaimerText "<empty
string>"
Example:
Set-OMEConfiguration -Identity "OME Configuration" -
DisclaimerText ""

Text that appears at the top of the encrypted mail viewing Set-OMEConfiguration -Identity
portal <OMEConfigurationIdParameter> -PortalText "<empty
string>"
Example reverting back to default:
Set-OMEConfiguration -Identity "OME Configuration" -
PortalText ""

Logo Set-OMEConfiguration -Identity


<OMEConfigurationIdParameter> -Image <"$null">
Example reverting back to default:
Set-OMEConfiguration -Identity "OME configuration" -
Image $null

Service information for legacy Office 365 Message Encryption prior to


the release of the new OME capabilities
The following table provides technical details for the Office 365 Message Encryption service prior to the release of
the new OME capabilities.

SERVICE DETAILS DESCRIPTION

Client device requirements Encrypted messages can be viewed on any client device, as
long as the HTML attachment can be opened in a modern
browser that supports Form Post.

Encryption algorithm and Federal Information Processing Office 365 Message Encryption uses the same encryption keys
Standards (FIPS) compliance as Windows Azure Information Rights Management (IRM) and
supports Cryptographic Mode 2 (2K key for RSA and 256 bits
key for SHA-1 systems). For more information about the
underlying IRM cryptographic modes, see AD RMS
Cryptographic Modes.

Supported message types Office 365 Message Encryption is only supported for items
that have a message class ID of IPM.Note. For more
information, see Item types and message classes.

Message size limits Office 365 Message Encryption can encrypt messages of up to
25 megabytes. For more details about message size limits, see
Exchange Online Limits.

Exchange Online email retention policies Exchange Online doesn't store the encrypted messages.
SERVICE DETAILS DESCRIPTION

Language support for Office 365 Message Encryption Office 365 Message encryption supports Office 365
languages, as follows:
Incoming email messages and attached HTML files are
localized based on the sender's language settings.
The viewing portal is localized based on the recipient's browser
settings.
The body (content) of the encrypted message isn't localized.

Privacy information for OME Portal and OME Viewer App The Office 365 Messaging Encryption Portal privacy statement
provides detailed information about what Microsoft does and
doesn't do with your private information.

Frequently Asked Questions about legacy OME


Got questions about Office 365 Message Encryption? Here are some answers. If you can't find what you need,
check the Office 365 community forums at Office 365 community.
Q. My users send encrypted email messages to recipients outside our organization. Is there anything
that external recipients have to do in order to read and reply to email messages that are encrypted with
Office 365 Message Encryption?
Recipients outside your organization who receive Office 365 encrypted messages can view them in one of two
ways:
By signing in with a Microsoft account or a work or school account associated with Office 365.
By using a one-time pass code.
Q. Are Office 365 encrypted messages stored in the cloud or on Microsoft servers?
No, the encrypted messages are kept on the recipient's email system, and when the recipient opens the message, it
is temporarily posted for viewing on Office 365 servers. The messages are not stored there.
Q. Can I customize encrypted email messages with my brand?
Yes. You can use Windows PowerShell cmdlets to customize the default text that appears at the top of encrypted
email messages, the disclaimer text, and the logo that you want to use for the email message and the encryption
portal. For details, see Add branding to encrypted messages.
Q. Does the service require a license for every user in my organization?
A license is required for every user in the organization who sends encrypted email.
Q. Do external recipients require subscriptions?
No, external recipients do not require a subscription to read or reply to encrypted messages.
Q. How is Office 365 Message Encryption different from Rights Management Services (RMS )?
RMS provides Information Rights Protection capabilities for an organization's internal emails by providing built-in
templates, such as: Do not forward and Company Confidential. Office 365 Message Encryption supports email
message encryption for messages that are sent to external recipients as well as internal recipients.
Q. How is Office 365 Message Encryption different from S/MIME?
S/MIME is essentially a client-side encryption technology, and requires complicated certificate management and
publishing infrastructure. Office 365 Message Encryption uses transport rules and does not depend on certificate
publishing.
Q. Can I read the encrypted messages over mobile devices?
Yes, you can view messages on Android and iOS by downloading the OME Viewer apps from the Google Play
store and the Apple App store. Open the HTML attachment in the OME Viewer app and then follow the
instructions to open your encrypted message. For other mobile devices, you can open the HTML attachment as
long as your mail client supports Form Post.
Q. Are replies and forwarded messages encrypted?
Yes. Responses continue to be encrypted throughout the duration of the thread.
Q. Does Office 365 Message Encryption provide localization?
Incoming email and HTML content is localized based on sender email settings. The viewing portal is localized
based on recipient's browser settings. However, the actual body (content) of encrypted message isn't localized.
Q. What encryption method is used for Office 365 Message Encryption?
Office 365 Message Encryption uses Rights Management Services (RMS ) as its encryption infrastructure. The
encryption method used depends on where you obtain the RMS keys used to encrypt and decrypt messages.
If you use Microsoft Azure RMS to obtain the keys, Cryptographic Mode 2 is used. Cryptographic Mode 2 is
an updated and enhanced AD RMS cryptographic implementation. It supports RSA 2048 for signature and
encryption, and supports SHA-256 for signature.
If you use Active Directory (AD ) RMS to obtain the keys, either Cryptographic Mode 1 or Cryptographic
Mode 2 is used. The method used depends on your on-premises AD RMS deployment. Cryptographic
Mode 1 is the original AD RMS cryptographic implementation. It supports RSA 1024 for signature and
encryption, and supports SHA-1 for signature. This mode continues to be supported by all current versions
of RMS.
For more information, see AD RMS Cryptographic Modes.
**Q. Why do some encrypted messages say they come from Office365@messaging.microsoft.com?**
When an encrypted reply is sent from the encryption portal or through the OME Viewer app, the sending email
address is set to Office365@messaging.microsoft.com because the encrypted message is sent through a Microsoft
endpoint. This helps to prevent encrypted messages from being marked as spam. The displayed name on the email
and the address within the encryption portal aren't changed because of this labeling. Also, this labeling only
applies to messages sent through the portal, not through any other email client.
Q. I am an Exchange Hosted Encryption (EHE ) subscriber. Where can I learn more about the upgrade to
Office 365 Message Encryption?
All EHE customers have been upgraded to Office 365 Message Encryption. For more information, visit the
Exchange Hosted Encryption Upgrade Center.
Q. Do I need to open any URLs, IP addresses, or ports in my organization's firewall to support Office 365
Message Encryption?
Yes. You have to add URLs for Exchange Online to the allow list for your organization to enable authentication for
messages encrypted by Office 365 Message Encryption. For a list of Exchange Online URLs, see Office 365 URLs
and IP Address Ranges.
Q. How many recipients can I send an Office 365 encrypted message to?
The recipient limit for an encrypted message is based on the number of characters in the message's To field. When
combined (after distribution list expansion), recipient addresses in the To field should not exceed 11,980 characters.
Because email addresses can vary in character length, there isn't a standard recipient limit for a single encrypted
message.
Q. Is it possible to revoke a message sent to a particular recipient?
No. You can't revoke a message to a particular person after it's sent.
Q. Can I view a report of encrypted messages that have been received and read?
There isn't a report that shows if an encrypted message has been viewed, but there are Office 365 reports
available that you can leverage to determine the number of messages that matched a specific transport rule, for
instance.
Q. What does Microsoft do with the information I provide through the OME Portal and the OME Viewer
App?
The Office 365 Messaging Encryption Portal privacy statement provides detailed information about what
Microsoft does and doesn't do with your private information.
Office 365 Protected Message Viewer Portal privacy
statement
8/21/2018 • 2 minutes to read • Edit Online

This privacy statement governs the Office 365 Protected Message Viewer Portal (the “Portal”) which enables you
to view protected (encrypted) messages on your devices. It does not apply to other online or offline Microsoft sites,
products, or services. Other privacy statements may also apply to the data you process through the Portal, such as
the privacy statement for Microsoft Account (if it is used for authentication) or the privacy statement associated
with your device.

Collection, processing, and use of your information


The Portal enables you to view protected messages from Office 365 from a variety of end points (e.g. desktop
computers or mobile devices). An email message will arrive in your mailbox with a hyperlink to view the protected
message. When you click on that hyperlink, you will be given options to sign into the Portal using O365, Microsoft
Account, Gmail, or Yahoo accounts, to view that message. You also have an option to use a one-time passcode,
depending on the sender’s tenant configuration. The Portal will redirect you to your email provider to authenticate
you. After successful authentication, the message will be decrypted and displayed via the Portal.
Sign-in credential information for your email account, as well as the one-time passcode, will be used solely for the
purpose of authentication; it will not be stored in the Portal, or used for any other purposes.
During the decryption process, the encrypted mail you receive will not be stored by the Portal; it will not be
transmitted outside the Portal at any time.

For more information about privacy


Microsoft Privacy – Information Protection Microsoft Corporation One Microsoft Way Redmond, Washington
98052 USA

Changes to this statement


If we post changes to this statement, we will revise the “last updated” data at the top of the statement. Consult with
the organization that provides you access to their services to learn more about changes to the privacy practices.
Create conditions for a supervisory review policy
7/18/2018 • 2 minutes to read • Edit Online

Content coming soon.

See also
Configure supervisory review policies for your organization
This article applies to the previous version of OME
10/31/2018 • 5 minutes to read • Edit Online

If you haven't yet moved your Office 365 organization to the new OME capabilities, but you have already deployed
OME, then the information in this article applies to your organization. Microsoft recommends that you make a plan
to move to the new OME capabilities as soon as it is reasonable for your organization. For instructions, see Set up
new Office 365 Message Encryption capabilities. If you want to find out more about how the new capabilities work
first, see Office 365 Message Encryption. The rest of this article refers to OME behavior before the release of the
new OME capabilities.

Set up Azure Rights Management for the previous version of


Office 365 Message Encryption
This topic describes the steps you need to follow in order to activate and then set up Azure Rights Management
(RMS ), part of Azure Information Protection, for use with Office 365 Message Encryption (OME ).

Prerequisites for using the previous version of Office 365 Message


Encryption
Office 365 Message Encryption (OME ), including IRM, depends on Azure Rights Management (Azure RMS ). Azure
RMS is the protection technology used by Azure Information Protection. To use OME, your Office 365
organization must include an Exchange Online or Exchange Online Protection subscription that, in turn, includes an
Azure Rights Management subscription.
If you're not sure of what your subscription includes, see the Exchange Online service descriptions for
Message Policy, Recovery, and Compliance.
If you don't have an Azure RMS subscription for Exchange Online or Exchange Online Protection, you must
purchase a subscription and activate it first.
For information about purchasing a subscription to Azure Rights Management, see Azure Rights
Management. The next section gives you information about activating Azure Rights Management.
If you have Azure Rights Management but it's not set up for Exchange Online or Exchange Online
Protection, this article explains how to activate Azure Rights Management and then the describes the best
way to set up OME to work with Azure Rights Management.
If you've already set up OME to work with Azure Rights Management for Exchange Online or Exchange
Online Protection, depending on how you set it up, you may be ready to start using OME and its new
capabilities right away. This article explains how to determine if you've set OME up correctly, what to do if
you need to change your setup, and what happens if you choose not to change your setup. For example, in
order to use the new capabilities, you must use Azure RMS with OME. You can't use the new capabilities
with an on-premises Active Directory RMS.

Activate Azure Rights Management for the previous version of OME in


Office 365
You need to activate Azure Rights Management so that the users in your organization can apply information
protection to messages that they send, and open messages and files that have been protected by the Azure Rights
Management service. For instructions, see Activating Azure Rights Management. Once you've completed the
activation, return here and continue with the tasks in this article.

Set up the previous version of OME to use Azure RMS by importing


trusted publishing domains (TPDs)
A TPD is an XML file that contains information about your organization's rights management settings. For
example, the TPD contains information about the server licensor certificate (SLC ) used for signing and encrypting
certificates and licenses, the URLs used for licensing and publishing, and so on. You import the TPD into your
Office 365 organization by using Windows PowerShell.

IMPORTANT
Previously, you could choose to import TPDs from the Active Directory Rights Management service (AD RMS) into your
Office 365 organization. However, doing so will prevent you from using the new OME capabilities and is not recommended. If
your Office 365 organization is currently configured this way, Microsoft recommends that you create a plan to migrate from
your on-premises Active Directory RMS to cloud-based Azure Information Protection. For more information, see Migrating
from AD RMS to Azure Information Protection. You will not be able to use the new OME capabilities until you have
completed the migration to Azure Information Protection.

To import TPDs from Azure RMS


1. Connect to Exchange Online Using Remote PowerShell.
2. Choose the key-sharing URL that corresponds to your Office 365 organization's geographic location:

LOCATION KEY SHARING LOCATION URL

North America https://sp-


rms.na.aadrm.com/TenantManagement/ServicePartner.svc

European Union https://sp-


rms.eu.aadrm.com/TenantManagement/ServicePartner.svc

Asia https://sp-
rms.ap.aadrm.com/TenantManagement/ServicePartner.svc

South America https://sp-


rms.sa.aadrm.com/TenantManagement/ServicePartner.svc

Office 365 for Government (Government Community Cloud) https://sp-


This RMS key-sharing location is reserved for customers who rms.govus.aadrm.com/TenantManagement/ServicePartner.svc
have purchased Office 365 for Government SKUs.

3. Configure the key-sharing location by running the Set-IRMConfiguration cmdlet as follows:

Set-IRMConfiguration -RMSOnlineKeySharingLocation "<RMSKeySharingURL >"

For example, to configure the key sharing location if your organization is located in North America:

Set-IRMConfiguration -RMSOnlineKeySharingLocation "https://sp-


rms.na.aadrm.com/TenantManagement/ServicePartner.svc"
4. Run the Import-RMSTrustedPublishingDomain cmdlet with the -RMSOnline switch to import the TPD from
Azure Rights Management:

Import-RMSTrustedPublishingDomain -RMSOnline -Name "<TPDName> "

Where *TPDName* is the name you want to use for the TPD. For example, "Contoso North American TPD".

5. To verify that you successfully configured your Office 365 organization to use the Azure Rights Management
service, run the Test-IRMConfiguration cmdlet with the -RMSOnline switch as follows:

Test-IRMConfiguration -RMSOnline

Among other things, this cmdlet checks connectivity with the Azure Rights Management service, downloads the
TPD, and checks its validity.

6. Run the Set-IRMConfiguration cmdlet as follows to disable Azure Rights Management templates from being
available in Outlook on the web and Outlook:

Set-IRMConfiguration -ClientAccessServerEnabled $false

7. Run the Set-IRMConfiguration cmdlet as follows to enable Azure Rights Management for your cloud-based
email organization and configure it to use Azure Rights Management for Office 365 Message Encryption:

Set-IRMConfiguration -InternalLicensingEnabled $true

8. To verify that you have successfully imported the TPD and enabled Azure Rights Management, use the Test-
IRMConfiguration cmdlet to test Azure Rights Management functionality. For details, see "Example 1" in Test-
IRMConfiguration.

I have the previous version of OME set up with Active Directory Rights
Management not Azure Information Protection, what do I do?
You can continue to use your existing Office 365 Message Encryption mail flow rules with Active Directory Rights
Management, but you can't configure or use the new OME capabilities. Instead, you need to migrate to Azure
Information Protection. For information about migration and what this means for your organization, see Migrating
from AD RMS to Azure Information Protection.

Next steps
Once you've completed Azure Rights Management setup, if you want to enable the new OME capabilities, see Set
up new Office 365 Message Encryption capabilities built on top of Azure Information Protection.
After you've set up your organization to use the new OME capabilities, you're ready to Define mail flow rules to
protect email messages with new OME capabilities.

Related topics
Encryption in Office 365
Technical reference details about encryption in Office 365
What is Azure Rights Management?
Office 365 Advanced Threat Protection
11/27/2018 • 4 minutes to read • Edit Online

Overview
Office 365 Advanced Threat Protection (ATP ) helps to protect your organization from malicious attacks by:
Scanning email attachments for malware with ATP Safe Attachments
Scanning web addresses (URLs) in email messages and Office documents with ATP Safe Links
Identifying and blocking malicious files in online libraries with ATP for SharePoint, OneDrive, and
Microsoft Teams
Checking email messages for unauthorized spoofing with spoof intelligence
Detecting when someone attempts to impersonate your users and your organization's custom domains
with ATP anti-phishing capabilities in Office 365
Protection through Office 365 ATP is determined by policies that your organization's security team
defines for Safe Links, Safe Attachments, and Anti-Phishing. It's important to periodically review and
revise your policies to keep them up to date and to take advantages of new features that are added to the
service. Reports are available to show how ATP is working for your organization. These reports can also show
you areas where you might need to review and update your policies. And, if you have files that are marked as
malware that shouldn't be, or files you'd like Microsoft to examine, you can submit a file to Microsoft for
analysis.

New features are continually being added to ATP


We are continuing to add new features to Office 365, and that includes ATP. Below is a list of several new
features, some of which call for an ATP policy to be reviewed and updated. To learn more about new features
coming to ATP (or Microsoft 365 in general), visit the Microsoft 365 Roadmap.
Beginning in late October 2017, ATP Safe Links protection is extended to apply to URLs in email as
well as URLs in Office 365 ProPlus documents, such as Word, Excel, PowerPoint, and Visio on
Windows, as well as Office apps on iOS and Android devices. (Make sure you're using Modern
Authentication for Office.)
Beginning in March 2018, ATP Safe Links protection is extended to apply to email sent between people
within an organization. (Make sure to review and edit your ATP Safe Links policies.)
Beginning in late May 2018, quarantine capabilities in the Security & Compliance Center are being
extended to ATP for SharePoint Online, OneDrive for Business, and Microsoft Teams.
Beginning in the second half of 2018, ATP Safe Links protection is extended to apply to URLs in Office
Online (Word Online, Excel Online, PowerPoint Online, and OneNote Online) and Office 365 ProPlus
on Mac. (Make sure to review and edit your ATP Safe Links policies.)
Beginning in September 2018, Office 365 ATP warning pages feature a new color scheme, more
details, and the ability to continue to a site despite given warnings and recommendations.
Beginning in October 2018 and rolling out over the next several months, when people are using
Outlook Web Application (OWA) or Outlook, ATP Safe Links renders original URLs, not rewritten
URLs. (We call this native link visibility.)
Get Office 365 ATP
IMPORTANT
Office 365 ATP is included in subscriptions, such as Microsoft 365 Enterprise, Office 365 Enterprise E5, Office 365
Education A5, and Microsoft 365 Business. If your organization has an Office 365 subscription that does not include
Office 365 ATP, you can potentially purchase ATP as an add-on. For more information, see Office 365 Advanced Threat
Protection Service Description.

1. As a global or security administrator, go to https://portal.office.com and sign in with your work or


school account for Office 365.
2. Choose Admin > Billing to see what your current subscription includes.

3. If you see Office 365 Enterprise E5, Office 365 Education A5, or Microsoft 365 Business, then
your organization has ATP.
If you see a different subscription, such as Office 365 Enterprise E3 or Office 365 Enterprise E1,
consider adding ATP. To do that, choose + Add subscription.
Once you have ATP, the next step is for your security team to define policies.

Define policies for ATP


Set up ATP anti-phishing policies in Office 365 including impersonation-based attacks to protect
against attackers who send email messages that appear to be from trusted people or domains
Set up ATP Safe Links policies in Office 365 including your organization's custom blocked URLs
list and custom "Do not rewrite" URLs list
Set up ATP Safe Attachments policies in Office 365 that can include Dynamic Delivery and
previewing

See how ATP is working by viewing reports


After your ATP policies are in place, reports are available to show how the service is working.
1. Make sure that you are an Office 365 global administrator, security administrator, or security reader.
(See Permissions in the Office 365 Security & Compliance Center.)
2. View reports for Advanced Threat Protection.
3. If needed, make adjustments to your security policies. See the following resources:
ATP anti-phishing policies in Office 365
ATP Safe Links policies in Office 365
ATP Safe Attachments policies in Office 365

Submit a suspicious file to Microsoft for analysis


If you get a file that you suspect could be malware, you can submit that file to Microsoft for analysis.
Visit the Windows Defender Security Intelligence submission portal.
If you get an email message (with or without an attachment) that you'd like to submit to Microsoft for
analysis, use the Report Message add-in.
Office 365 ATP Safe Links
11/9/2018 • 5 minutes to read • Edit Online

Overview of Office 365 ATP Safe Links


Office 365 ATP Safe Links (ATP Safe Links) (along with Office 365 ATP Safe Attachments) is a set of security
features offered as part of Office 365 Advanced Threat Protection for enterprise organizations. ATP Safe Links
can help protect your organization by providing time-of-click verification of web addresses (URLs) in email
messages and Office documents. Protection is defined through ATP Safe Links policies that are set by your
Office 365 security team.
Once your ATP Safe Links policies are in place, Office 365 global administrators, security administrators, and
security readers can view reports for Advanced Threat Protection. The information in those reports can help
your security team take further steps to protect your organization or research security incidents.
As new features are added to ATP, your Office 365 security team can add or edit your organization's ATP Safe
Links policies. In addition, you might notice changes and improvements, such as our newly revised warning
pages.

How ATP Safe Links works with URLs in email


At a high level, here's how ATP Safe Links protection works for URLs in email (hosted in Office 365, not on-
premises):
1. People receive email messages, some of which contain URLs.
2. All email goes through Exchange Online Protection, where internet protocol (IP ) and envelope filters,
signature-based malware protection, anti-spam and anti-malware filters are applied.
3. Email arrives in people's inboxes.
4. A user signs in to Office 365, and goes to their email inbox.
5. The user opens an email message, and clicks on a URL in the email message.
6. The ATP Safe Links feature immediately checks the URL before opening the website. The URL is
identified as blocked, malicious, or safe.
If the URL is to a website that is included in a custom "Do not rewrite" URLs list for a policy that
applies to the user, the website opens.
If the URL is to a website that is included in the organization's custom blocked URLs list, a warning
page opens.
If the URL is to a website that has been determined to be malicious, a warning page opens.
If the URL goes to a downloadable file and your organization's ATP Safe Links policies are
configured to scan such content, the downloadable file is checked.
If the URL is determined to be safe, the website opens.

How ATP Safe Links works with URLs in Office documents


At a high level, here's how ATP Safe Links protection works for URLs in Office 365 ProPlus applications (current
versions of Word, Excel, and PowerPoint on Windows or Mac, Office apps on iOS or Android devices, Visio on
Windows, OneNote Online, and Office Online):
1. People have installed Office 365 ProPlus on their computer, smartphone, or tablet. (Or, they are using
Office Online in their browser.)
2. A user opens a Word, Excel, PowerPoint, or Visio, and signs in to Office 365 Enterprise using their work or
school account. The document contains URLs.
3. When the user clicks on a URL in the document, the link is checked by the ATP Safe Links service.
If the URL is to a website that is included in a custom "Do not rewrite" URLs list for a policy that applies to
the user, that user is taken to the website.
If the URL is to a website that is included in the organization's custom blocked URLs list, the user is taken
to a warning page.
If the URL is to a website that has been determined to be malicious, the user is taken to a warning page.
If the URL goes to a downloadable file and the ATP Safe Links policies are configured to scan such
downloads, the downloadable file is checked.
If the URL is considered safe, the user is taken to the website.

How to get ATP Safe Links protection


ATP Safe Links features are part of Advanced Threat Protection, which is included in Office 365 Enterprise E5,
Microsoft 365 Business, and Microsoft 365 Enterprise.
The ATP Safe Links features are active when:
ATP Safe Links policies are set up for email and for Word, Excel, PowerPoint, and Visio documents.
(See Set up ATP safe links policies in Office 365.)
Office 365 client apps are configured to use Modern Authentication (this is for ATP Safe Links
protection in Office documents). (See Modern Authentication for Office 2016.)
Users have signed into Office 365 using their work or school account. (See Sign in to Office or Office
365.)
Your organization's email is hosted in Office 365, not in an on-premises server.

How to make sure ATP Safe Links protection is in place


One good way to see how ATP Safe Links protection is working for your organization is by viewing reports for
Advanced Threat Protection. Additionally, as a global administrator or security administrator, be sure to review
your ATP Safe Links policies. ATP Safe Links policies determine whether protection applies to hyperlinks in email
messages only, or to URLs in Office documents as well.

Example scenarios where ATP Safe Links protection might or might


not be in place
The following table describes some example scenarios where ATP Safe Links protection might or might not be in
place. (In all of these cases, we assume the organization has Office 365 Enterprise E5.)
EXAMPLE SCENARIO DOES ATP SAFE LINKS PROTECTION APPLY IN THIS CASE?

Jean is a member of a group that has ATP Safe Links policies Yes. The ATP Safe Links policies that are defined apply to
covering URLs in email and Office documents. Jean opens a Jean's group, Jean's email, and Word, Excel, PowerPoint, or
PowerPoint presentation that someone sent, and then clicks Visio documents that Jean opens, so long as Jean is signed in
a URL in the presentation. and using Office 365 ProPlus on Windows, iOS, or Android
devices.

In Chris's organization, no global or security administrators No. The default policy that covers URLs for everyone in the
have defined any ATP safe links policies yet. Chris receives an organization must be defined in order for protection to be in
email that contains a URL to a malicious website. Chris is place.
unaware the URL is malicious and clicks the link.

In Pat's organization, no global or security administrators No. A policy that includes Office documents must be defined
have defined or edited any ATP Safe Links policies yet. Pat in order for protection to be in place. See Set up ATP Safe
opens a Word document and clicks a URL in the file. Links policies in Office 365.

Lee's organization has a ATP Safe Links policy that has It depends on whether the entire site and all its subpages are
http://tailspintoys.com listed as a blocked website. Lee included in the list of blocked URLs. See Set up a custom
receives an email message that contains a URL to blocked URLs list using ATP Safe Links.
http://tailspintoys.com/aboutus/trythispage . Lee
clicks the URL.

Jamie, Jean's colleague, sends an email to Jean, not knowing It depends on whether ATP Safe Links policies are defined for
that the email contains a malicious URL. email sent within the organization. See Set up ATP Safe Links
policies in Office 365.
Set up Office 365 ATP Safe Links policies
11/27/2018 • 6 minutes to read • Edit Online

ATP Safe Links , a feature of Office 365 Advanced Threat Protection (ATP ), can help protect your organization
from malicious links used in phishing and other attacks. If you have the necessary permissions for the Office
365 Security & Compliance Center, you can set up ATP Safe Links policies to help ensure that when people
click web addresses (URLs), your organization is protected. Your ATP Safe Links policies can be configured to
scan URLs in email and URLs in Office documents.
New features are continually being added to ATP. As new features are added, you may need to make
adjustments to your existing ATP Safe Links policies.

What to do
1. Review the prerequisites.
2. Review and edit the default ATP Safe Links policy that applies to everyone. For example, you can set up
your custom blocked URLs list for ATP Safe Links.
3. Add or edit policies for specific email recipients, including setting up your custom "Do not rewrite" URLs
list for ATP Safe Links.
4. Learn about ATP Safe Links policy options (in this article), including settings for recent changes

Step 1: Review the prerequisites


Make sure that your organization has Office 365 Advanced Threat Protection.
Make sure that you have the necessary permissions to define or edit ATP policies. See Permissions in
the Office 365 Security & Compliance Center.
Make sure that Office clients are configured to use Modern Authentication (this is for ATP Safe Links
protection in Office documents).
Learn about ATP Safe Links policy options (in this article).
Allow up to 30 minutes for your new or updated policy to spread to all Office 365 datacenters.

Step 2: Define (or review) the ATP Safe Links policy that applies to
everyone
When you have Office 365 Advanced Threat Protection, you will have a default ATP Safe Links policy that
applies to everyone in your organization. Make sure to review, and if needed, edit your default policy.
1. Go to https://security.microsoft.com and sign in with your work or school account.
2. In the left navigation, under Threat management, choose Policy > Safe Links.
3. In the Policies that apply to the entire organization section, select Default, and then choose Edit
(the Edit button resembles a pencil).
4. In the Block the following URLs section, specify one or more URLs that you want to prevent people in
your organization from visiting. (See Set up a custom blocked URLs list using ATP Safe Links.)
5. In the Settings that apply to content except email section, select (or clear) the options you want to
use. (We recommend that you select all the options.)
6. Choose Save.

Step 3: Add (or edit) ATP Safe Links policies that apply to specific
email recipients
After you have reviewed (or edited) the default ATP Safe Links policy that applies to everyone, your next step is
to define additional policies that would apply to specific recipients. For example, you can specify exceptions to
your default policy by defining an additional policy.
1. Go to https://security.microsoft.com and sign in with your work or school account.
2. In the left navigation, under Threat management, choose Policy.
3. Choose Safe Links.
4. In the Policies that apply to specific recipients section, choose New (the New button resembles a
plus sign ( +)).

5. Specify the name, description, and settings for your policy.


Example: To set up a policy called "no direct click through" that does not allow people in a certain
group in your organization to click through to a specific website without ATP Safe Links protection, you
might specify the following recommended settings:
In the Name box, type no direct click through.
In the Description box, type a description like, Prevents people in certain groups from clicking through
to a website without ATP Safe Links verification.
In the Select the action section, choose On.
Select Use Safe Attachments to scan downloadable content.
If this option is available, select Apply Safe Links to messages sent within the organization.
Select Do not allow user to click through to original URL.
(This is optional) In the Do not rewrite the following URLs section, specify one or more URLs that
are considered to be safe for your organization. (See Set up a custom "Do not rewrite" URLs list using
ATP Safe Links)
In the Applied To section, choose The recipient is a member of, and then choose the group(s) you
want to include in your policy. Choose Add, and then choose OK.
6. Choose Save.

Step 4: Learn about ATP Safe Links policy options


As you set up or edit your ATP Safe Links policies, will see several options available. In case you are wondering
what these options are, the following table describes each one and its effect. Remember that there are two
main kinds of ATP Safe Links policies to define or edit:
a default policy that applies to everyone
additional policies that are defined for specific recipients
Default policy options
Default policy options apply to everyone in your organization.

THIS OPTION DOES THIS

Block the following URLs Enables your organization to have a custom list of URLs that
are automatically blocked. When users click a URL in this list,
they'll be taken to a warning page that explains why the
URL is blocked.
To learn more, see [Set up a custom blocked URLs list using
ATP Safe Links

Office 365 ProPlus, Office for iOS and Android When this option is selected, ATP Safe Links protection is
applied to URLs in documents that are open in Office 365
ProPlus (Word, Excel, and PowerPoint on Windows or Mac
OS), Office documents on iOS, or Android devices, Visio
2016 on Windows, and Office Online (Word Online,
PowerPoint Online, Excel Online, and OneNote Online),
provided the user has signed into Office 365.

If you see only Office 2016 on Windows, then the feature


updates have not reached your Office 365 environment yet
(and they are coming soon). Until then, ATP Safe Links
protection applies to Word 2016, Excel 2016, PowerPoint
2016 or Visio 2016 running on Windows.

Don't track when users click ATP Safe Links When this option is selected, click data for URLs in Word,
Excel, PowerPoint, and Visio documents is not stored.

Don't let users click through ATP Safe Links to original When this option is selected, users cannot proceed past a
URL warning page to a URL that is determined to be malicious.

Policies that apply to specific email recipients


THIS OPTION DOES THIS

Off Does not scan URLs in email messages.


Enables you to define an exception rule, such as a rule that
does not scan URLs in email messages for a specific group
of recipients.

On Rewrites URLs to route users through ATP Safe Links


protection when the users click URLs in email messages.
Checks a URL when clicked against a list of blocked or
malicious URLs.
THIS OPTION DOES THIS

Use Safe Attachments to scan downloadable content When this option is selected, URLs that point to
downloadable content are scanned.

Apply Safe Links to messages sent within the When this option is available and selected, ATP Safe Links
organization protection is applied to email messages sent between
people in your organization, provided the email accounts
are hosted in Office 365.

Do not track user clicks When this option is selected, click data for URLs in email
from external senders is not stored. URL click tracking for
links within email messages sent within the organization is
currently not supported.

Do not allow users to click through to original URL When this option is selected, users cannot proceed past a
warning page to a URL that is determined to be malicious.

Do not rewrite the following URLs Leaves URLs as they are. Keeps a custom list of safe URLs
that don't need scanning for a specific group of email
recipients in your organization. See Set up a custom "Do not
rewrite" URLs list using ATP Safe Links for more details,
including recent changes to support for wildcard asterisks
(*).

Next steps
Once your ATP Safe Links policies are in place, you can see how ATP is working for your orgnization by
viewing reports. See the following resources to learn more:
View reports for Office 365 Advanced Threat Protection
Use Explorer in the Security & Compliance Center
Set up a custom do-not-rewrite URLs list using
Office 365 ATP Safe Links
11/27/2018 • 2 minutes to read • Edit Online

With Office 365 Advanced Threat Protection (ATP ), your organization can have a custom blocked URLs, such that
when people click on web addresses (URLs) in email messages or certain Office documents, they are prevented
from going to those URLs. Your organization can also have custom "do not rewrite" lists for specific groups in
your organization. A "do not rewrite" list enables some people to visit URLs that are otherwise blocked by ATP
Safe Links in Office 365.
This article describes how to specify a list of URLs that are excluded from ATP Safe Links scanning, and a few
important points to keep in mind.

Set up a "do not rewrite" list


ATP Safe Links protection uses several lists, including your organization's blocked URLs list and the "do not
rewrite" lists for exceptions. If you have the necessary permissions, you can set up your custom "do not rewrite"
lists. You do this when you add or edit Safe Links policies that apply to specific recipients in your organization.
1. Go to https://security.microsoft.com and sign in with your work or school account.
2. In the left navigation, under Threat management > Policy > Safe Links.
3. In the Policies that apply to specific recipients section, choose New (the New button resembles a plus
sign ( +)) to create a new policy. (Alternatively, you can edit an existing policy.)

4. Specify a name and description for your policy.


5. In the Do not rewrite the following URLs section, select the Enter a valid URL box, and then type a
URL, and then choose the plus sign (+).
6. In the Applied To section, choose The recipient is a member of, and then choose the group(s) you want
to include in your policy. Choose Add, and then choose OK.
7. When you are finished adding URLs, in the lower right corner of the screen, choose Save.

NOTE
Make sure to review your organization's custom list of blocked URLs. See Set up a custom blocked URLs list using ATP Safe
Links.

Important points to keep in mind


Any URLs that you specify in the "do not rewrite" list are excluded from ATP Safe Links scanning for the
recipients that you specify.
When you specify a "do not rewrite" list for an ATP Safe Links policy, you can include up to three wildcard
asterisks (*). Wildcards (*) are assumed for entries such as contoso.com , which do not explicitly include
prefixes or subdomains, like http:// or https:// . This means an entry, such as contoso.com is similar to
*contoso.com* for your "do not rewrite" list.

If you already have a list of URLs in your "do not rewrite" list, make sure to review that list and add
wildcards as appropriate. For example, if your existing list has an entry like http://contoso.com/a and you
want to include subpaths like http://contoso.com/a/b in your policy, add a wildcard to your entry so it
looks like http://contoso.com/a* .
Do not include a forward slash (/) in the URLs that you specify in your "do not rewrite" list. For example,
rather than enter contoso.com/ in your "do not rewrite" list, enter contoso.com .
The following table lists examples of what you can enter and what effect those entries have.

EXAMPLE ENTRY WHAT IT DOES

*contoso.com* Allows specific recipients to visit a domain, subdomains, and


paths, such as http://www.contoso.com ,
https://www.contoso.com , https://maps.contoso.com ,
or http://www.contoso.com/a

http://contoso.com/a Allows specific recipients to visit a site like


http://contoso.com/a , but not subpaths like
http://contoso.com/a/b

http://contoso.com/a* Allows specific recipients to visit a site like


http://contoso.com/a and subpaths like
http://contoso.com/a/b
Set up a custom blocked URLs list using Office 365
ATP Safe Links
11/27/2018 • 2 minutes to read • Edit Online

With Office 365 Advanced Threat Protection (ATP ), your organization can have a custom list of website
addresses (URLs) that are blocked. When a URL is blocked, people who click on links to the blocked URL are
taken to a warning page that resembles the following image:

The blocked URLs list is defined by your organization's Office 365 security team, and that list applies to everyone
in the organization who is covered by Office 365 ATP Safe Links policies.
Read this article to learn how to set up your organization's custom blocked URLs list for ATP Safe Links in Office
365.

View or edit a custom list of blocked URLs


ATP Safe Links in Office 365 uses several lists, including your organization's custom blocked URLs list. If you
have the necessary permissions, you can set up your organization's custom list. You do this by editing your
organization's default Safe Links policy.
1. Go to https://security.microsoft.com and sign in with your work or school account.
2. In the left navigation, under Threat management, choose Policy > Safe Links.
3. In the Policies that apply to the entire organization section, select Default, and then choose Edit (the
Edit button resembles a pencil).
This is where you go to view your list of blocked URLs. Note that at first, you won't have any URLs listed.

4. Select the Enter a valid URL box, and then type a URL, and then choose the plus sign (+). Here are a few
things to keep in mind:
You can specify a domain-only URL (like contoso.com or tailspintoys.com ). This will block clicks on any
URL that contains the domain.
Do not include a forward slash ( /) at the end of the URL. For example, instead of entering
http://www.contoso.com/ , enter http://www.contoso.com .

You can include up to three wildcard asterisks (*) per URL. The following table lists some examples of
what you can enter and what effect those entries have.

EXAMPLE ENTRY WHAT IT DOES

contoso.com or *contoso.com* Blocks the domain, subdomains, and paths, such as


https://www.contoso.com , http://sub.contoso.com , and
http://contoso.com/abc

http://contoso.com/a Blocks a site http://contoso.com/a but not additional


subpaths like http://contoso.com/a/b

http://contoso.com/a* Blocks a site http://contoso.com/a and additional


subpaths like http://contoso.com/a/b

5. When you are finished adding URLs, in the lower right corner of the screen, choose Save.

How to define exceptions for certain users in an organization


If you want certain groups to be able to view URLs that might be blocked for others, you can specify an ATP Safe
Links policy that applies to specific recipients. See Set up a custom "do not rewrite" URLs list using ATP Safe
Links.
Office 365 ATP Safe Links warning pages
11/9/2018 • 2 minutes to read • Edit Online

Office 365 Advanced Threat Protection (ATP ) helps protect your organization from phishing attempts and
malware through features, such as ATP Safe Links, ATP Safe Attachments, and anti-phishing protection. When
protection is in place, links (URLs) in email messages and Office documents are checked. If a URL is identified as
suspicious or malicious, you might be blocked from opening the URL when you click it. Instead of going directly
to the site, you might see a warning page instead.
Read this article to see Examples of warning pages that might appear, along with Recent updates to warning
pages.

Examples of warning pages


ATP is scanning the link
A URL is being scanned by ATP Safe Links. You might have to wait a few moments to try the link again.

A URL is in a suspicious email message


The URL is in an email message that seems similar to other email messages that are considered suspicious. We
recommend that you double-check the email message before proceeding to the site.
A URL is in a message identified as a phishing attempt
The URL is in an email message that has been identified as a phishing attack. As a result, all URLs in the email
message are blocked. We recommend that you do not proceed to the site.

A site has been identified as malicious


The URL points to a site that has been identified as malicious.
We recommend that you do not proceed to the site.
A site is blocked
The URL is blocked for your organization. There are several reasons why a URL might be blocked. We
recommend that you contact your organization's Office 365 administrator.

An error has occurred


Some kind of error has occurred, and the URL cannot be opened.
Recent updates to warning pages
Several warning pages were recently updated for Office 365 ATP. If you're not already seeing the updated pages,
you will soon. The updates include a new color scheme, more details, and the ability to proceed to a site despite
the given warning and recommendations.
URL scan in progress
Original warning page:

Updated warning page:


Malicious site warning
Original warning page:

Updated warning page:


Blocked URL warning
Original warning page:

Updated warning page:


"Error occurred" warning page
Original warning page:

Updated warning page:


Office 365 ATP Safe Attachments
11/9/2018 • 4 minutes to read • Edit Online

Overview of Office 365 ATP Safe Attachments


ATP Safe Attachments (along with ATP Safe Links) is part of Office 365 Advanced Threat Protection (ATP ). The
ATP Safe Attachments feature checks to see if email attachments are malicious, and then takes action to protect
your organization. The ATP Safe Attachments feature protects your organization according to ATP Safe
Attachments policies that are set by your Office 365 global or security administrators.
Recently, ATP protection has been extended to files in SharePoint Online, OneDrive for Business, and Microsoft
Teams. To learn more, see Office 365 Advanced Threat Protection for SharePoint, OneDrive, and Microsoft
Teams.

How it works
The ATP Safe Attachments feature checks email attachments for people in your organization. When an ATP Safe
Attachments policy is in place and someone covered by that policy views their email in Office 365, their email
attachments are checked and appropriate actions are taken, based on your ATP Safe Attachments policies.
Depending on how your policies are defined, people can continue working without ever knowing they were sent
malicious files.
Here are two examples of ATP Safe Attachments at work.
Example 1: Email attachment Suppose that Lee receives an email message that has an attachment. It is
not obvious to Lee whether that attachment is safe or actually contains malware designed to steal Lee's
user credentials. In Lee's organization, a security administrator defined an ATP Safe Attachments policy a
few days ago. With the ATP Safe Attachments feature, the email attachment is opened and tested in a
virtual environment before Lee receives it. If the attachment is determined to be malicious, it will be
removed automatically. If the attachment is safe, it will open as expected when Lee clicks on it.
Example 2: File in SharePoint Online Suppose that Jean received a file and uploaded it into a library in
SharePoint Online. Jean shares the link to the file with the rest of the team, not knowing that the file is
actually malicious. Fortunately, ATP for SharePoint, OneDrive, and Microsoft Teams detects the malicious
file and blocks it. A few days later, Chris goes to open the document. Although Chris can see the file is
there, Chris cannot open or share it, which prevents Chris's computer and others from the malicious file.
ATP Safe Attachments policies can be applied to specific people or groups in your organization, or to your entire
domain. To learn more, see Set up ATP Safe Attachments policies in Office 365.

How to get ATP Safe Attachments


The ATP Safe Attachments feature is part of Advanced Threat Protection, which is included in Microsoft 365
Enterprise, Office 365 Enterprise E5, and Microsoft 365 Business.
The ATP Safe Attachments feature applies when:
ATP Safe Attachments policies are set up. (See Set up ATP Safe Attachments policies in Office 365.)
Users have signed into Office 365 using their work or school account. (See Sign in to Office or Office
365.)
How to know if ATP Safe Attachments protection is in place
ATP Safe Attachments policies must be defined in order for ATP Safe Attachments protection to be in place.
One good way to see how the service is working is by viewing reports for Advanced Threat Protection.
In addition, the following table describes some example scenarios. In all of these cases, we assume the
organization has Office 365 Enterprise E5, which includes Advanced Threat Protection.

EXAMPLE SCENARIO DOES ATP SAFE ATTACHMENTS PROTECTION APPLY IN THIS CASE?

Pat's organization has Office 365 Enterprise E5, but no one No. Although the feature is available, at least one ATP Safe
has defined any policies for ATP Safe Attachments yet. Attachments policy must be defined in order for ATP Safe
Attachments protection to be in place.

Lee is an employee in the sales department at Contoso. Lee's No. In this case, finance employees would have ATP Safe
organization has an ATP Safe Attachments policy in place Attachments protection, but other employees, including the
that applies to finance employees only. sales department, would not until policies that include those
groups are defined.

Yesterday, an Office 365 administrator at Jean's organization Yes. In this example, Jean has a license for Advanced Threat
set up an ATP Safe Attachments policy that applies to all Protection, and an ATP Safe Attachments policy that includes
employees. Earlier today, Jean received an email message Jean has been defined. It typically takes about 30 minutes for
that includes an attachment. a new policy to take effect across datacenters; since a day has
passed in this case, the policy should be in effect.

Chris's organization has Office 365 Enterprise E5 with ATP ATP Safe Attachments protection is in place for messages
Safe Attachments policies in place for everyone in the that Chris receives. If the recipients' organizations also have
organization. Chris receives an email that has an attachment, ATP Safe Attachments policies in place, then the message
and forwards the message to others who are outside the that Chris forwards would be subject to those policies when
organization. the forwarded message arrives.

Jamie's organization has ATP Safe Attachments policies in ATP Safe Attachments protection is in place according to the
place, and ATP for SharePoint, OneDrive, and Microsoft policies that are defined; however, this does not mean that
Teams has been turned on. Jamie assumes that every file in every single file in SharePoint Online, OneDrive for Business,
SharePoint Online has been scanned and is safe to open or or Microsoft Teams is scanned. (To learn more, see ATP for
download. SharePoint, OneDrive, and Microsoft Teams.)

Submitting files for malware analysis


If you receive a file that you want to ask Microsoft to analyze, visit Submit a file for malware analysis.
If you receive an email message (with or without an attachment) that you want to submit to Microsoft for
analysis, use the Report Message add-in.
Set up Office 365 ATP Safe Attachments policies
11/27/2018 • 4 minutes to read • Edit Online

People regularly send, receive, and share attachments, such as documents, presentations, spreadsheets, and
more. It's not always easy to tell whether an attachment is safe or malicious just by looking at an email
message. And the last thing you want is a malicious attachment to get through, wreaking havoc for your
organization. Fortunately, Office 365 Advanced Threat Protection (ATP ) can help. You can set up ATP Safe
Attachments policies to help ensure that your organization is protected against attacks by unsafe email
attachments.

What to do
1. Review the prerequisites
2. Set up an ATP Safe Attachments policy
3. Learn about ATP Safe Attachments policy options

Step 1: Review the prerequisites


Make sure that your organization has Office 365 Advanced Threat Protection.
Make sure that you have the necessary permissions for the Office 365 Security & Compliance Center.
Learn about ATP Safe Attachments policy options (in this article). Some options, such as the Monitor or
Replace options, can result in a minor delay of email while attachments are scanned. To avoid message
delays, consider using Dynamic Delivery and previewing.
Allow up to 30 minutes for your new or updated policy to spread to all Office 365 datacenters.

Step 2: Set up (or edit) an ATP Safe Attachments policy


1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in with
your work or school account.
2. In the Office 365 Security & Compliance Center, in the left navigation pane, under Threat
management, choose Policy > Safe Attachments.
3. If you see Turn on ATP for SharePoint, OneDrive, and Microsoft Teams, we recommend that you
select this option. This will enable Office 365 Advanced Threat Protection for SharePoint, OneDrive, and
Microsoft Teams for your Office 365 environment.
4. Choose New (the New button resembles a plus sign ( +)) to start creating your policy.
5. Specify the name, description, and settings for the policy.

Example: To set up a policy called "no delays" that delivers everyone's messages immediately and then
reattaches attachments after they're scanned, you might specify the following settings:
In the Name box, type no delays.
In the Description box, type a description like, Delivers messages immediately and reattaches
attachments after scanning.
In the response section, choose the Dynamic Delivery option. (Learn more about Dynamic
Delivery and previewing with ATP Safe Attachments.)
In the Redirect attachment section, select the option to enable redirect and type the email
address of your Office 365 global administrator, security administrator, or security analyst who will
investigate malicious attachments.
In the Applied To section, choose The recipient domain is, and then select your domain.
Choose Add, and then choose OK.
6. Choose Save.
Consider setting up multiple ATP Safe Attachments policies for your organization. These policies will be applied
in the order they're listed on the ATP Safe Attachments page. After a policy has been defined or edited, allow
at least 30 minutes for the polices to take effect throughout Microsoft datacenters.

Step 3: Learn about ATP Safe Attachments policy options


As you set up your ATP Safe Attachments policies, you choose from among many options, including Monitor,
Block, Replace, Dynamic Delivery, and so on. In case you're wondering about what these options do, the
following table summarizes each and its effect.

OPTION EFFECT USE WHEN YOU WANT TO:

Off Does not scan attachments for Turn scanning off for internal senders,
malware scanners, faxes, or smart hosts that will
Does not delay message delivery only send known, good attachments
Prevent unnecessary delays in routing
internal mail
This option is not recommended
for most users. It enables you to
turn ATP Safe Attachments
scanning off for a small group of
internal senders.

Monitor Delivers messages with attachments See where detected malware goes in
and then tracks what happens with your organization
detected malware

Block Prevents messages with detected Safeguard your organization from


malware attachments from proceeding repeated attacks using the same
Sends messages with detected malware attachments
malware to quarantine in Office 365
where a security administrator or
analyst can review and release (or
delete) those messages
Blocks future messages and
attachments automatically

Replace Removes detected malware Raise visibility to recipients that


attachments attachments were removed because of
Notifies recipients that attachments detected malware
have been removed
Sends messages with detected
malware to quarantine in Office 365
where a security administrator or
analyst can review and release (or
delete) those messages
OPTION EFFECT USE WHEN YOU WANT TO:

Dynamic Delivery Delivers messages immediately Avoid message delays while protecting
Replaces attachments with a recipients from malicious files
placeholder file until scanning is Enable recipients to preview
complete, and then reattaches the attachments in safe mode while
attachments if no malware is detected scanning is taking place
Includes attachment previewing
capabilities for most PDFs and Office
files during scanning
Sends messages with detected
malware to Quarantine where a
security administrator or analyst can
review and release (or delete) those
messages
Learn about Dynamic Delivery and
previewing with ATP Safe Attachments

Enable redirect Applies when the Monitor, Block, or Enable security administrators and
Replace option is chosen analysts to research suspicious
Sends attachments to a specified email attachments
address where security administrators
or analysts can investigate

Next steps
Once your ATP Safe Attachments policies are in place, you can see how ATP is working for your organization by
viewing reports. See the following resources to learn more:
View reports for Office 365 Advanced Threat Protection
Use Explorer in the Security & Compliance Center
Dynamic Delivery and previewing with Office 365
ATP Safe Attachments
11/9/2018 • 2 minutes to read • Edit Online

Summary: Dynamic Delivery is an option that can be selected for ATP Safe Attachments. Read this article to learn
about Dynamic Delivery and attachment preview capabilities in ATP Safe Attachments in Office 365.

How Dynamic Delivery works


When ATP Safe Attachments policies are set up for your organization, there are several options for how email
attachments are handled. These include Block, Replace, and Dynamic Delivery. Depending on how ATP Safe
Attachments policies are configured, email recipients can experience a minor delay in email delivery while their
attachments are scanned. To avoid message delays, choose Dynamic Delivery.
Dynamic Delivery eliminates email delays by sending the body of an email message through to the recipient with
a placeholder for each email attachment. The placeholder remains until a copy of the attachment is scanned and
determined to be safe by ATP Safe Attachments. Most PDFs and Office documents can be previewed in safe
mode while ATP scanning is underway. If an attachment is not compatible with the Dynamic Delivery previewer,
email recipients see an attachment placeholder until ATP Safe Attachments scanning is complete.
As each attachment is cleared, it is available to open or download.
If an attachment is determined to be malicious, it is sent to quarantine, where someone on your
organization's security team (such as an Office 365 global administrator or security administrator) can
manage quarantined messages in Office 365.
With Dynamic Delivery, email recipients can read and respond to their email messages right away, knowing that
their attachments are being analyzed.
ATP Safe Attachments scanning takes place in the same region where your Office 365 data resides. For more
information about data center geography, see Where is your data located?

What happens when someone forwards an email that contains an


attachment?
Suppose that an organization is using Dynamic Delivery for their ATP Safe Attachments policy, and someone
receives an email that contains an attachment. Now suppose that person is about to forward the email message to
someone else. What happens? It depends on whether the additional recipients are included in ATP Safe
Attachments policies.
If a recipient is covered by an ATP Safe Attachments policy using the Dynamic Delivery option, then the
recipient sees the placeholder, with the ability to preview compatible files.
If a recipient is not covered by an ATP Safe Attachments policy, then the email and attachment will go
through, without ATP Safe Attachments scanning or attachment placeholders.

What's required for Dynamic Delivery to work?


Your organization must have Office 365 Advanced Threat Protection
Policies must be defined for ATP Safe Attachments using the Dynamic Delivery option (See Set up ATP
Safe Attachments policies in Office 365)
Your organization's email must be hosted in Office 365

Are there scenarios for which Dynamic Delivery is not available?


There are certain scenarios in which Dynamic Delivery is not supported. These include the following:
Email messages that are in public folders
Email messages that are routed out of and then back into the user's mailbox using custom rules
Messages that are moved (automatically or manually) out of the hosted mailbox and into other locations,
including archive folders
Messages that are deleted
A user's mailbox search folder that is in an error state
Environments in which an Exchange Online admin has enabled Exclaimer. (See Messages with attachments
are not delivered when ATP Dynamic Delivery and Exclaimer are used)
Messages encrypted with Secure/Multipurpose Internet Mail Extensions ( S/MIME )
Office 365 ATP for SharePoint, OneDrive, and
Microsoft Teams
11/9/2018 • 3 minutes to read • Edit Online

Overview of Office 365 ATP for SharePoint, OneDrive, and Microsoft


Teams
People regularly share files and collaborate using SharePoint, OneDrive, and Microsoft Teams. With Office 365
Advanced Threat Protection (ATP ), your organization can collaborate in a safer manner. ATP helps detect and
block files that are identified as malicious in team sites and document libraries.

How it works
When a file in SharePoint Online, OneDrive for Business, and Microsoft Teams has been identified as malicious,
ATP directly integrates with the file stores to lock that file. The following image shows an example of a malicious
file detected in a library.

Although the blocked file is still listed in the document library and web, mobile, or desktop applications, the
blocked file cannot be opened, copied, moved, or shared. People can, however, delete a blocked file. Here's an
example of what that looks like on a user's mobile device:
Depending on how Office 365 is configured, people might or might not have the ability to download a blocked
file. Here's what downloading a blocked file looks like on a user's mobile device:

To learn more, see Turn on Office 365 ATP for SharePoint, OneDrive, and Microsoft Teams.

Keep these points in mind


ATP will not scan every single file in SharePoint Online, OneDrive for Business, or Microsoft Teams. This
is by design. Files are scanned asynchronously, through a process that uses sharing and guest activity
events along with smart heuristics and threat signals to identify malicious files.
Make sure your SharePoint sites are configured to use the Modern experience. When a file is identified as
malicious and blocked, people can see that this has occurred in the Modern experience, but not the Classic
view. ATP protection applies whether the Modern experience or the Classic view is used; however, visual
indicators that a file is blocked are present only in the Modern experience.
Files that are identified as malicious in SharePoint Online, OneDrive for Business, or Microsoft Teams will
show up in reports for Office 365 Advanced Threat Protection and in Threat Explorer (part of Office 365
Threat Intelligence).
ATP is part of your organization's overall threat protection strategy, which includes anti-spam and anti-
malware protection, as well as Safe Links and Safe Attachments. To learn more, see Protect against
threats in Office 365.
A SharePoint Online administrator can determine whether to enable people to download files that are
detected as malicious. This is done by running the Set-SPOTenant PowerShell cmdlet using a
DisallowInfectedFileDownload parameter (see Turn on Office 365 ATP for SharePoint, OneDrive, and
Microsoft Teams).

Quarantine in ATP for SharePoint Online, OneDrive for Business, and


Microsoft Teams
Beginning in late May 2018, quarantine capabilities in the Security & Compliance Center are being extended to
ATP for SharePoint Online, OneDrive for Business, and Microsoft Teams.
When a file in SharePoint Online, OneDrive for Business, or Microsoft Teams is identified as malicious, in
addition to ATP blocking the file from being opened or shared, that file is included in a list of quarantined items.
(In the Security & Compliance Center, go to Threat management > Review > Quarantine and filter for
Content.)
If you're part of your organization's Office 365 security team and have the necessary permissions assigned in the
Office 365 Security & Compliance Center, you can download, release, report, and delete files that are detected as
malicious by ATP from quarantine.
Releasing and reporting a file removes the ATP block on the file in the respective team site or document
library for SharePoint, OneDrive, or Microsoft Teams. Users are then able to open, share, and download
the file. And, when the Send report to Microsoft option is selected, the file is reported as a false positive
to Microsoft.
Deleting a file removes the file from quarantine; however, the file is still blocked from being opened or
shared. The file must also be deleted in its respective document library or team site (SharePoint Online,
OneDrive for Business, or Microsoft Teams).
Downloading a file enables you to download and analyze the file for any false positives.

Next steps
1. Turn on Office 365 ATP for SharePoint, OneDrive, and Microsoft Teams
2. View information about malicious files detected in SharePoint, OneDrive, or Microsoft Teams
Turn on Office 365 ATP for SharePoint, OneDrive,
and Microsoft Teams
11/27/2018 • 2 minutes to read • Edit Online

Office 365 ATP for SharePoint, OneDrive, and Microsoft Teams protects your organization from inadvertently
sharing malicious files. When a malicious file is detected, that file is blocked so that no one can open, copy, move,
or share it until further actions are taken by the organization's security team. Read this article to turn on ATP for
SharePoint, OneDrive, and Teams, set up alerts to be notified about detected files, and take your next steps.
In order to perform the tasks described in this article, you must have the necessary permissions assigned in Office
365 and in the Security & Compliance Center.

Turn on ATP for SharePoint, OneDrive, and Microsoft Teams


Before you begin this procedure, make sure that audit logging is already turned on for your Office 365
environment. This is typically done by someone who has the Audit Logs role assigned in Exchange Online. For
more information, see Turn Office 365 audit log search on or off.
1. As a global administrator or security administrator, go to https://security.microsoft.com, and sign in with
your work or school account.
2. In the Office 365 Security & Compliance Center, in the left navigation pane, under Threat management,
choose Policy > Safe Attachments.

3. Select Turn on ATP for SharePoint, OneDrive, and Microsoft Teams.


4. Click Save.
5. Review (and, as appropriate, edit) your organization's Safe Attachments policies and Safe Links policies.
6. (Recommended) As a global administrator or a SharePoint Online administrator, run the Set-SPOTenant
cmdlet with the DisallowInfectedFileDownload parameter set to true.
Setting the parameter to true blocks all actions (except Delete) for detected files. People cannot open,
move, copy, or share detected files.
Setting the parameter to false blocks all actions except Delete and Download. People can choose to
accept the risk and download a detected file.
7. Allow up to 30 minutes for your changes to spread to all Office 365 datacenters.
8. (Recommended) Proceed to set up alerts for detected files.
To learn more about using PowerShell with Office 365, see Manage Office 365 with PowerShell.
To learn more about the user experience when a file has been detected as malicious, see What to do when a
malicious file is found in SharePoint Online, OneDrive, or Microsoft Teams.

Set up alerts for detected files


To receive notification when a file in SharePoint Online, OneDrive for Business, or Microsoft Teams has been
identified as malicious, you can set up an alert.
1. In the Office 365 Security & Compliance Center, choose Alerts > Manage alerts.
2. Choose New alert policy.
3. Specify a name for the alert. For example, you could type Malicious Files in Libraries.
4. Type a description for the alert. For example, you could type Notifies admins when malicious files are
detected in SharePoint Online, OneDrive, or Microsoft Teams.
5. In the Send this alert when... section, do the following:
a. In the Activities list, choose Detected malware in file.
b. Leave the Users field empty.
6. In the Send this alert to... section, select one or more global administrators, security administrators, or
security readers who should receive notification when a malicious file is detected.
7. Click Save.
To learn more about alerts, see Create activity alerts in the Office 365 Security & Compliance Center.

Next steps
1. View information about malicious files detected in SharePoint, OneDrive, or Microsoft Teams
2. Manage quarantined messages and files as an administrator in Office 365
View information about malicious files detected in
SharePoint, OneDrive, or Microsoft Teams
11/27/2018 • 2 minutes to read • Edit Online

Office 365 ATP for SharePoint, OneDrive, and Microsoft Teams protects your organization from malicious files in
document libraries and team sites. When a malicious file is detected, that file is blocked so that no one can open,
copy, move, or share it until further actions are taken by the organization's security team. Read this article to learn
how to view information about detected files and what actions to take.
In order to perform the tasks described in this article, you must have the necessary permissions for the Office 365
Security & Compliance Center.

View reports with information about detected files


To view status and detailed information about files that were detected by Office 365 ATP, you can use the Threat
Protection Status report.
1. In the Office 365 Security & Compliance Center, choose Reports > Dashboard > Threat Protection
Status.
2. In the upper right corner of the report, choose View details table.
3. View the list of files that were detected in the report.
4. Select an item in the list to view detailed information, including actions taken, the file name, the file path,
and more.
5. Choose the Advanced Analysis tab to view information, such as observed behavior and analysis details.

View and take action on files in quarantine


1. In the Office 365 Security & Compliance Center, choose Threat management > Review > Quarantine.
2. In the upper left corner, change the filter from Email to Content.
3. Select an item in the list to view detailed information, including the file's URL.
4. Choose an available action.
Choose Release & report to unblock the file.
Select Send report to Microsoft to report the file as a false positive to Microsoft.
Choose Download file to investigate the file further.
Choose Delete to remove the file from the list of quarantined items. If you choose this option, you must
also delete the file from its respective library in SharePoint Online, OneDrive for Business, or Microsoft
Teams. This option does not unblock a file from being opened or shared.
5. Choose Close to close the details for a selected item.
View reports for Office 365 Advanced Threat
Protection
11/27/2018 • 4 minutes to read • Edit Online

If your organization has Office 365 Advanced Threat Protection (ATP ) and you have the necessary permissions,
you can use several ATP reports in the Security & Compliance Center. (Go to Reports > Dashboard.)

ATP reports include the Threat Protection Status report, the ATP File Types report, and the ATP Message
Disposition report. This article describes the ATP reports and includes links to additional reports to view.

Threat Protection Status report


The Threat Protection Status report is a single view that brings together information about malicious content
and malicious email detected and blocked by Exchange Online Protection (EOP ) and Office 365 ATP. The
report provides an aggregated count of unique email messages with malicious content (files or website
addresses (URLs)) blocked by the anti-malware engine, zero-hour auto purge (ZAP ), and ATP features, such as
ATP Safe Links, ATP Safe Attachments, and ATP anti-phishing capabilities.

NOTE
A Threat Protection Status report is available to customers who have either Office 365 ATP or Exchange Online
Protection (EOP); however, the information that is displayed in the Threat Protection Status report for ATP customers will
likely contain different data than what EOP customers might see. For example, the Threat Protection Status report for
ATP customers will contain information about malicious files detected in SharePoint Online, OneDrive, or Microsoft
Teams. Such information is specific to ATP, so customers who have EOP but not ATP will not see those details in their
Threat Protection Status report.

To view the Threat Protection Status report, in the Security & Compliance Center, go to Reports > Dashboard
> Threat Protection Status.
To get detailed status for a day, hover over the graph.

By default, the Threat Protection Status report shows data for the past seven days. However, you can choose
Filters and change the date range to view data for up to 90 days.

You can also use the View data by menu to change what information is displayed in the report.
ATP File Types report
The ATP File Types report shows you the type of files detected as malicious by ATP Safe Attachments.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > ATP File Types.

When you hover over a particular day, you can see the breakdown of types of malicious files that were detected
by ATP Safe Attachments and anti-spam & anti-malware protection in Office 365.

ATP Message Disposition report


The ATP Message Disposition report shows you the actions that were taken for email messages that were
detected as having malicious content.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > ATP Message
Disposition.

When you hover over a bar in the chart, you can see what actions were taken for detected email for that day.

Additional reports to view


In addition to the ATP reports described in this article, several other reports are available, as described in the
following table:

REPORT TYPE LEARN MORE

Email security reports, such as a Top Senders and View email security reports in the Security & Compliance
Recipients report, a Spoof Mail report, and a Spam Center
Detections report.

Explorer (also referred to as Threat Explorer, this is included Use Explorer in the Security & Compliance Center
in Office 365 Threat Intelligence)

EOP and ATP results (This is a custom report you generate Get-MailTrafficATPReport cmdlet reference
by using PowerShell). This report contains information, such
as Domain, Date, Event Type, Direction, Action, and
Message Count.

EOP and ATP detections (This is a custom report you Get-MailDetailATPReport cmdlet reference
generate by using PowerShell). This report contains details
about malicious files or URLs, phishing attempts,
impersonation, and other potential threats in email or files.

What permissions are needed to view the ATP reports?


In order to view and use the reports described in this article, you must have an appropriate role assigned in
both the Security & Compliance Center and the Exchange Admin Center.
For the Security & Compliance Center, you must have one of the following roles assigned:
Organization Management
Security Administrator
Security Reader
For Exchange Online, you must have one of the following roles assigned:
Organization Management
View -only Organization Management
View -Only Recipients role
Compliance Management
To learn more, see the following resources:
Permissions in the Office 365 Security & Compliance Center
Feature permissions in Exchange Online

What if the reports aren't showing data?


If you are not seeing data in your ATP reports, double-check that your policies are set up correctly. Your
organization must have ATP Safe Links policies and ATP Safe Attachments policies defined in order for ATP
protection to be in place. Also see Anti-spam and anti-malware protection in Office 365.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Create a schedule for a report in the Security & Compliance Center
Set up and download a custom report in the Security & Compliance Center
Office 365 Threat Intelligence
11/27/2018 • 2 minutes to read • Edit Online

Office 365 Threat Intelligence helps security analysts and administrators protect their organization's Office 365
users by:
1. Making it easy to identify, monitor and understand attacks
2. Helping to quickly address threats in Exchange Online and SharePoint Online
3. Providing insights and knowledge to help prevent attacks against their organization

IMPORTANT
Office 365 Threat Intelligence is available in Office 365 Enterprise E5. If your organization is using another Office 365
Enterprise subscription, Office 365 Threat Intelligence can be purchased as an add-on. (As a global administrator, in the
Office 365 admin center, choose Billing > Add subscriptions.) For more information, see Office 365 Platform Service
Description: Office 365 Security & Compliance Center and Buy or edit an add-on for Office 365 for business.

What do you want to do?


In the following articles, you will learn more about the Office 365 Threat Intelligence service offering, including
how to use it to your advantage to keep your users safe.
Get started with Office 365 Threat Intelligence (this includes information about required roles)
Learn about Threat Trackers - New and Noteworthy
Find and investigate malicious email that was delivered
Use Attack Simulator (Office 365)
Integrate Office 365 Threat Intelligence with Windows Defender Advanced Threat Protection

Related topics
Protect against threats in Office 365
Office 365 Advanced Threat Protection
Permissions in the Office 365 Security & Compliance Center
Get started with Office 365 Threat Intelligence
11/16/2018 • 4 minutes to read • Edit Online

If you are part of your organization's security team, you can use Office 365 Threat Intelligence to protect your
users from attacks. Office 365 Threat Intelligence helps security analysts and administrators keep users safe by
bubbling up insights and identifying action based on what is happening in their your Office 365 environment.
These insights are based on a comprehensive repository of threat intelligence data and systems to spot patterns
that correspond to attack behaviors and suspicious activity.

Read this article to learn more about what Office 365 Threat Intelligence includes and how to get started.

What is Office 365 Threat Intelligence?


Office 365 Threat Intelligence is a collection of insights and information available in the Office 365 Security &
Compliance Center. These insights can help your organization's security team protect Office 365 users from
attacks. Office 365 Threat Intelligence monitors signals and gathers data from multiple sources, such as user
activity, authentication, email, compromised PCs, and security incidents. Business decision makers and Office 365
global administrators, security administrators, and security analysts can all use the information Office 365 Threat
Intelligence provides to understand and respond to threats against Office 365 users and intellectual property.

Get acquainted with the Threat dashboard, Explorer, and Incidents


Office 365 Threat Intelligence surfaces in the Security & Compliance Center, as a set of tools and reports,
including the Threat dashboard, Threat Explorer, and Incidents.
Threat dashboard
Use the Threat dashboard (this is also referred to as the Security dashboard) to quickly see what threats have been
addressed, and as a visual way to report to business decision makers how Office 365 services are securing your
business.
To view and use this dashboard, in the Security & Compliance Center, go to Threat management > Dashboard.
Threat Explorer
Use the Threat explorer to analyze threats, see the volume of attacks over time, and analyze data by threat families,
attacker infrastructure, and more. The Threat explorer is the starting place for any security analyst's investigation
workflow.

To view and use this report, in the Security & Compliance Center, go to Threat management > Explorer.
Incidents
Use the Incidents list to see a list of in flight security incidents. Incidents are used to track threats such as
suspicious email messages, and to conduct further investigation and remediation.

To view the list of current incidents for your organization, in the Security & Compliance Center, go to Threat
management > Review > Incidents.
Learn more about Malware & Threats
As part of the Office 365 Threat Intelligence offering, security analysts can review details about a known threat.
This is useful to determine whether there are additional preventative measures/steps that can be taken to keep
users safe.

How do we get Office 365 Threat Intelligence?


Office 365 Threat Intelligence is included in Office 365 Enterprise E5. If your organization is using another Office
365 Enterprise subscription, such as Office 365 Enterprise E3, Office 365 Threat Intelligence can be purchased as
an add-on. (As a global administrator, in the Office 365 admin center, choose Billing > Add subscriptions.) For
more information about plan options, see Office 365 Platform Service Description: Office 365 Security &
Compliance Center and Buy or edit an add-on for Office 365 for business.
1. As an Office 365 global administrator, go to https://portal.office.com and sign in using your work or school
account for Office 365.
2. Choose Admin > Billing to see what your current subscription includes.
3. If you see Office 365 Enterprise E5, then your organization has Office 365 Threat Intelligence.
If you see a different subscription, such as Office 365 Enterprise E3 or Office 365 Enterprise E1, then
you can add Office 365 Threat Intelligence. To do that, choose + Add subscription.
4. In the Office 365 admin center, choose Users > Active users.
5. Assign Office 365 Threat Intelligence licenses to users. For more information about assigning licenses, see
Assign licenses to users in Office 365 for business.
6. Assign roles to people in your organization who will be working with the Office 365 Threat Intelligence. See
Give users access to the Office 365 Security & Compliance Center, and refer to the following table:
To do this activity... You must have one of these roles

Use the Threat dashboard (or the new Security dashboard) Office 365 Global Administrator
View information about recent or current threats Security Administrator (assigned in the Security & Compliance
Center)
Security Reader (assigned in the Security & Compliance
Center)

Use the Threat Explorer (also referred to as Explorer) Office 365 Global Administrator
Analyze threats Security Administrator (assigned in the Security & Compliance
Center)
Security Reader (assigned in the Security & Compliance
Center)

View Incidents Office 365 Global Administrator


Add email messages to an incident Security Administrator (assigned in the Security & Compliance
Center)
Security Reader (assigned in the Security & Compliance
Center)

Trigger email actions in an incident Office 365 Global Administrator or Security Administrator
Find and delete suspicious email messages One of the roles above and Search and Purge (assigned in the
Security & Compliance Center)

Integrate Office 365 Threat Intelligence with Windows Office 365 Global Administrator
Defender Advanced Threat Protection Security Administrator (assigned in the Security & Compliance
Integrate Office 365 Threat Intelligence with a SIEM server Center)
Appropriate role assigned in additional applications (such as
Windows Defender Advanced Threat Protection portal or a
SIEM server)

For information about roles, role groups, and permissions, see Permissions in the Office 365 Security &
Compliance Center.

Next steps
Learn about Threat Trackers - New and Noteworthy
Find and investigate malicious email that was delivered (Office 365 Threat Intelligence)
Integrate Office 365 Threat Intelligence with Windows Defender Advanced Threat Protection
Learn about Attack Simulator
Integrate Office 365 Threat Intelligence with
Windows Defender Advanced Threat Protection
11/27/2018 • 2 minutes to read • Edit Online

If you are part of your organization's security team, you can integrate Office 365 with Windows Defender
Advanced Threat Protection (ATP ). This can help you quickly understand if users' machines are at risk when you
are investigating threats in Office 365. For example, once integration is enabled, you will be able to see a list of
machines that are used by the recipients of a detected email message, as well as how many recent alerts those
machines have in Windows Defender ATP.
The following image shows the Devices tab that you'll see when have Windows Defender ATP integration
enabled:

In this example, you can see that the recipients of the email message have four machines and one has an alert in
Windows Defender ATP. Clicking the link to a machine opens the machine page in Windows Defender ATP in a
new tab.

Requirements
Your organization must have Office 365 Threat Intelligence and Windows Defender ATP.
You must be an Office 365 global administrator or have a security administrator role assigned in the
Security & Compliance Center. (See Permissions in the Office 365 Security & Compliance Center)
You must have access to both Office 365 Threat Intelligence and the Windows Defender ATP portal.

To integrate Office 365 Threat Intelligence with Windows Defender


ATP
Integrating Office 365 Threat Intelligence with Windows Defender ATP is set up both in Office 365 and in the
Windows Defender ATP portal.
1. As an Office 365 global or a security administrator, go to https://security.microsoft.com and sign in with
your work or school account for Office 365.
2. Choose Threat management > Threat explorer.
3. On the More menu, choose WDATP Settings.
4. Select Connect to Windows ATP.
After you have changed the settings in Office 365, you must enable the connection from Windows Defender ATP.
To do that, see Use the Windows Defender Advanced Threat Protection portal.

Related topics
Office 365 Threat Intelligence
Office 365 Advanced Threat Protection
Attack Simulator in Office 365
11/27/2018 • 5 minutes to read • Edit Online

Summary If you are an Office 365 global administrator and your organization has Office 365 Threat Intelligence,
you can use Attack Simulator to run realistic attack scenarios in your organization. This can help you identify and
find vulnerable users before a real attack impacts your bottom line. Read this article to learn more.

The Attacks
Three kinds of attack simulations are currently available:
Display name spear-phishing attack
Password-spray attack
Brute-force password attack
For an attack to be successfully launched, you use multi-factor authentication on the account you are using to run
simulated attacks. In addition, you must be an Office 365 global administrator.

NOTE
Support for Conditional Access is coming soon.

To access Attack Simulator, in the Security & Compliance Center, choose Threat management > Attack
simulator.

Before you begin...


Make sure that you and your organization meet the following requirements for Attack Simulator:
Your organization's email is hosted in Exchange Online. (Attack Simulator is not available for on-premises
email servers.)
You are an Office 365 global administrator
Your organization is using Multi-factor authentication for Office 365 users
Your organization has Office 365 Threat Intelligence, with Attack Simulator visible in the Security &
Compliance Center (go to Threat management > Attack simulator)
Display name spear-phishing attack
Phishing is a generic term for a broad suite of attacks classed as a social engineering style attack. This attack is
focused on spear phishing, a more targeted attack that is aimed at a specific group of individuals or an
organization. Typically, a customized attack with some reconnaissance performed and using a display name that
will generate trust in the recipient, such as an email message that looks like it came from an executive within your
organization.
This attack focuses on letting you manipulate who the message appears to have originated from by changing the
display name and source address. When spear-phishing attacks are successful, cybercriminals gain access to users'
credentials.
To simulate a spear-phishing attack

You can craft the rich HTML editor directly in the Email body field itself or work with HTML source. There are two
important fields for inclusion in the HTML:
1. In the Security & Compliance Center, choose Threat management > Attack simulator.
2. Specify a meaningful campaign name for the attack or select a template.

3. Specify the target recipients. This can be individuals or groups in your organization. Each targeted recipient
must have an Exchange Online Mailbox in order for the attack to be successful.

4. Configure the Phishing email details.

The HTML formatting can be as complex or basic as your campaign needs. As the email format is HTML,
you can insert images and text to enhance believability. You have control on what the received message will
look like in the receiving email client.
5. Specify text for the From (Name) field. This is the field that shows in the Display Name in the receiving
email client.
6. Specify text or the From field. This is the field that shows as the email address of the sender in the receiving
email client.
You can enter an existing email namespace within your organization (doing this will make the email address
actually resolve in the receiving client, facilitating a very high trust model), or you can enter an external
email address. The email address that you specify does not have to actually exist, but it does need to
following the format of a valid SMTP address, such as user@domainname.extension.
7. Using the drop-down selector, select a Phishing Login server URL that reflects the type of content you will
have within your attack. Several themed URLs are provided for you to choose from, such as document
delivery, technical, payroll etc. This is effectively the URL that targeted users are asked to click.
8. Specify a custom landing page URL. Using this will redirect users to a URL you specify at the end of a
successful attack. If you have internal awareness training, for example, you can specify that here.
9. Specify text for the Subject field. This is the field that shows as the Subject Name in the receiving email
client.
10. Compose the Email body that the target will receive.
${username} inserts the targets name into the Email body.
${loginserverurl} inserts the URL we want target users to click

11. Choose Next, then Finish to launch the attack. The spear phishing email message is delivered to your
target recipients' mailboxes.

Password-spray attack
A password spray attack against an organization is typically used after a bad actor has successfully acquired a list
of valid users from the tenant. The bad actor knows about common passwords that people use. This is a widely
used attack, as it is a cheap attack to run, and harder to detect than brute force approaches.
This attack focuses on letting you specify a common password against a large target base of users.
To simulate a password-spray attack
1. In the Security & Compliance Center, choose Threat management > Attack simulator.
2. Specify a meaningful campaign name for the attack.
3. Specify the target recipients. This can be individuals or groups in your organization. A targeted recipient
must have an Exchange Online Mailbox in order for the attack to be successful.
4. Specify a password to use for the attack. For example, one common, relevant password you could try is
Fall2017 . Another might be Spring2018 , or Password1 .

5. Choose Finish to launch the attack.

Brute-force password attack


A brute-force password attack against an organization is typically used after a bad actor has successfully acquired
a list of key users from the tenant. This attack focuses on trying a set of passwords on a single user's account.
To simulate a brute -force password attack
1. In the Security & Compliance Center, choose Threat management > Attack simulator.
2. Specify a meaningful campaign name for the attack.
3. Specify the target recipient. A targeted recipient must have an Exchange Online Mailbox in order for the
attack to be successful.
4. Specify a set of passwords to use for the attack. You can use a text (.txt) file for your list of passwords. The
text file cannot exceed 10 MB in file size. Use one password per line, and make sure to include a hard return
after the last password in your list.
5. Choose Finish to launch the attack.

New features in Attack Simulator


New features are being added to Attack Simulator. These include:
Advanced reporting capabilities. You'll be able to see data such as the fastest (or slowest) time to open an
attack simulation email message, the fastest (or slowest) time to click a link in the message, and more.
Email template editor. You can create a custom, reusable email template that you can use for future attack
simulations.
Visit the Microsoft 365 Roadmap to see what's in development, what's rolling out, and what's already launched.
SIEM integration with Office 365 Threat Intelligence
and Advanced Threat Protection
9/23/2018 • 2 minutes to read • Edit Online

If your organization is using a security incident and event management (SIEM ) server, you can integrate Office 365
Threat Intelligence and Advanced Threat Protection with your SIEM server. SIEM integration enables you to view
information, such as malware detected by Office 365 Advanced Protection and Threat Intelligence, in your SIEM
server reports. To set up SIEM integration, you use the Office 365 Activity Management API.
The Office 365 Activity Management API retrieves information about user, admin, system, and policy actions and
events from your organization's Office 365 and Azure Active Directory activity logs. The Office 365 Advanced
Threat Protection and Threat Intelligence schema works with Threat Intelligence and/or Advanced Threat
Protection, so if your organization has Advanced Threat Protection but not Threat Intelligence (or vice versa), you
can still use that same API for your SIEM server integration.
The SIEM server or other similar system should poll the audit.general workload to access detection events. To
learn more see Get started with Office 365 Management APIs.

IMPORTANT
You must be an Office 365 global administrator or have the security administrator role assigned in the Security & Compliance
Center to set up SIEM integration with Office 365 Threat Intelligence and Advanced Threat Protection.
Audit logging must be turned on for your Office 365 environment. To get help with this, see Turn Office 365 audit log search
on or off.

Related topics
Office 365 Threat Intelligence
Office 365 Advanced Threat Protection
Smart reports and insights in the Office 365 Security & Compliance Center
Permissions in the Office 365 Security & Compliance Center
Keep your Office 365 users safe with Office 365
Threat Intelligence
11/27/2018 • 3 minutes to read • Edit Online

Overview
Do you know which of your Office 365 users are under attack, or worse - compromised? Do know how to mitigate
and recover from attacks that are targeting your users? Did you know you can do exactly this with security
capabilities that are already available to you in Office 365?
Office 365 Threat Intelligence is a suite of capabilities included in your Office 365 E5 subscription. Office 365
Threat Intelligence has helped Microsoft IT reduce average time to resolution for social engineering incidents by
80%, and increased case throughput by 37% per month compared to the previous 2 quarters!
We've recently added new capabilities to help improve how you can detect and recover from threats! Here's a
quick walk through of how the updated Threat Intelligence service can make you even more efficient.

Detect intrusions and threats


Explorer (also referred to as Threat Explorer) helps security admins and analysts identify and understand threats
that are active in your enterprise because even the most complex security settings can be circumvented by
seemingly innocuous user configurations like safe sender whitelists. Explorer helps Office 365 global or security
admins quickly determine whether users have been compromised by threats such as malware or phish. This helps
prioritize which users are most at risk for a threat and the requisite response.
Explorer also helps admins navigate the relationships between users and mail. Know of a particular mail that was
bad? Search for it to see what users received the mail, then follow the series of events and see what those users in
turn have done.
If you don't already have Threat Intelligence, try it now! And learn more about Office 365 Threat Intelligence.

Quickly mitigate and recover from threats


Once security admins have identified something suspicious or malicious happening in their tenant, they can quickly
contain and respond to that threat with the Incident Framework. Group unwanted messages with one-click and
quickly remove the email messages from your user's mailboxes.
UPDATE: We've recently added the ability to delete (soft or hard delete) emails directly from the Incident
Framework. Previously administrators could only move mails to a user's junk folder, where users could recover the
item. With the newly released Delete capabilities, you can now be sure that a malicious or unwanted mail is
removed permanently.
If you don't already have Threat Intelligence, try it now! And learn more about Office 365 Threat Intelligence.

Leverage the threat telemetry of Microsoft


Office 365 Threat Intelligence is powered with data from the Microsoft Intelligent Security Graph. The graph
acquires the latest threat signal from over 1 billion Windows devices, 450 billion monthly Azure logins, and 400
billion monthly email messages in Office 365. This unrivaled threat signal is what gives the broad visibility into a
customer tenant that is crucial for admins and security analysts to have a complete view of the threats impacting
their organization.

More to come
These are just some examples of how Office 365 Threat Intelligence helps you secure your enterprise! In the
coming weeks we are adding significant enhancements to the product including:
Providing insight into potentially risky actions taken on Exchange Online email and SharePoint Online
documents
Providing insight into malicious phishing email messages that have been sent to users, including some that
have may have been received and read by users before they were weaponized
Increasing the set of actions admins can take to respond to incidents

Why Threat Intelligence?


Gartner estimates that in 2017 alone over $90B was spent on cybersecurity. Sid Deshpande, principal research
analyst at Gartner, is quoted as saying that "the industry's shift to detection and response … sends a clear message
that prevention is futile unless it is tied into a detection and response capability." Threat Intelligence is a critical part
of every enterprise's portfolio of services, and can be consumed as standalone service or as part of Office 365 E5.

What's Next
Learn more about Office 365 Threat Intelligence in this recorded session: Stay Ahead of the Cyberattacks
with Office 365 Threat Intelligence
Try out Office 365 Threat Intelligence now or begin your Office E5 trial today!
Threat Trackers - New and Noteworthy
11/27/2018 • 5 minutes to read • Edit Online

Office 365 Threat Intelligence enables your organization's security team to discover and take action against
cybersecurity threats. Beginning in late March 2018 and over the next several weeks, Office 365 Threat
Intelligence will include new Threat Tracker features, including Noteworthy trackers. Read this article to get an
overview of these new features and next steps.

What are Threat Trackers?


Threat Trackers are informative widgets and views that provide you with intelligence on different cybersecurity
issues that might impact your company. For example, you can view information about trending malware
campaigns using Threat Trackers.

Most tracker pages include trending numbers that are updated periodically, widgets to help you understand which
issues are the biggest or have grown the most, and a quick link in the Actions column that takes you to Explorer,
where you can view more detailed information.

Trackers are just a few of the many great features you get with Office 365 Threat Intelligence. When available, your
new Threat Trackers will include Noteworthy trackers, Trending trackers, Tracked queries, and Saved queries.
To view and use your Threat Trackers when they are available for your organization, go to the Security &
Compliance Center (https://security.microsoft.com) and choose Threat management > Threat tracker.
NOTE
To use Threat Trackers, you must be an Office 365 global administrator, security administrator, or security reader. See
Permissions in the Office 365 Security & Compliance Center.

Noteworthy trackers
Noteworthy trackers are where you'll find big and smaller threats and risks that we think you should know about.
Noteworthy trackers help you find whether these issues exist in your Office 365 environment, plus link to articles
(like this one) that give you more details on what is happening, and how they'll impact your organization's use of
Office 365. Whether it's a big new threat (e.g. Wannacry, Petya) or an existing threat that might create some new
challenges (like our other inaugural Noteworthy item - Nemucod), this is where you'll find important new items
you and your security team should review and examine periodically.
Typically Noteworthy trackers will be posted for just a couple of weeks when we identify new threats and think you
might need the extra visibility that this feature provides. Once the biggest risk for a threat has passed, we'll remove
that Noteworthy item. This way, we can keep the list fresh and up to date with other relevant new items.
Trending trackers
Trending trackers (formerly called Campaigns) highlight new threats that haven't been seen in your organization's
email in the past week.

Trending trackers give you an idea of new threats you should review to ensure your broader corporate
environment is prepared against attacks.
Tracked queries
Tracked queries leverage your saved queries to periodically assess Office 365 activity in your organization. This
gives you event trending, with more to come in the coming months. Tracked queries run automatically, giving you
up-to-date information without having to remember to re-run your queries.

Saved queries
Saved queries are also found in the Trackers section. You can use Saved queries to store the common Explorer
searches that you want to get back to quicker and repeatedly, without having to re-create the search every time.
You can always save a Noteworthy tracker query or any of your own Explorer queries using the Save query
button at the top of the Explorer page. Anything saved there will show up in the Saved queries list on the Tracker
page.

Trackers and Explorer


Whether you're reviewing email, content, or Office activities (coming soon), Explorer and Trackers work together to
help you investigate and track security risks and threats. All together, Trackers provide you with information to
protect your Office 365 users by highlighting new, notable, and frequently searched issues - ensuring your
business is better protected as it moves to the cloud.
When Threat Trackers are available to you, please try them out - and remember that you can always provide us
feedback on this or other Office 365 security features by clicking on the Feedback button in the lower right corner
of the Overview of the Office 365 Security & Compliance Center.

Trackers and Office 365 Advanced Threat Protection


With our inaugural Noteworthy threat, we're highlighting advanced malware threats detected by Office 365 ATP
Safe Attachments. If you're an Office 365 Enterprise E5 customer and you're not usingOffice 365 Advanced
Threat Protection (ATP ), you should be - it's included in your subscription. ATP provides value even if you have
other security tools filtering email flow with your Office 365 services. However, anti-spam and Office 365 ATP safe
links features work best when your main email security solution is through Office 365.
In today's threat-riddled world, running only traditional anti-malware scans means you are not protected well
enough against attacks. Today's more sophisticated attackers use commonly available tools to create new,
obfuscated, or delayed attacks that won't be recognized by traditional signature-based anti-malware engines. The
ATP Safe Attachments feature takes email attachments and detonates them in a virtual environment to determine
whether they're safe or malicious. This detonation process opens each file in a virtual computer environment, then
watches what happens after the file is opened. Whether it's a PDF, and compressed file, or an Office document,
malicious code can be hidden in a file, activating only once the victim opens it on their computer. By detonating
and analyzing the file in the email flow, Office 365 ATP capabilities finds these threats based on behaviors, file
reputation, and a number of heuristic rules.
The new Noteworthy threat filter highlights items that were recently detected through ATP Safe Attachments.
These detections represent items that are new malicious files, not previously found by Office 365 in either your
email flow or other customers' email. Pay attention to the items in the Noteworthy Threat Tracker, see who was
targeted by them, and review the detonation details shown on the Advanced Analysis tab (found by clicking on the
subject of the email in Explorer). Note you'll only find this tab on emails detected by the ATP Safe Attachments
capability - this Noteworthy tracker includes that filter, but you can also use that filter for other searches in
Explorer.

Next steps
If your organization doesn't already have Office 365 Threat Intelligence, see How do we get Office 365
Threat Intelligence?.
Make sure that your security team has the correct roles and permissions assigned. You must be an Office
365 global administrator, or have the Security Administrator or Search and Purge role assigned in the
Security & Compliance Center. See Permissions in the Office 365 Security & Compliance Center.
Watch for the new Trackers to show up in your Office 365 environment. When available, you'll find your
Trackers here. Go to Threat management > Threat trackers.
If you haven't already done so, learn more about and configure Office 365 Advanced Threat Protection for
your organization, including Office 365 ATP safe links and Office 365 ATP Safe Attachments.
Use Explorer in the Security & Compliance Center
11/26/2018 • 4 minutes to read • Edit Online

If your organization has Office 365 Threat Intelligence, and you have the necessary permissions, you can use
Explorer to identify and analyze threats. For example, you can identify and delete malicious email that was
delivered, or see malware that was caught by Office 365 security features. Explorer (also referred to as Threat
Explorer) is a powerful near real-time report in the Security & Compliance Center.

To use Explorer, in the Security & Compliance Center, go to Threat management > Explorer.

Explorer overview
Explorer displays information about suspected malware in email and files in Office 365, as well as other security
threats and risks to your organization. When you first open Explorer, the default view shows malware detections
from antivirus for the past 7 days. Explorer can also show security protection features in Office 365, including
Safe Links and Safe Attachments and can be modified to show data for the past 30 days.

Use the View menu to change what information is displayed.


Explorer has several filtering and querying capabilities that enable you to drill into details, such as top targeted
users, top malware families, and more. Each kind of report offers a variety of ways to view and explore data.

IMPORTANT
Do not use wildcard characters, such as an asterisk (*) or a question mark (?), with Explorer. When you search on the
Subject field for email messages, Explorer will perform partial matching and yield results similar to a wildcard search.

Email > Malware


This view shows email messages identified as containing malware.
View information in the chart by malware family, sender domain, sender IP, protection status (actions taken by
your threat protection features and policies in Office 365), and detection technology (how the malware was
detected).

Below the chart, view details about top malware families, top targeted users, and more details about specific
messages.

Email > Phish


This view shows email messages identified as phishing attempts.
View information by sender domain, sender IP, and protection status (actions taken by your threat protection
features and policies in Office 365).
Below the chart, view more details about specific messages.

Email > User-reported


This view shows email that users have reported as junk, not junk, or phishing email.
View information by report type (the user's determination that the email was junk, not junk, or phish), and by
delivery reason (reasons why email went to a specific location, such as a spam filter policy, a mail flow rule, a
blocked-senders list, a safe-senders list, etc.).

Below the chart, view more details about specific email messages, such as subject line, the sender's IP address,
the user that reported the message as junk, not junk, or phish, and more.

Email > All mail


This views shows an all-up view of email activity, including email identified as malicious due to phishing or
malware, as well all non-malicious mail (normal email, spam, and bulk mail).

NOTE
If you get an error that reads Too much data to display, add a filter and, if necessary, narrow the date range you're
viewing.

To apply a filter, choose Sender, select an item in the list, and then click the Refresh button. In our example, we
used Detection technology as a filter (there are several options available). View information by sender, sender's
domain, recipients, subject, attachment filename, malware family, protection status (actions taken by your threat
protection features and policies in Office 365), detection technology (how the malware was detected), and more.
Below the chart, view more details about specific email messages, such as subject line, recipient, sender, status,
and so on.

Content > Malware


This view shows files that were identified as malicious in SharePoint Online, OneDrive for Business, and
Microsoft Teams.
View information by malware family, detection technology (how the malware was detected), and workload
(OneDrive, SharePoint, or Teams).

Below the chart, view more details about specific files, such as attachment filename, workload, file size, who last
modified the file, and more.

(New!) Click-to-filter capabilities


New to Explorer is the ability to click to filter. Beginning in late May 2018, when you click an item in the legend,
that item becomes a filter for the report. For example, suppose we are looking at the Malware view in Explorer:

Clicking ATP Detonation in this chart results in a view like this:


In this view, we are now looking at data for files that were detonated by Office 365 ATP Safe Attachments. Below
the chart, we can see details about specific email messages that had attachments that were detected by ATP Safe
Attachments.

Selecting one or more items activates the Actions menu, which offers several choices from which to choose for
the selected item(s).

The ability to filter in a click and navigate to specific details can save you a lot of time in investigating threats.

How do I get Explorer?


Explorer is included in Office 365 Threat Intelligence.
You must have appropriate permissions, such as those granted to a security administrator or security reader, in
order to view and use Explorer. To learn more, see Permissions in the Office 365 Security & Compliance Center.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Find and investigate malicious email that was delivered (Office 365 Threat Intelligence)
Anti-spam and anti-malware protection in Office 365
Overview of Office 365 Cloud App Security
12/3/2018 • 4 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

You are here! Start planning Start deploying Start utilizing


Next step

NOTE
Office 365 Cloud App Security is available in Office 365 Enterprise E5. If your organization is using another Office 365
Enterprise subscription, Office 365 Cloud App Security can be purchased as an add-on. (As a global administrator, in the
Office 365 admin center, choose Billing > Add subscriptions.) For more information, see Office 365 Platform Service
Description: Office 365 Security & Compliance Center and Buy or edit an add-on for Office 365 for business.

Office 365 Cloud App Security gives you insight into suspicious activity in Office 365 so you can investigate
situations that are potentially problematic and, if needed, take action to address security issues. With Office 365
Cloud App Security, you can receive notifications of triggered alerts for atypical or suspicious activities, see how
your organization's data in Office 365 is accessed and used, suspend user accounts exhibiting suspicious activity,
and require users to log back in to Office 365 apps after an alert has been triggered. Read this article to get an
overview of Office 365 Cloud App Security features and capabilities.

How to find the Office 365 Cloud App Security portal


NOTE
To access the Office 365 Cloud App Security portal, you must be a global administrator, security administrator, or security
reader. To learn more, see Permissions in the Office 365 Security & Compliance Center.

You can get to the Office 365 Cloud App Security portal through the Office 365 Security & Compliance Center.
Here's one good way to do it:
1. Go to https://security.microsoft.com and sign in using your work or school account for Office 365. (This
takes you to the Security & Compliance Center.)
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
(If Office 365 Cloud App Security is not yet enabled, and you are a global administrator, turn on Office
365 Cloud App Security.)
3. Choose Go to Office 365 Cloud App Security.

Policies
Office 365 Cloud App Security works with the policies that are defined for your organization. With Office 365
Cloud App Security, your organization gets many predefined anomaly detection policies and several templates
for activity policies. These policies are designed to detect general anomalies, identify users logging in from a
risky IP address, detect ransomware activities, detect administrator activities from non-corporate IP addresses,
and more.

To view/use policy templates, in the Office 365 Cloud App Security portal, go to Control > Templates.

To learn more about policies, see the following resources:


Activity policies and alerts in Office 365 Cloud App Security
Anomaly detection policies in Office 365 Cloud App Security
Alerts
When policies are defined, alerts notify you about suspicious or atypical activities that were detected. To view
alerts for your organization, choose Alerts in the navigation bar across the top of the screen.

As alerts are triggered you can review them to learn more about what is going on. Then, if the activity is still
suspicious, you can take action. For example, you can notify a user about an issue, suspend a user from signing
in to Office 365, or require a user to sign back in to Office 365 apps.
To learn more about alerts, see the following resources:
Activity policies and alerts in Office 365 Cloud App Security
Anomaly detection policies in Office 365 Cloud App Security
Review and take action on Office 365 Cloud App Security alerts

Activity logs
View information about user activities on your Activity log page in Office 365 Cloud App Security.

To get to this page, in the Office 365 Cloud App Security portal, go to Investigate > Activity log.

You can use your web traffic logs with Office 365 Cloud App Security, too. The more details that are included in
those log files, the better visibility you'll have into user activity. You can use log files from Barracuda, Blue Coat,
Check Point, Cisco, Clavister, Dell SonicWALL, Fortinet, Juniper, McAfee, Microsoft, Palo Alto, Sophos, Squid,
Websence, Zscaler, and more.
Learn about web traffic logs and data sources for Office 365 Cloud App Security

OAuth apps
With Office 365 Cloud App Security, you can allow or prevent people in your organization to use third-party
apps that access data in Office 365.

To get to this page, go to Investigate > OAuth apps.

Manage OAuth apps using Office 365 Cloud App Security

Cloud Discovery Dashboard


The Cloud Discovery Dashboard, also referred to as Productivity App Discovery, shows information about
cloud app usage within your organization. You can view information about apps, users, traffic, transactions, and
more using this dashboard. The Cloud Discovery Dashboard resembles the following image:

To get to this dashboard, in the Office 365 Cloud App Security portal, go to Discover > Cloud Discovery
dashboard.
Review app discovery findings in Office 365 Cloud App Security

Next steps
Get the Office 365 Cloud App Security Use Cases and Usage Guide
Get ready for Office 365 Cloud App Security
What is new in Office 365 Cloud App Security
12/3/2018 • 9 minutes to read • Edit Online

Summary Read this article to get a quick overview of updates and new features in Office 365 Cloud App Security
(formerly known as Office 365 Advanced Security Management), which is powered by Microsoft Cloud App
Security.

TIP
This article is updated frequently, as features are added or improved. Office 365 Cloud App Security updates are released
approximately two weeks after Microsoft Cloud App Security updates, and not all Microsoft Cloud App Security updates
apply to Office 365 Cloud App Security. In addition, new features might take a week or more after their release date to show
up in your Office 365 Cloud App Security environment.

Office 365 Cloud App Security release 137


Releases December 8, 2018
Following Microsoft Cloud App Security release 137:
Added support for Dynamics Cloud App Security now includes support for the Microsoft Dynamics
activities that are supported in the Office 365 audit log.
Heads up – new terminology! The name of the App permissions capabilities was changed for clarity – it is
now called OAuth apps.

Office 365 Cloud App Security release 136


Released November 25, 2018
Following Microsoft Cloud App Security release 136:
Cloud Discovery updates The custom log parser was enhanced to support additional and more complex
web traffic logs formats. As part of these enhancements users can now input custom headers for headerless
CSV log files, use special delimiters for key-value files, process Syslog file format, and more.
New anomaly detection policy: Suspicious inbox manipulation rules This policy profiles your
environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a
user's inbox. This may indicate that the user’s account is compromised, that messages are being
intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization.
Support for groups in app permission policies Cloud App Security now gives you the ability to define
app permission policies more granularly, based on the group memberships of the users who authorized the
apps. For example, an admin can decide to set a policy that revokes uncommon apps if they ask for high
permissions, only if the user who authorized the permissions is a member of the administrators group.

Office 365 Cloud App Security releases 133, 134, and 135
Released in October-November, 2018
Following Microsoft Cloud App Security release 133, 134, and 135:
New anomaly detection policies are rolling out gradually:
The new Data exfiltration to unsanctioned apps policy is automatically enabled to alert you when
a user or IP address uses an app that isn't sanctioned to perform an activity that resembles an
attempt to exfiltrate information from your organization.
The new Multiple delete VM activities policy profiles your environment and triggers alerts when
users delete multiple VMs in a single session, relative to the baseline in your organization.
Cloud Discovery support for i-Filter The Cloud App Security Cloud Discovery feature now has enhanced
support for the i-Filter syslog parser.

Office 365 Cloud App Security release 131


Released September 16, 2018
Following Microsoft Cloud App Security release 131:
Automatically revoke permissions on risky OAuth apps You can now control which OAuth apps your
users have access to, by revoking app permission for OAuth apps on Office. When creating an App
permission policy, you can now set the policy to revoke an app’s permission.
Cloud Discovery additional built-in parser supported Cloud Discovery now supports the Forcepoint
Web Security Cloud log format.

Office 365 Cloud App Security release 130


Released September 5, 2018
Following Microsoft Cloud App Security release 130:
New menu bar To provide a more consistent admin experience across Microsoft 365 products, and to
enable you to pivot more easily between Microsoft security solutions, the Cloud App Security portal menu
bar has moved to the left side of the screen. This consistent navigation experience helps you orient yourself
when moving from one Microsoft security portal to another.

Impact OAuth app score You can now send the Cloud App Security team feedback to let us know if there’s
an OAuth app discovered in your organization that seems malicious. This new feature enables you to be
part of our security community and enhance OAuth app risk score and analysis. For more information see
Manage OAuth apps.
New Cloud Discovery parsers The Cloud Discovery parsers now support iboss Secure Cloud Gateway
and Sophos XG.

Office 365 Cloud App Security release 128


Released August 5, 2018
Following Microsoft Cloud App Security release 128:
OAuth apps across multiple apps For OAuth apps, you can now ban or approve multiple apps in a single
action. For example, you can review all the apps that have been granted permission by users in your
organization, select all the apps you want to ban, and then click ban apps to revoke all consent granted and
will no longer allow users to grant permission to those apps.
New suggested query: GDPR ready There is a new suggested query to enable you to identify discovered
apps that are GDPR ready. GDPR has recently became a top priority for security admins. This query helps
you easily identify apps that are GDPR ready, and mitigate threat by assessing the risk of the apps that
aren't.

Office 365 Cloud App Security release 126


Released July 7, 2018
Following Microsoft Cloud App Security release 126:
Automated remediation for suspicious activities You can now set automatic remediation actions for
suspicious session triggered by the anomaly detection policies. This enhancement enables you to be alerted
instantly when a breach occurs and apply governance actions automatically, such as suspend user. For more
information, see Anomaly detection policies in Office 365 Cloud App Security.
Automated detection of risky OAuth Apps In addition to the existing investigate of OAuth apps
connected to your environment, Office 365 Cloud App Security now allows you to set automated
notifications to let you know when an OAuth app meets certain criteria. For example, you can automatically
be alerted when there are apps that require a high permission level and were authorized by more than 50
users. For more information, see Manage OAuth apps using Office 365 Cloud App Security.
Managed Security Service Provider management (MSSP ) support Office 365 Cloud App Security
now provides a better management experience to MSSPs, and allows you to configure external partners as
administrators with any of the roles currently available in Office 365 Cloud App Security. In addition,
Administrators with access rights to more than one tenant can now easily pivot between the tenants.

Office 365 Cloud App Security release 124


Released June 10, 2018
Following Microsoft Cloud App Security release 124:
Scoped deployments Enterprise organizations can granularly determine which users to monitor and
protect based on group membership. This feature enables you to select users whose activities will not show
up for any of the protected applications. Scoped monitoring is especially useful for compliance and
licensing. Some compliance regulations necessitate that you refrain from monitoring users from certain
countries due to local regulations. And, you can monitor fewer users to stay within the limits of your Office
365 Cloud App Security licenses.
New email server The email server for Office 365 Cloud App Security has changed and uses different IP
address ranges. To make sure you can get notifications, add the new IP addresses to your anti-spam
whitelist. For organizations who customize their notifications, Cloud App Security enables this for you using
MailChimp, a third-party email service. For the list of mail server IP addresses, and instructions for enabling
work with MailChimp, see Network requirements (Microsoft Cloud App Security) and Mail settings
(Microsoft Cloud App Security).

Office 365 Cloud App Security release 121


Released May 6, 2018
Following Microsoft Cloud App Security release 121:
Anomaly detection policy improvements. Office 365 Cloud App Security's anomaly detection policies
have been improved to include two new types of threat detection that are gradually rolling out:
Ransomware activity. Ransomware detection capabilities are extended with anomaly detection to
give you more comprehensive coverage against sophisticated ransomware attacks.
Terminated user activity. Terminated user activity enables you to monitor the accounts of
terminated users who may have been de-provisioned from corporate applications, but who might still
have access to certain corporate resources.
To view your Anomaly detection policies, in the Office 365 Cloud App Security portal, choose
Control > Policies.

Office 365 Cloud App Security release 120


Released April 22, 2018
Following Microsoft Cloud App Security release 120:
Internal applications as user activities. For Office 365 and Azure Active Directory (Azure AD ), we are
now gradually rolling out the ability to detect internal applications as user account activities performed by
the Office 365 and Azure AD applications (both internal and external). This enables you to create policies to
alert you if an application performs unexpected and unauthorized activities.
More fields in OAuth apps list export. When exporting an OAuth apps list to csv, additional fields such as
publisher, permissions level and community usage are included to assist with the compliance and
investigation process.

Office 365 Cloud App Security release 119


Released April 1, 2018
Following Microsoft Cloud App Security release 119:
Improvements to Cloud Discovery. The Cloud Discovery provides more information about top users and
IP addresses, making it easier to view usage details about Office 365 and other apps. To learn more, see
Review app discovery findings in Office 365 Cloud App Security.

Office 365 Cloud App Security release 118


Released March 18, 2018
Following Microsoft Cloud App Security release 118:
Barracuda support. Cloud Discovery now supports Barracuda F Series firewalls and Barracuda F -Series
firewall web log streaming.

Office 365 Cloud App Security release 117


Released March 6, 2018
Following Microsoft Cloud App Security release 117:
i-FILTER support. Cloud Discovery now supports i-FILTER.

Office 365 Cloud App Security release 116


Released February 18, 2018
Following Microsoft Cloud App Security release 116:
Anomaly detection policy enhancements. Anomaly detection polices in Office 365 Cloud App Security
were enhanced with new scenario-based detections including impossible travel, activity from a suspicious IP
address and multiple failed login attempts. The new policies are automatically enabled, providing out-of-
the-box threat detection across your cloud environment. In addition, the new policies expose more data
from the Office 365 Cloud App Security detection engine, which can help speed up the investigation process
and contain ongoing threats. To learn more, see the Microsoft Cloud App Security article, Get instantaneous
behavioral analytics and anomaly detection.
Log parser support for Checkpoint formats. The Cloud Discovery log parsers now support two
additional Checkpoint formats: XML, and KPC.

Office 365 Cloud App Security release 114


Released January 21, 2018
Following Microsoft Cloud App Security release 114:
Service status. You can now check the current Office 365 Cloud App Security service status by going to
Help > System status.

Custom queries for Activity log. Beginning in version 114, the ability to create and save custom queries
in the Activity log is rolling out gradually. Custom queries enable you to create filter templates that can be
reused for deep-dive investigation. In addition, suggested queries have been added to provide out-of-the-
box investigation templates to filter your activities and discovered apps. Suggested queries include custom
filters to identify risks such as impersonation activities, administrator activities, risky non-compliant cloud
storage apps, enterprise apps with weak encryption, and security risks. Use the suggested queries as a
starting point, modify them as needed, and then save them as a new query.

Office 365 Cloud App Security release 113


Released January 8, 2018
Following Microsoft Cloud App Security release 113:
Log parser support for generic formats. The Cloud Discovery log parsers now support the following generic
formats: LEEF, CEF, and W3C.

Releases prior to 113


See the 2017 updates for Office 365 Cloud App Security
Office 365 Cloud App Security updates during 2017
12/3/2018 • 2 minutes to read • Edit Online

Office 365 Cloud App Security release 112


Released December 24, 2017
Following Microsoft Cloud App Security release 112:
Relevant insight drawer. In the Activity log, you can now access the relevant insight drawer by clicking on
a user name or IP address.

Ability to view more activities with a click. In the relevant insight drawer, you can click the clock icon to
view all activities performed within 48 hours of a selected activity.

Log parser improvements for Juniper SRX. Improvements were made to the Cloud Discovery log parser
for Juniper SRX.

Office 365 Cloud App Security release 111


Released December 10, 2017
Following Microsoft Cloud App Security release 111:
Time filter improvements. Time filters are now easier to use. To access a time filter, in a view, such as
Activity log, Policies, Alerts, using the Advanced view, choose Date in the list of filters. Then choose an
option, such as before, after, or in between to apply the time filter.
Office 365 Cloud App Security release 110
Released November 26, 2017
Following Microsoft Cloud App Security release 110:
SIEM server integration now generally available. Connect your SIEM server to Office 365 Cloud App
Security. You can now send alerts and activities automatically to your SIEM server of choice by configuring
SIEM Agents. See Integrate your SIEM server with Office 365 Cloud App Security.
Easier access to help content. Using the new question mark in the upper right corner, you can now access
the help content from within the pages of the Office 365 Cloud App Security portal. Each link is context-
sensitive, taking you to the information you need, based on the page you're on.
Send us feedback. Using the smiley face in the upper right corner, you can now send feedback from every
page of the Office 365 Cloud App Security portal. This enables you to report bugs, request new features
and share your experience directly with the Office 365 Cloud App Security team.

Office 365 Cloud App Security release 102


Released August 13, 2017
Following Microsoft Cloud App Security release 102:
New user investigation actions enable an added level of drill-down to user investigations. On an Investigate
page, you can hover on an activity, user, or account and apply it as a filter, and from there, you can view related
activities or events.

Office 365 Cloud App Security release 100


Released July 17, 2017
Following Microsoft Cloud App Security release 100:
Security extensions is a new dashboard where you can centrally manage all your security extensions for
Office 365 Cloud App Security, including API tokens and SIEM agents. To view the Security extensions
dashboard, follow these steps:
1. Go to https://protection.office.com and sign in using your work or school account for Office 365. (This takes
you to the Security & Compliance Center.)
2. Go to Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.

4. Choose Settings > Security extensions.


Improved parsing. Improvements were made in the Cloud Discovery log parsing mechanism. Internal
errors are significantly less likely to occur.
Expected log formats. The expected log format for Cloud Discovery logs now provides examples for both
Syslog format and FTP format.

Related topics
Office 365 Cloud App Security help content
Utilization activities after rolling out Office 365 Cloud App Security
Permissions in the Office 365 Security & Compliance Center
Get ready for Office 365 Cloud App Security
12/3/2018 • 3 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating You are here! Start deploying Start utilizing


Next step

As you prepare to turn on and implement Office 365 Cloud App Security (formerly known as Advanced Security
Management) for your organization, there are a few things to take into account. Use this article as a guide to
plan for Office 365 Cloud App Security.

Step 1: Identify and protect your global and security administrator


accounts
Global administrators, security administrators, and security readers can access the Office 365 Cloud App
Security portal to view policies, review alerts, and use reports. Global administrators and security administrators
can define policies and take other actions to protect your organization. (For more information, see Permissions
in the Office 365 Security & Compliance Center.) Review your organization's user accounts that have elevated
permissions as a precaution.
Protect your Office 365 global administrator accounts.

Step 2: Turn on audit logging for your organization


In order for Office 365 Cloud App Security to work correct, audit logging must be turned on. This is typically
done by an Exchange Online administrator or a global administrator.
Turn Office 365 audit log search on or off.

Step 3: Go to the Office 365 Cloud App Security portal


1. Go to https://protection.office.com and sign in using your work or school account for Office 365. (This
takes you to the Security & Compliance Center.)
2. Go to Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security to go to the Office 365 Cloud App Security portal.
When you go to the Office 365 Cloud App Security portal, the first page you see is the Policies page,
which resembles the following image:

Step 4: Define policies and set up alerts & actions


Global administrators and security administrators define policies in Office 365 Cloud App Security. During the
process of defining policies, alerts and actions are also set. An alert is a criteria-based notification that appears in
a view or is sent via email.
There are two types of alerts in Office 365 Cloud App Security: anomaly detection alerts that detect suspicious
activity, and activity alerts, which are defined for activities that might be atypical for your organization. Alerts
notify global administrators and security administrators when there's an activity in your Office 365 environment
that's unusual for your organization.
See the following resources to learn more:
Activity policies and alerts in Office 365 Cloud App Security
Anomaly detection policies in Office 365 Cloud App Security
Review and take action on Office 365 Cloud App Security alerts

Step 5: Learn about your organization's cloud usage


As a global administrator, security administrator, or security reader, you can learn about your organization's
cloud usage through reports and a Cloud Discovery dashboard (also called Productivity App Discovery). This
dashboard shows information about users, apps, web traffic, and risk levels.
To go to the Productivity App Discovery dashboard, in the Office 365 Cloud App Security portal, choose
Discover > Cloud Discovery dashboard.

To populate reports with the information you need, upload your log files from your organization's firewalls and
proxies. To learn more, see the following resources:
Create app discovery reports in Office 365 Cloud App Security
Review app discovery findings in Office 365 Cloud App Security

Step 6: Manage apps that your organization is using to access Office


365
As a global administrator or security administrator, you can manage apps, such as custom apps or third-party
apps, that people in your organization are using on their devices with Office 365. For example, suppose that
someone has downloaded a custom app they want to use with Office 365. You can review the apps people are
using, ban untrusted apps, or mark apps as approved for your tracking purposes. Manage OAuth apps using
Office 365 Cloud App Security.

Step 7: Use your SIEM server with Office 365 Cloud App Security
Is your organization using a security information and event management (SIEM ) server? Office 365 Cloud App
Security can now integrate with your SIEM server to enable centralized monitoring of alerts. Integrating with a
SIEM service allows you to better protect your cloud applications while maintaining your usual security
workflow, automating security procedures and correlating between cloud-based and on-premises events. The
SIEM agent runs on your server, pulls alerts from Office 365 Cloud App Security, and streams those alerts into
your SIEM server. See SIEM integration with Office 365 Cloud App Security.

Next steps
Turn on Office 365 Cloud App Security
Try our Test Lab Guide for a hands-on experience where you can demonstrate the powerful features of
Office 365 Cloud App Security and create a proof of concept.
Turn on Office 365 Cloud App Security
11/27/2018 • 2 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning You are here! Start utilizing


Next step

Turn on Office 365 Cloud App Security


IMPORTANT
You must be a global administrator or security administrator to perform the following task. To learn more, see Permissions
in the Office 365 Security & Compliance Center. In order for Office 365 Cloud App Security to work correct, audit
logging must be turned on for your Office 365 environment. For more information, see Turn Office 365 audit log search
on or off.

1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using


your work or school account for Office 365. (This takes you to the Security & Compliance Center.)
2. Go to Alerts > Manage advanced alerts.
3. Select Turn on Office 365 Cloud App Security.
4. Choose Go to Office 365 Cloud App Security.

This takes you to the Office 365 Cloud App Security portal, where you can view reports and create or edit
your policies.

NOTE
When you turn on Office 365 Cloud App Security, auditing information about your Office 365 user accounts and user
activities is transferred to Microsoft Cloud App Security. This allows Office 365 to provide advanced alerts, filtering, and
other features so you can get information and take action about suspicious activities.
Next steps
Activity policies
Anomaly detection policies
Integrate your SIEM server
Group your IP addresses to simplify management
Activity policies and alerts in Office 365 Cloud App
Security
11/27/2018 • 2 minutes to read • Edit Online

Office 365 Advanced Security Management is now Office 365 Cloud App Security.

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning You are here! Start utilizing


Next step

With Office 365 Cloud App Security, advanced cloud management policies trigger alerts for specific activities that
happen or happen too frequently. For example, suppose a user tries to sign in to Office 365 and fails 70 times in
one minute. Suppose that another user downloads 7,000 files, or appears to be signed in from Canada, when that
user is supposed to be in another location. Or worse, suppose that someone's account has been compromised,
and an attacker is using that account to access your organization's cloud apps and sensitive data.
If you are a global administrator or security administrator, activity alerts notify you when events like these occur.
You can then take specific actions, such as suspending a user account until you can investigate what happened.

NOTE
Office 365 Cloud App Security policies are different from alert policies in the Office 365 Security & Compliance Center. The
activity policies described in this article are defined in the Office 365 Cloud App Security portal, and can help you better
manage your organization's cloud environment.

Before you begin


Make sure that:
Your organization has Office 365 Cloud App Security, and the service is turned on.
Audit logging is turned on for your Office 365 environment.
You are a global administrator or security administrator for Office 365.

Create a new activity policy


1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using
your work or school account.
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.
This takes you to the Office 365 Cloud App Security Policies page.
4. Click Create policy, and then select Activity policy.

5. On the Create activity policy page, specify the Policy name and Description. To base your policy on a
default template, choose one in the Policy template list, or create your own policy without using a
template.

6. Choose a Policy severity (Low, Medium, or High) that measures how serious it is to you if this policy
triggers an alert. This will help you filter alerts when you're reviewing them later.
7. Choose a Category for this policy. This will help you filter and sort alerts that have been triggered, or to
group policies when you're reviewing them to make changes.
8. Choose Activity filters to set up other actions or metrics that will trigger an alert based on this policy.
9. Under Activity match parameters, specify whether a policy violation will be triggered when a single
activity matches the filters, or if a specified number of repeated activities is required before the alert
triggers.
If you select Repeated activity, specify the number of activities, the time frame, and whether a violation
will count for a user within a specific app or for the same user with any app.
10. Optionally, you can select Create alert to create additional alerts to receive notifications from this policy
(via email, text message, or both).

IMPORTANT
Make sure that your email provider doesn't block emails sent from no-reply@cloudappsecurity.com.

11. Choose the Actions that should be taken when an alert is triggered to suspend the user or require the
user to sign in again to Office 365 apps.
12. Choose Create to finish creating your policy.

Next steps
Anomaly detection policies
Integrate your SIEM server
Review and take action on alerts
Group your IP addresses to simplify management
Anomaly detection policies in Office 365 Cloud App
Security
11/27/2018 • 6 minutes to read • Edit Online

Office 365 Advanced Security Management is now Office 365 Cloud App Security.

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning You are here! Start utilizing


Next step

Beginning with Microsoft Cloud App Security release 116, Office 365 Cloud App Security includes several
predefined anomaly detection policies ("out of the box") that include user and entity behavioral analytics (UEBA)
and machine learning (ML ).

These anomaly detection policies provide immediate results by providing immediate detections, targeting
numerous behavioral anomalies across your users and the machines and devices connected to your network. In
addition, the new policies expose more data from the Cloud App Security detection engine to help you speed up
the investigation process and contain ongoing threats.
As a global administrator or security administrator, you can review, and if necessary, revise the default policies
that are available with Office 365 Cloud App Security.

IMPORTANT
There is an initial learning period of seven (7) days during which anomalous behavior alerts are not triggered. The anomaly
detection algorithm is optimized to reduce the number of false positive alerts.
Before you begin
Make sure that:
Your organization has Office 365 Cloud App Security, and the service is turned on.
Audit logging is turned on for your Office 365 environment.
You are a global administrator or security administrator for Office 365.

View your anomaly detection policies


1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using
your work or school account.
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.
This takes you to the Office 365 Cloud App Security Policies page.
4. In the TYPE list, choose Anomaly detection policy.
Your organization's default (or existing) anomaly detection policies are displayed.

5. Select a policy to review or edit its settings.


6. Choose Update to save your changes.

Learn more about anomaly detection policies


Anomaly detection policies are automatically enabled; however, Office 365 Cloud App Security has an initial
learning period of seven days during which not all anomaly detection alerts are raised. After that, each session is
compared to the activity, when users were active, IP addresses, devices, etc. detected over the past month and the
risk score of these activities. These detections are part of the heuristic anomaly detection engine that profiles
your environment and triggers alerts with respect to a baseline that was learned on your organization's activity.
These detections also leverage machine learning algorithms designed to profile the users and log-in patterns to
reduce false positives.
Anomalies are detected by scanning user activity. The risk is evaluated by looking at over 30 different risk
indicators, grouped into multiple risk factors, such as risky IP address, login failures, admin activity, inactive
accounts, location, impossible travel, device and user agent, and activity rate.
Based on the policy results, security alerts are triggered. Office 365 Cloud App Security looks at every user
session in Office 365, and alerts you whenever something happens that is different from the baseline of your
organization or from a user's regular activity.
The following table describes the default anomaly detection policies, what they do, and how they work.

ANOMALY DETECTION POLICY NAME HOW IT WORKS

Impossible travel Identifies two user activities (is a single or multiple sessions)
originating from geographically distant locations within a
time period shorter than the time it would have taken the
user to travel from the first location to the second, indicating
that a different user is using the same credentials. This
detection leverages a machine learning algorithm that
ignores obvious "false positives" contributing to the
impossible travel condition, such as VPNs and locations
regularly used by other users in the organization. The
detection has an initial learning period of seven days during
which it learns a new user's activity pattern.

Activity from infrequent country Considers past activity locations to determine new and
infrequent locations. The anomaly detection engine stores
information about previous locations used by users in the
organization. An alert is triggered when an activity occurs
from a location that was not recently or never visited by the
user or by any user in the organization.

Activity from anonymous IP addresses Identifies that users were active from an IP address that has
been identified as an anonymous proxy IP address. These
proxies are used by people who want to hide their device's IP
address, and may be used for malicious intent. This detection
leverages a machine learning algorithm that reduces "false
positives", such as mis-tagged IP addresses that are widely
used by users in the organization.

Activity from suspicious IP addresses Identifies that users were active from an IP address that has
been identified as risky by Microsoft Threat Intelligence.
These IP addresses are involved in malicious activities, such
as Botnet C&C, and may indicate compromised account. This
detection leverages a machine learning algorithm that
reduces "false positives", such as mis-tagged IP addresses
that are widely used by users in the organization.

Unusual activities (by user) Identifies users who perform unusual activities, such as:
--Multiple file downloads
--File sharing activities
--File deletion activities
--Impersonation activities
--Administrative activities
These policies look for activities within a single session with
respect to the baseline learned, which could indicate on a
breach attempt. These detections leverage a machine
learning algorithm that profiles the users log on pattern and
reduces false positives. These detections are part of the
heuristic anomaly detection engine that profiles your
environment and triggers alerts with respect to a baseline
that was learned on your organization's activity.

Multiple failed login attempts Identifies users that failed multiple login attempts in a single
session with respect to the baseline learned, which could
indicate on a breach attempt.
Triage anomaly detection alerts
As alerts come in, you can triage those alerts quickly and determine which ones to handle first. Having context
for an alert enables you to see the bigger picture and determine whether something malicious is indeed
happening. Use the following procedure to get started exploring an alert:
1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using
your work or school account.
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.
4. Choose Alerts to view your alerts.
5. To get context for an alert, follow these steps:
6. Choose Investigate > Activity log.
7. Select an item, such as a user or IP address. This opens the relevant insights drawer.

8. In the relevant insights drawer, click an available command, such as an icon in the SHOW SIMILAR
section.

9. Gain insight about the selected item by continuing to explore details for that item.
An alert on multiple failed logins might indeed be suspicious, and can indicate a potential brute-force attack.
However, such an alert can also be an application misconfiguration, causing the alert to be a benign true positive.
If you see a multiple-failed-logins alert with additional suspicious activities, then there is a higher probability that
an account is compromised. For example, suppose that a multiple-failed-login alert is followed by activity from a
TOR IP address and impossible travel activity, both strong indicators of compromise. You might even see that the
same user performed a mass download activity, which is often an indicator of the attacker performing exfiltration
of data. It's things like that that you can explore in Office 365 Cloud App Security to view and triage your alerts,
and take action where needed.

Next steps
Integrate your SIEM server
Review and take action on alerts
Group your IP addresses to simplify management
Integrate your SIEM server with Office 365 Cloud
App Security
11/27/2018 • 7 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning You are here! Start utilizing


Next step

Overview and prerequisites


You can integrate Office 365 Cloud App Security with your security information and event management (SIEM )
server to enable centralized monitoring of alerts. This is especially beneficial for organizations who are using
cloud services and on-premises server applications. Integrating with a SIEM server allows your security team to
better protect your Office 365 applications while maintaining your usual security workflow, by automating
certain security procedures and correlating between cloud-based and on-premises events.
When you first integrate your SIEM server with Office 365 Cloud App Security, alerts from the last two days are
forwarded to the SIEM server, as well as all alerts from then on (based on any filters you select). Additionally, if
you disable this feature for an extended period, when you enable it again, it will forward the past two days of
alerts and then all alerts from then on.
SIEM integration architecture
A SIEM agent is set up in your organization's network. When deployed and configured, the SIEM agent pulls the
data types that were configured (alerts) using Office 365 Cloud App Security RESTful APIs. The traffic is then
sent over an encrypted HTTPS channel on port 443.
When a SIEM agent retrieves data from Office 365 Cloud App Security, it sends the Syslog messages to your
local SIEM server using the network configurations that are provided during setup (TCP or UDP with a custom
port).
Supported SIEM servers
Office 365 Cloud App Security currently supports the following SIEM servers:
Micro Focus ArcSight
Generic CEF
Prerequisites
You must be a global administrator or security administrator to perform the tasks described in this article.
See Permissions in the Office 365 Security & Compliance Center
You must have Office 365 Cloud App Security enabled for your organization.
Audit logging must be turned on for Office 365
You must have a standard server that meets the following requirements in order to configure SIEM server
integration:
OS: Windows or Linux (this can be a virtual machine)
CPU: 2
Disk space: 20 GB
RAM: 2 GB
Oracle Java 8 installed
Firewall configured as described in Network requirements
You must have details about your Remote syslog host and Syslot port number. A network
administrator or security administrator should be able to help you locate that information.
You must agree to software license terms to download the JAR file you'll need to integrate your SIEM
server.

Step 1: Set it up a SIEM agent in Office 365 Cloud App Security


1. Go to https://security.microsoft.com and sign in using your work or school account for Office 365. (This
takes you to the Security & Compliance Center.)
2. Go to Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.

4. Click Settings > Security extensions.


5. Choose Add SIEM agent.

6. Choose Start wizard.

7. In the General step, specify a name, and Select your SIEM format and set any Advanced settings that
are relevant to that format. Then choose Next.
8. In the Remote Syslog step, specify the IP address or hostname of the Remote syslog host and the
Syslog port number. Select TCP or UDP as the Remote Syslog protocol. (You can work with your
network administrator or security administrator to get these details if you don't have them.) Then choose
Next.

9. In the Data Types step, do one of the following, and then click Next:
Keep the default setting of All Alerts
OR
Click All alerts, and then choose Specific filters. Define filters to select the kinds of alerts you want to
send to your SIEM server.

10. On the Congratulations screen, copy the token and save it for later.
IMPORTANT
At this point, you have set up a SIEM agent in Office 365 Cloud App Security, but your SIEM server integration is not yet
finished. Proceed to the next step to continue your SIEM server integration.

After you click Close and leave the wizard, on the Security extensions screen, you can see the SIEM agent you
added in the table. It will show a status of Created until it's connected later.

Step 2: Download a JAR file and run it on your SIEM server


1. Download the Microsoft Cloud App Security SIEM Agent and unzip the folder. (You must agree to
software license terms in order to proceed.)
2. Extract the .jar file from the zipped folder and run it on your SIEM server.
3. After running the file, run the following: command:

java -jar mcas-siemagent-0.87.20-signed.jar [--logsDirectory DIRNAME] [--proxy ADDRESS[:PORT]] --token TOKEN

Important notes
The file name may differ depending on the version of the SIEM agent.
We recommend that you run the JAR file on your SIEM server during server setup.
Windows: Run as a scheduled task, making sure to configure the task to Run whether the user is
logged on or not and clear the Stop the task if it runs longer than option.
Linux: Add the run command with an & to the rc.local file.
Example:

java -jar mcas-siemagent-0.87.20-signed.jar [--logsDirectory DIRNAME] [--proxy ADDRESS[:PORT]] --token


TOKEN &

Parameters in brackets [] are optional, and should be used only if relevant. Use the following variables:
DIRNAME is the path to the directory you want to use for local agent debug logs.
ADDRESS [:PORT] is the proxy server address and port that the server uses to connect to the
Internet.
TOKEN is the SIEM agent token you copied in the first procedure.
To get help, type -h .

Step 3: Validate that the SIEM agent is working


1. Make sure the status of the SIEM agent in the Office 365 Cloud App Security portal is not displayed as
Connection error or Disconnected and that there are no agent notifications.
For example, here we can see the SIEM server is connected:

And here, we can see the SIEM server is disconnected:

2. In your Syslog/SIEM server, make sure you see that alerts have arrived from Office 365 Cloud App
Security.

What the logfiles look like


Here's an alerts logfile example that might be sent to a SIEM server:
2017-07-15T20:42:30.531Z
CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|myPolicy|3|externalId=596a7e360c204203a335a3fb
start=1500151350531 end=1500151350531 msg=Activity policy ''myPolicy'' was triggered by ''admin@box-
contoso.com'' suser=admin@box-contoso.com destinationServiceName=Box cn1Label=riskScore cn1=
cs1Label=portalURL cs1=https://cloud-app-security.com/#/alerts/596a7e360c204203a335a3fb
cs2Label=uniqueServiceAppIds cs2=APPID_BOX cs3Label=relatedAudits cs3=1500151288183_acc891bf-33e1-424b-a021-
0d4370789660 cs4Label=policyIDs cs4=59f0ab82f797fa0681e9b1c7

2017-07-16T09:36:26.550Z CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|test-activity-
policy|3|externalId=596b339b0c204203a33a51ae start=1500197786550 end=1500197786550 msg=Activity policy
''test-activity-policy'' was triggered by ''user@contoso.com'' suser=user@contoso.com
destinationServiceName=Salesforce cn1Label=riskScore cn1= cs1Label=portalURL cs1=https://cloud-app-
security.com/#/alerts/596b339b0c204203a33a51ae cs2Label=uniqueServiceAppIds cs2=APPID_SALESFORCE
cs3Label=relatedAudits cs3=1500197720691_b7f6317c-b8de-476a-bc8f-dfa570e00349 cs4Label=policyIDs cs4=

2017-07-16T09:17:03.361Z CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|test-activity-
policy3|3|externalId=596b2fd70c204203a33a3eeb start=1500196623361 end=1500196623361 msg=Activity policy
''test-activity-policy3'' was triggered by ''admin@contoso.com'' suser=admin@contoso.com
destinationServiceName=Office 365 cn1Label=riskScore cn1= cs1Label=portalURL cs1=https://cloud-app-
security.com/#/alerts/596b2fd70c204203a33a3eeb cs2Label=uniqueServiceAppIds cs2=APPID_O365
cs3Label=relatedAudits cs3=1500196549157_a0e01f8a-e29a-43ae-8599-783c1c11597d cs4Label=policyIDs cs4=

2017-07-16T09:17:15.426Z CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|test-activity-
policy|3|externalId=596b2fd70c204203a33a3eec start=1500196635426 end=1500196635426 msg=Activity policy
''test-activity-policy'' was triggered by ''admin@contoso.com'' suser=admin@contoso.com
destinationServiceName=Microsoft Office 365 admin center cn1Label=riskScore cn1= cs1Label=portalURL
cs1=https://cloud-app-security.com/#/alerts/596b2fd70c204203a33a3eec cs2Label=uniqueServiceAppIds
cs2=APPID_O365_PORTAL cs3Label=relatedAudits cs3=1500196557398_3e102b20-d9fa-4f66-b550-8c7a403bb4d8
cs4Label=policyIDs cs4=59f0ab35f797fa9811e9b1c7

2017-07-16T09:17:46.290Z CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|test-activity-
policy4|3|externalId=596b30200c204203a33a4765 start=1500196666290 end=1500196666290 msg=Activity policy
''test-activity-policy4'' was triggered by ''admin@contoso.com'' suser=admin@contoso.com
destinationServiceName=Microsoft Exchange Online cn1Label=riskScore cn1= cs1Label=portalURL
cs1=https://cloud-app-security.com/#/alerts/596b30200c204203a33a4765 cs2Label=uniqueServiceAppIds
cs2=APPID_OUTLOOK cs3Label=relatedAudits cs3=1500196587034_a8673602-7e95-46d6-a1fe-c156c4709c5d
cs4Label=policyIDs cs4=

2017-07-16T09:41:04.369Z CEF:0|MCAS|SIEM_Agent|0.102.17|ALERT_CABINET_EVENT_MATCH_AUDIT|test-activity-
policy2|3|externalId=596b34b10c204203a33a5240 start=1500198064369 end=1500198064369 msg=Activity policy
''test-activity-policy2'' was triggered by ''user2@test15-adallom.com'' suser=user2@test15-adallom.com
destinationServiceName=Google cn1Label=riskScore cn1= cs1Label=portalURL cs1=https://cloud-app-
security.com/#/alerts/596b34b10c204203a33a5240 cs2Label=uniqueServiceAppIds cs2=APPID_33626
cs3Label=relatedAudits cs3=1500197996117_fd71f265-1e46-4f04-b372-2e32ec874cd3 cs4Label=policyIDs cs4=

And here's another sample, this time in CEF format:

CEF FIELD NAME DESCRIPTION

start alert timestamp

end alert timestamp

rt alert timestamp

msg alert description as shown in the Office 365 Cloud App


Security portal

suser alert subject user

destinationServiceName alert originating app, such as Office 365, SharePoint, or


OneDrive
CEF FIELD NAME DESCRIPTION

csLabel Varies (labels have different meanings). Typically, labels are


self-explanatory, like targetObjects.

cs Information corresponding to a label (such as the target user


of an alert as per the label example)

Additional tasks (as needed)


After you have configured your SIEM server and have integrated it with Office 365 Cloud App Security, you
might need to regenerate a token, edit a SIEM agent, or delete a SIEM agent. The following sections describe
how to perform these tasks.
Regenerate a token
If you lose your token, you can regenerate one.
1. In the Office 365 Cloud App Security portal, choose Settings > Security extensions.
2. In the table, locate the row for the SIEM agent.
3. Click the ellipses, and then choose Regenerate token.

Edit a SIEM agent


1. In the Office 365 Cloud App Security portal, choose Settings > Security extensions.
2. Locate the row for the SIEM agent.
3. Click the ellipses, and then choose Edit. (If you edit the SIEM agent, you do not need to re-run the .jar file;
it updates automatically.)
Delete a SIEM agent
1. In the Office 365 Cloud App Security portal, choose Settings > Security extensions.
2. Locate the row for the SIEM agent.
3. Click the ellipses, and then choose Delete.

Next steps
Utilization activities after rolling out Office 365 Cloud App Security
Review and take action on alerts
Group your IP addresses to simplify management
Group your IP addresses to simplify management in
Office 365 Cloud App Security
8/21/2018 • 2 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning You are here! Start utilizing


Next steps

To easily identify sets of IP addresses that you'll use in Office 365 Cloud App Security, such as your physical office
IP addresses, you can set up groups of IP address ranges. Defining these ranges lets you tag and categorize them,
and then you can use tags and categories to customize how your activity logs and alerts are displayed and
investigated.
Each group of IP ranges can be tagged with tag names that you choose, and then the tags can be categorized
based on a default list of IP categories (such as Corporate, Administrative, Risky, and VPN ). Both IPv4 and IPv6
addresses are supported.

NOTE
You must be a global administrator or security administrator to perform the procedures in this article. To learn more, see
Permissions in the Office 365 Security & Compliance Center.

To set up an IP address range in Office 365 Cloud App Security


1. As a global administrator or security administrator, go to https://protection.office.com and sign in using
your work or school account. (This takes you to the Security & Compliance Center.)
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.

4. On the upper right of the page, click Settings > IP address ranges.
5. Click the new button, which resembles a plus sign ( +).
6. In the New IP address range window, specify the following values:

FIELD OR LIST WHAT TO DO

Name Use this field to manage your IP address range and settings.
(You won't see this value in activities logs.)

IP address ranges Specify a range, using network prefix notation (also known as
CIDR notation). For example, 192.168.1.0/27 includes the
range of values 192.168.1.0 through 192.168.1.31 (inclusive).

Location and Registered ISP Specify the location and Internet Service Provider (ISP) for the
IP address range. This overrides the public fields defined for
the addresses, which is helpful for cases, such as an IP address
is that is considered publicly to be in Ireland but is actually in
the U.S.

Tags Use tags to name your groups of IP addresses. (Unlike the


Name field, you will see Tags in activity logs.) Type a word or
phrase that you want to use for a tag. You can add as many
tags as you like for each IP address range. And if you've
already set up a tag and you want to add this IP address
range to it, choose it from the list of current tags that appear
as you start typing.

Category Assign categories to your tags to make it easier to recognize


activities that come from certain IP addresses. Choose from
the following options:
Administrative All of the IP addresses of your admins.
Cloud provider The IP address of your proxy in the cloud.
Corporate All of the IP addresses in your internal network,
your branch offices, and your Wi-Fi roaming addresses.
Risky Any IP addresses that you consider to be risky, such as
suspicious IP addresses you've seen in the past, IP addresses
in your competitors' networks, and so on. By default, the
Risky categories includes two IP tags: Anonymous proxy and
Tor
VPN Any IP addresses that your remote workers use.

7. Choose Save.
After you set up your IP address ranges, keep in mind that only future events are affected by these changes.

Next steps
Activity policies and alerts
Anomaly detection policies
Integrate your SIEM server
Review and take action on alerts in Office 365 Cloud App Security
Utilization activities after rolling out Office 365
Cloud App Security
12/3/2018 • 3 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next step

NOTE
Office 365 Cloud App Security is available in Office 365 Enterprise E5. If your organization is using another Office 365
Enterprise subscription, Office 365 Cloud App Security can be purchased as an add-on. (As a global administrator, in the
Office 365 admin center, choose Billing > Add subscriptions.) For more information, see Office 365 Platform Service
Description: Office 365 Security & Compliance Center and Buy or edit an add-on for Office 365 for business.

After you have set up and configured Office 365 Cloud App Security, you'll want to perform certain utilization
tasks as an Office 365 global administrator or security administrator for your organization.
By performing these tasks, you'll help ensure that Office 365 Cloud App Security is configured correctly, your
policies are up to date, and your organization realizes value from Office 365. Use this article as a guide to help
you plan for these tasks.

NOTE
You must be a global administrator or security administrator to perform the tasks described in this article. To learn more,
see Permissions in the Office 365 Security & Compliance Center.

Activities after the initial configuration and rollout of Office 365


Cloud App Security
After Office 365 Cloud App Security is configured and rolled out, as a global administrator or security
administrators, you have several things to consider:
What tasks need to be added to the IT department calendar?
How can you make sure Office 365 Cloud App Security is configured to use the right set of policies over
time?
What kinds of summary information should you send up the IT management chain?
The following table briefly summarizes the ongoing tasks you'll want to perform and periodic tasks you should
consider adding to your IT department's calendar.
ONGOING TASKS PERIODIC TASKS

Monitor the email accounts to which you are sending alert Perform monthly or quarterly reviews of Office 365 Cloud
messages App Security alerts to spot anomalies and analyze trends
Monitor industry cybersecurity news feeds for the latest Perform monthly or quarterly reviews of your existing Office
information about new cyber attacks 365 Cloud App Security policies to include enhancements in
Act on security alerts to identify and address security Office 365 Cloud App Security and address new cyberattacks
incidents and risks and trends in cybersecurity
Summarize each security incident and resolution in a central
log

Depending on your organization's size and interest in monitoring and maintaining a security stature, you can
compile a monthly summary for your IT management chain that includes:
The different types of security incidents identified with Office 365 Cloud App Security
Summary information from your central log of the security incidents, such as number of incidents
detected
Alert trends and how they were addressed
The latest cybersecurity trends
Recommendations for Office 365 Cloud App Security policy changes and their impact on end users

Activities after time has passed since rolling out Office 365 Cloud
App Security
If a protracted amount of time has passed since you initially configured or maintained your Office 365 Cloud
App Security policies, take the following steps to get back to a configuration that reflects your organization's
security goals and the current capabilities of Office 365 Cloud App Security:
1. Determine the date of the last configuration change for Office 365 Cloud App Security.
2. Understand your current Office 365 Cloud App Security configuration and adjust those policies as
needed. For example, make sure you know where alerts are being sent via email.
3. See what's new in Office 365 Cloud App Security for product changes since you last configured Office
365 Cloud App Security.
4. Perform an analysis of Office 365 Cloud App Security alerts and logs to spot anomalies and analyze
trends.
5. Check industry cybersecurity trends to become aware of the latest security threats.
6. Perform an analysis of the changes that need to be made to the current set of Office 365 Cloud App
Security policies. Incorporate Office 365 Cloud App Security feature changes, current anomalies, and
cybersecurity trends. Recommend changes to existing policies or the creation of new policies.
7. Make a plan for implementing the policy changes. Communicate (socialize) the consequences of the
proposed changes with your end users as needed.
8. Implement the Office 365 Cloud App Security policy changes.
9. Monitor end user feedback and Office 365 Cloud App Security alerts and adjust policies over time.

Next steps
Investigate an activity
Suspend or restore a user account
Manage OAuth apps
Review app discovery findings in Office 365 Cloud App Security
View a list of supported Web traffic logs and data sources
Review and take action on alerts in Office 365 Cloud
App Security
11/27/2018 • 2 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

You can use the Alerts page in Office 365 Cloud App Security to view potential issues and, if needed, take action.

NOTE
You must be a global administrator or security administrator to perform the tasks in this article. See Permissions in the
Office 365 Security & Compliance Center.

How to get to the Alerts page


1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using
your work or school account.
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.

4. In the navigation bar across the top of the screen, choose Alerts.
Review and handle alerts
Alerts help you identify activities in your Office 365 cloud environment that you might want to investigate
further. You might also decide to create new policies or edit existing policies based on the alerts you see. For
example, if you see an administrator logging on from a strange location, you may decide to set up a policy that
prevents administrators from signing in to Office 365 from certain locations.

TIP
You can filter the alerts by Category or by Severity so you can manage the most important ones first.

For each alert, look into what caused it so you can decide what action to take. To see more details about an alert
and to take action, such as resolving the alert or suspending a users account, choose the alert to open a details
page. On the details page, you can review the activity log, accounts, and users that are related to the alert, and
take actions such as the following:
Dismiss If the alert was a false positive, dismiss it. You can optionally add a comment explaining why you
dismissed it.
Resolve alert If the alert was triggered by an activity that you know isn't a threat, resolve it. You can
optionally add a comment explaining why you resolved it.
Suspend If you suspect unauthorized sign ins on an account, for example, someone signing in from
another country when you know that person is physically at a local office, you can suspend the account
while you investigate what's going on.

Next steps
Investigate an activity
Suspend or restore a user account
View a list of supported Web traffic logs and data sources
Review your utilization activities for Office 365 Cloud App Security
Investigate an activity in Office 365 Cloud App
Security
11/27/2018 • 2 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

Office 365 Cloud App Security works with your Office 365 audit log. With Office 365 Cloud App Security, as a
global administrator or security administrator, you can use the Activity log page to see potential issues in how your
organization is using Office 365.

How to get to the Activity log page


1. As a global administrator or security administrator, go to https://security.microsoft.com and sign in using
your work or school account. (See Permissions in the Office 365 Security & Compliance Center.)
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.

4. In the navigation bar across the top of the screen, choose Investigate > Activity log.

Review and investigate activities


On the Activity log page, you can see a list of various activities that are taking place within your organization using
Office 365. You can use filters across the top of the screen to focus on a specific type of activity or a specific user.
For example, the following image shows information about an organization's Office 365 admin account's
password change:
As you look at each item in the Activity log, you can click the ellipses to find other related activities. For example,
you can view other activities of the same type, from the same IP address, or from the same country/region.
You can view information about many other kinds of activities, too. For example, here are some of the activities
you can view in the Activity log:
Members added to or removed from groups
Changes in user licenses
Files or folders shared internally or externally
Created or deleted sites or site collections
Email forwarding rules
Use the Activity log page to get acquainted with how people in your organization are using Office 365 and what
issues they might be having along the way.

Next steps
Review and take action on alerts in Office 365 Cloud App Security
Review your utilization activities for Office 365 Cloud App Security
Manage OAuth apps using Office 365 Cloud App
Security
12/3/2018 • 4 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

People love apps and they download them often, especially apps that people think will save time by making it
easier to get at their work or school information. However, some apps could potentially be a security risk to your
organization, depending on what information they access and how they handle that information. With Office 365
Cloud App Security, if you are a global or security administrator, you can manage OAuth apps for your
organization. You can see the apps people are using with Office 365 data, what permissions those apps have, and
more.
This article describes where to go to manage OAuth apps, how to approve or ban an app, and how to create an
app query.

How to find the Manage OAuth apps page


NOTE
OAuth apps are managed in the Office 365 Cloud App Security portal. You must be a global administrator or security
administrator to perform the following task. To learn more see Permissions in the Office 365 Security & Compliance Center.

1. Go to https://protection.office.com and sign in using your work or school account for Office 365. (This
takes you to the Security & Compliance Center.)
2. Go to Alerts > Manage advanced alerts.
3. Click (or tap) Go to Office 365 Cloud App Security.

NO****TE: If Office 365 Cloud App Security is not turned on yet, you can do that on this page. See Get
ready for Office 365 Cloud App Security.
4. Choose Investigate > OAuth apps.

What you'll see on the Manage OAuth apps page


The following table describes the controls and options available on the Manage OAuth apps page.

ITEM DESCRIPTION

Basic icon in the app query bar Select this to switch to the Advanced view.
(If you see Basic, you are using the Advanced view)

Advanced icon in the app query bar Select this to switch to the Basic view.
(If you see Advanced, you are using the Basic view.)

Open or close all details icon in the app list Select this icon to view more or fewer details about each app.

Export icon in the app list Select this icon to export a CSV file that contains a list of
apps, number of users for each app, permissions associated
with the app, permissions level, app state, and community
use level.

Name Use this to see the name of an app. Select the name to view
more information, such as its description, publisher, app
website and app ID.

Authorized by Use this to see how many users have authorized an app to
access their Office 365 account. Select the number to view
more information, such as a list of user accounts.

Permissions Level Use this to see how much access an app has to Office 365
data. Permissions levels indicate Low, Medium, or High,
where Low might indicate that the app only accesses a user's
profile and name. Select the level to view more information,
such as permissions granted to the app, community use, and
related activity in the Governance log.

App state ( Banned, Approved, or Undetermined) Use this to mark an app as Approved or Banned, or leave it
as undetermined.

Mark an app as approved


On the Manage OAuth apps page, locate the app you want to approve, and choose the Mark app as approved
icon.
The icon turns green, and the app is approved for all your Office 365 users.

NOTE
When you mark an app as approved, there is no effect on the end user. Visually marking the apps that are approved helps
to separate them from apps that haven't been reviewed yet.

Ban an app
1. On the Manage OAuth apps page, locate the app you want to ban, and choose the Mark app as banned
icon.

2. Choose whether to let users know that their app has been banned.
(Recommended) To let users know, select Notify users who granted access to this banned app,
and add or edit a custom notification message.
To not let users know, clear Notify users who granted access to this banned app.

3. Choose Ban app.

Create an app query


1. In the app query bar, if you see Advanced, click (or tap) it to go to the Advanced view. (If you see Basic,
you are using the Advanced view; keep your view as it is.)
2. Use the Select a filter list to choose an option.
App Apps with certain names
App state Apps based on their state (Approved, Banned, or Undetermined)
Community use Apps based on community use levels (Rare, Uncommon, or Common)
Permission level Apps based on certain permission levels
Permissions Apps that require certain permissions
Publisher
|Apps from certain publishers
User Apps that a certain user authorized
3. Select equals or does not equal, and then specify a value for your filter.

4. To add more filters, select the plus sign ( ), and then repeat steps 2 and 3.

5. To remove a filter, select the x ( ) next to a filter name.


The filters are applied automatically, and the apps list is updated accordingly.

Next steps
Review and take action on alerts
Review your Web traffic logs and data sources for Office 365 Cloud App Security
Review your utilization activities for Office 365 Cloud App Security
Web traffic logs and data sources for Office 365
Cloud App Security
8/21/2018 • 5 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

You can use a wide range of web traffic log files and data sources with Office 365 Cloud App Security. However,
your web traffic log files must include specific information and be formatted a certain way so that they will work
with Office 365 Cloud App Security app discovery reports and the Cloud Discovery dashboard. Use this article as
a reference guide for the web traffic logs and data sources you'll use with Office 365 Cloud App Security.

NOTE
You must be a global administrator, security administrator, or security reader to access the Security & Compliance Center
and Office 365 Cloud App Security portal. See Permissions in the Office 365 Security & Compliance Center.

Web traffic log requirements


Office 365 Cloud App Security uses data in your web traffic logs to help you understand which apps people in
your organization are using. The more details that are included in the log files, the better visibility you'll have into
user activity.
The following table lists the requirements and attributes that are needed for your web traffic logs to work
correctly with Office 365 Cloud App Security:

ATTRIBUTES ADDITIONAL REQUIREMENTS

Date of the transaction The data source for the log files must be supported.
Source IP The format the log files use must match the standard format.
Source user (recommended) When the file is uploaded, app discovery will verify this.
Destination IP address The events in the log must have taken place no more than 90
Destination URL (recommended: URLs provide higher days ago.
accuracy for cloud app detection than IP addresses) The log file must include outbound traffic information that
Total amount of data (recommended) can be analyzed for network activity.
Amount of uploaded or downloaded data (recommended:
provides insights about cloud app usage patterns)
Action taken (allowed or blocked)

If attributes aren't included in the logs that are loaded, Office 365 Cloud App Security can't show or analyze the
information for you. For example, Cisco ASA Firewall's standard log format does not include the amount of
uploaded bytes per transaction, the username, or a target URL (only a target IP ). Because that information isn't in
the Cisco log files, Office 365 Cloud App Security won't include it when analyzing your organization's network
traffic.
NOTE
For some kinds of firewalls, you must set an information level for web traffic logs to include the required attributes. For
example, Cisco ASA firewalls must have the information level set to 6. Make sure to confirm that your firewalls are set to
deliver the correct information in your web traffic logs.

Data attributes for different vendors


The following table summarizes the information in web traffic logs from various vendors. Be sure to check with
your vendor for the most current information.

TARGET APP UPLOADED


DATA SOURCE URL TARGET APP IP USERNAME ORIGIN IP TOTAL TRAFFIC BYTES

Barracuda Yes Yes Yes Yes No No

Blue Coat Yes No Yes Yes Yes Yes

Checkpoint No Yes No Yes No No

Cisco ASA No Yes No Yes Yes No

Cisco FWSM No Yes No Yes Yes No

Cisco Ironport Yes Yes Yes Yes Yes Yes


WSA

Cisco Meraki Yes Yes No Yes No No

Clavister Yes Yes Yes Yes Yes Yes


NGFW
(Syslog)

Dell SonicWall Yes Yes No Yes Yes Yes

Fortigate No Yes No Yes Yes Yes

Juniper SRX No Yes No Yes Yes Yes

Juniper SSG No Yes No Yes Yes Yes

McAfee SWG Yes No No Yes Yes Yes

Meraki (Cisco) Yes Yes No Yes No No

Microsoft Yes No Yes Yes Yes Yes


Threat
Management
Gateway

Palo Alto Yes Yes Yes Yes Yes Yes


Networks
TARGET APP UPLOADED
DATA SOURCE URL TARGET APP IP USERNAME ORIGIN IP TOTAL TRAFFIC BYTES

Sophos Yes Yes Yes Yes Yes No

Squid Yes No Yes Yes No Yes


(Common)

Squid (Native) Yes No Yes Yes No Yes

Websense - Yes Yes Yes Yes Yes Yes


Investigative
detail report
(CSV)

Websense - Yes Yes Yes Yes Yes Yes


Internet
activity log
(CEF)

Zscaler Yes Yes Yes Yes Yes Yes

Supported vendor firewalls and proxies


Office 365 Cloud App Security supports the following firewalls and proxies.
Barracuda - Web App Firewall (W3C )
Blue Coat Proxy SG - Access log (W3C )
Check Point
Cisco ASA Firewall (note that you must set the information level to 6)
Cisco IronPort WSA
Cisco ScanSafe
Cisco Merkai - URLs log
Dell Sonicwall
Fortinet Fortigate
Juniper SRX
Juniper SSG
McAfee Secure Web Gateway
Microsoft Forefront Threat Management Gateway (W3C )
Palo Alto series Firewall
Sophos SG
Sophos Cyberoam
Squid (Common)
Squid (Native)
Websense - Web Security Solutions - Investigative detail report (CSV )
Websense - Web Security Solutions - Internet activity log (CEF )
Zscaler

NOTE
If a data source that you'd like to use is not included here, you can request that it be added to app discovery. To do that,
when you're creating a report, select Other for Data source. Then type the name of the data source that you're trying to
upload. We'll review the log, and let you know if we add support for that log type.

Troubleshoot errors when log files are uploaded


After you upload web traffic log files, check the governance log to see if there were any errors. If there are errors,
use the information in the following table to resolve those errors.

ERROR DESCRIPTION RESOLUTION

Unsupported file type The file uploaded is not a valid log file. Upload a text, zip, or gzip file that was
For example, an image file. directly exported from your firewall or
proxy.

Internal error An internal resource failure was Click Retry to re-run the task.
detected.

The log format does not match The log format you uploaded does not
match the expected log format for this
data source.

Verify that the log is not corrupt.


Compare and match the log file format
to the sample format shown on the
upload page.

Transactions are more than 90 days old All transaction are more than 90 days Export a new log with recent events
old and therefore are being ignored. and re-upload it.

No transactions to catalogue cloud No transaction to any recognized cloud Verify that the log contains outbound
apps apps are found in the log. traffic information.

Unsupported log type When you select Data source = Other The Microsoft Cloud App Security
(unsupported), the log is not parsed. technical team builds a dedicated parser
Instead, it is sent for review to the for each data source. Most popular
Microsoft Cloud App Security technical data sources are already supported.
team. When an unsupported data source is
uploaded, it is reviewed and added to
the list of potential new data source
parsers.
When a new parser is added to the
feature, a notification is included in the
Microsoft Cloud App Security release
notes.

Next steps
Review and take action on alerts
Create app discovery reports
Review app discovery findings
Review your utilization activities for Office 365 Cloud App Security
Suspend or restore a user account in Office 365
Cloud App Security
12/3/2018 • 2 minutes to read • Edit Online

Office 365 Advanced Security Management is now Office 365 Cloud App Security.

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

Suppose that you receive an alert that one of your organization's user accounts for Office 365 has been
compromised. Or, suppose that you've received an alert that indicates something is wrong with a user account.
With Office 365 Cloud App Security, you can suspend a user account and later restore it after you have
investigated the alerts you receive.

NOTE
Office 365 Cloud App Security is available in Office 365 Enterprise E5. If your organization is using another Office 365
Enterprise subscription, Office 365 Cloud App Security can be purchased as an add-on. (As a global administrator, in the
Office 365 admin center, choose Billing > Add subscriptions.) For more information, see Office 365 Platform Service
Description: Office 365 Security & Compliance Center and Buy or edit an add-on for Office 365 for business.

To suspend a user account in Office 365 Cloud App Security


When you suspend a user account, you prevent the user from signing in again. It's the same as editing the user
account directly in Office 365 to set the Sign-in status to Sign-in blocked.

NOTE
If you block a user from signing in to Office 365, either by suspending them or by editing their sign-in status, be aware that
it can take an hour or so to take effect on all of the user's devices and clients (Edit or change a user in Office 365). If the user
is signed in to Office 365, the block will take effect whenever Office 365 requires them to sign in again.

1. As a global administrator or security administrator, go to https://protection.office.com and sign in using


your work or school account. (This takes you to the Security & Compliance Center.)
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
3. Choose Go to Office 365 Cloud App Security.
4. In the navigation bar across the top of the screen, choose Alerts.
5. In the Alert column, double-click an alert that pertains to a specific user account.

6. Under Accounts, in the Status column, choose Settings > Suspend user.

To restore a user account


See Restore a user in Office 365

Next steps
Review and take action on alerts in Office 365 Cloud App Security
Manage OAuth apps using Office 365 Cloud App Security
Review your utilization activities for Office 365 Cloud App Security
Create app discovery reports using Office 365 Cloud
App Security
11/27/2018 • 2 minutes to read • Edit Online

Office 365 Advanced Security Management is now Office 365 Cloud App Security.

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

Office 365 Cloud App Security helps global administrators, security administrators, and security readers gain
insight into the cloud services people in an organization are using. For example, you can see where users are
storing and collaborating on documents and how much data is being uploaded to apps or services that are outside
of Office 365.
To generate an app discovery report, you manually upload your web traffic log files from your firewalls and
proxies, and then Office 365 Cloud App Security parses and analyzes those files for your report.

NOTE
You must be a global administrator, security administrator, or security reader to perform the tasks described in this article. To
learn more, see Permissions in the Office 365 Security & Compliance Center.

Create a report with app discovery


To create an app discovery report, you identify the vendor data source for the log files that you want to have
analyzed, select the log files, and then request the report.

NOTE
Use web traffic log files that include peak traffic periods to get the best representation of usage in your organization.

1. Collect your web traffic logs and data sources for Office 365 Cloud App Security.
2. Go to https://security.microsoft.com and sign in using your work or school account.
3. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
4. Choose Go to Office 365 Cloud App Security.
5. Choose Discover > Create new report.
6. Specify a name and description for your report, and then select the data source for your web traffic logs in
the Data source list.

NOTE
If a data source that you'd like to use is not listed, you can request that it be added. Select Other for Data source,
and then type the name of the data source that you're trying to upload. We'll review the log, and let you know if we
add support for the data source that generated it.

7. Browse to the location of the log files you collected and select the files. The log files must have been
generated by the data source that you chose for the report.
8. Click Create to start the report creation process.
9. To see the status of the report, click Manage snapshot reports. When a report is ready, you'll see the
View report option.

Next steps
Review and take action on alerts
Review app discovery findings in Office 365 Cloud App Security
Review your utilization activities for Office 365 Cloud App Security
Review app discovery findings in Office 365 Cloud
App Security
11/27/2018 • 2 minutes to read • Edit Online

EVALUATION > PLANNING > DEPLOYMENT > UTILIZATION

Start evaluating Start planning Start deploying You are here!


Next steps

The Cloud Discovery dashboard works with your organization's web traffic logs to provide detailed information
about cloud app usage. If you're a global administrator, security administrator, or security reader, and your
organization has created app discovery reports in Office 365 Cloud App Security , you can use the Cloud
Discovery dashboard to gain insight into how people in your organization are using Office 365 and other cloud
apps. (The Cloud Discovery dashboard is also known as Productivity App Discovery.)
As of March 2018, the Cloud Discovery dashboard has new features that make it easier to view detailed
information about how people in your organization are using Office 365 and other apps.

Go to the Cloud Discovery dashboard


1. Go to https://protection.office.com and sign in using your work or school account for Office 365. (This
takes you to the Security & Compliance Center.)
2. In the Security & Compliance Center, choose Alerts > Manage advanced alerts.
(If Office 365 Cloud App Security is not yet enabled, and you are a global administrator, turn on Office 365
Cloud App Security.)
3. Choose Go to Office 365 Cloud App Security.
4. Go to Discover > Cloud Discovery dashboard.

See your top users, IP addresses, apps, and risk levels


The Cloud Discovery dashboard gives you an at-a-glance overview of apps that are used with Office 365 in your
organization, any open alerts, top users, and risk levels.
1. On the Dashboard tab, look at the overall cloud app use in your organization in the overview section
across the top of the screen.
2. See the Office 365 categories for apps that are used in your organization.
3. Look at the Discovered apps widget to see usage of Office 365 and other apps in this view.
4. Look at the Top users and Top IP addresses widget to identify those who use Office 365 and cloud apps
the most in your organization.
5. See where the apps people are using are by geographical location by using the Apps headquarters
location map.
6. Above the maps area, take a look at the risk score of the discovered apps in the Risk levels overview. You
can look at risks by the same groups and categories that you used in the Discovered apps area. For
example, you can see how much traffic in each grouping is from high, medium, or low risk apps.

Dive deeper into the information


You can use Cloud Discovery to take a deeper look at apps, subdomains, IP addresses, and users.
1. In the Cloud Discovery dashboard, choose the Discovered apps tab.
2. Use the filters section to view apps by name, category, usage level, or last seen date.
3. In the list of results, hover by an app name to reveal the View sub-domains link.

Detailed information about the selected app will appear.


4. To view details about IP addresses, choose the IP addresses tab.

In the list of results, select an individual IP address to view more detailed information.
5. To view details about Office 365 users within your organization, choose the Users tab.

Exclude entities
You can exclude certain system users or IP addresses in order to focus on more specific information.
1. Choose Settings > Cloud Discovery settings.
2. Choose Exclude entities.
3. Choose either Excluded users or Excluded IP addresses.
4. Specify the users or IP addresses, and in the Comments box, type information about why you are
excluding those users or IP addresses.
5. Choose Add.

Next steps
Review and take action on alerts
Create app discovery reports
Review your utilization activities for Office 365 Cloud App Security
Quarantine email messages in Office 365
8/21/2018 • 2 minutes to read • Edit Online

You can set up quarantine for incoming email messages in Office 365 where messages that have been filtered as
spam, bulk mail, phishing mail, mail that contains malware, and mail that matched a specified mail flow rule can
be kept for later review.
By default, filtered messages are sent to the recipients' Junk Email folder, except for mail that contains malware
which is sent to quarantine by default. As an admin, you can set up content filter policies to send all filtered
messages to quarantine instead. The different actions that you can take for content-filtered messages depend on
the spam filter policies you've defined.
Both users and admins can work with quarantined messages. Users can work with just their own filtered
messages in quarantine. Admins can search for and manage quarantined messages for all users.
Learn more about working with quarantined messages:
Manage quarantined messages as an administrator
Find and release quarantined messages as a user
Use user spam notifications to release and report spam-quarantined messages
Quarantine FAQ
Manage quarantined messages and files as an
administrator in Office 365
12/5/2018 • 12 minutes to read • Edit Online

As an admin, you can view, release, and delete quarantined messages, and report false positive quarantined
messages in Office 365. You can also view, download, and delete quarantined files captured by Advance Threat
Protection (ATP ) for SharePoint Online, OneDrive for Business, and Microsoft Teams. You can set up policies so
that Office 365 filters messages and sends them to quarantine for several reasons: Because they were identified
as spam, bulk mail, phishing mail, containing malware, or because they matched a mail flow rule.
By default, Office 365 sends phishing messages and messages containing malware directly to quarantine. Other
filtered messages are sent to users' Junk Email folder unless you set up a policy to send them to quarantine.
You must have admin permissions in Office 365 to work with quarantined messages that were sent to other users
and to work with quarantined files.

IMPORTANT
By default, spam, bulk, malware, phishing, and messages that were quarantined because they matched a mail flow rule are
kept in quarantine for 30 days. You can customize the quarantine time in anti-spam settings in the Security & Compliance
Center. When Office 365 deletes a message from quarantine, you can't get it back. If you like, you can change the retention
period for quarantined messages in your anti-spam filter policies. For more information, see Setting the quarantine
retention period in this article.

View your organization's quarantined messages


1. Using a work or school account that has global administrator privileges in your Office 365 organization,
sign into Office 365 and go to the Security and Compliance Center.
2. In the list on the left, expand Threat Management, choose Review, and then choose Quarantine.

TIP
To go directly to the Quarantine page in the Security & Compliance Center, use this URL: >
https://protection.office.com/?hash=/quarantine

By default, the Security & Compliance Center displays all email messages that have been quarantined as
spam. The messages are sorted from newest to oldest based on the Date the message was received.
Sender, Subject, and the expiration date (under Expires ) are also displayed for each message. You can
sort on a field by clicking the corresponding column header; click a column header a second time to
reverse the sort order.
3. You can view a list of all quarantined messages, or you can reduce the result set by filtering. You can only
do bulk operations on up to 100 items, so filtering can also help reduce your result set if you have more
than that. You can quickly filter messages for a single quarantine reason by choosing an option from the
filter at the top of the page. Options include:
Mail identified as spam
Mail quarantined because it matched a policy set by a mail flow rule (also called a transport rule)
Mail identified as bulk mail
Mail identified as phishing mail
Mail quarantined because it contains malware
In addition, as an admin, you can choose to filter all messages for your organization or only messages sent to you.
End users can only view and work with messages sent to them.
You can also filter your results to find specific messages. For tips, see To filter results and find quarantined
messages and files in this article.
After you find a specific quarantined message, click the message to view details about it, and take actions, like
releasing the message to someone's mailbox.

View your organization's quarantined files


1. Using a work or school account that has global administrator privileges in your Office 365 organization,
sign in to Office 365 and go to the Security and Compliance Center.
2. On the left, expand Threat Management, choose Review, and then choose Quarantine.

TIP
To go directly to the Quarantine page in the Security & Compliance Center, use this URL: >
https://protection.office.com/?hash=/quarantine

3. By default, the page displays quarantined email messages. To view quarantined files, set the filters at the
top of the page to show files, quarantined due to malware. You must have admin permissions in Office
365 to work with quarantined files.
4. The files are sorted from newest to oldest based on the date the file was quarantined. The User who last
modified the file, the Service to which the file was posted, the File Name, Location, File Size, and the
expiration date ( Expires) are also listed for each file. You can sort on a field by clicking a header; click a
column header a second time to reverse the sort order.
You can view a list of all quarantined files, or you can search for specific files by filtering. Just like messages, you
can only do bulk operations on up to 100 items. Currently, the Security & Compliance Center lets you view and
manage files that are in quarantine because they have been identified as containing malware. For tips, see To filter
results and find quarantined messages and files in this article.

To filter results and find quarantined messages and files


Depending on your settings, there may be a lot of quarantined messages and files. To find a specific message or
file or set of messages or files, you can filter quarantined items based on a variety of additional information.
1. On the Quarantine page, ensure that the top row of filters is set to display messages or files as
appropriate:
To search for files, set the filters to show files quarantined due to malware.
For quarantined files, the page displays all quarantined files, not just your own, regardless of what
you tell it to show.
To search for quarantined messages, set filters to show all or only my email. For the last filter
choose the type of quarantined message that you're looking for. You can search for quarantined
messages that have been identified as spam, for messages that matched a mail flow or transport
rule, bulk mail, phishing mail, or mail that contains malware.
2. Under Sort results by, choose the filter or filters you want to use to search from the drop-down lists. The
options vary based on whether you are searching for files or messages. Wildcards are not supported in
search fields at this time.

For both files and messages, you can choose to filter by the date the message or file was sent to
quarantine. You can specify the date or a date range, including the time. You can also filter your search
results by the expiration date on which the file or message will be deleted from quarantine, or you can use
a combination of filters. To search by expiration date, choose Advanced filter. Under Expires, you can
select messages that will be deleted from quarantine within the next 24 hours ( Today), within the next 48
hours ( Next 2 days), within the next week ( Next 7 days), or you can select a custom time interval.

For messages, you have the following additional options:


Message ID. Use this to identify a specific message when you know the message ID.

For example, if a specific message is sent by, or intended for, a user in your organization, but it never
reached its destination, you can search for the message by using a message trace (see Run a
Message trace and View Results). If you discover that the message was sent to quarantine, perhaps
because it matched a mail flow rule or was identified as spam, you can then easily find this message
in quarantine by specifying its message ID. Be sure to include the full message ID string. This might
include angle brackets (<>), for example:
<79239079-d95a-483a-aacf-e954f592a0f6@XYZPR00BM0200.contoso.com>

Sender email address. Choose to filter by a single sender email address.


Recipient email address. Choose to filter by a single recipient email address.
Subject. Enter the subject of an email address you want to find. Since wildcard searching is not
supported, you must use the entire subject of the message in order for search to return the message
in the results. The search is not case-sensitive.

View details about quarantined messages and files


When you select an item displayed in the quarantine list, you'll see a summary of its properties in the Details
pane on the right side of the Security & Compliance Center.
Details displayed for quarantined messages
Message ID. The unique identifier for the message.
Sender Address. Who sent the message.
Received. The date and time the message was received.
Subject. The text of the subject line of the message.
Type. Shows if a message has been identified as Spam, Bulk, Phish, matched a mail flow rule ( Transport
rule), or was identified as containing Malware.
Expires. The date and time when the message will automatically be deleted from quarantine.
Released to. All email addresses (if any) to which the message has been released.
Not yet released to. All email addresses (if any) to which the message has not yet been released.
Details displayed for quarantined files
File Name The name of the file in quarantine.
Site path URL that defines the location of the file in Office 365.
Detected Date / Time The date and time the file was quarantined.
Expires The date when the message will be deleted from quarantine.
Detected By The method used to detect the malware in the file. This can be either ATP (Advanced Threat
Protection) or Microsoft's anti-malware engine.
Released Describes whether or not the file has been released.
Malware Name Family and name of the malware detected in the file.
Document ID A unique identifier for the document.
File Size The size of the file in KB.
Organization Your organization's unique ID in Office 365.
Modified By The work or school account of the user who last modified the file.
File Size The size of the file in KB.
SHA256 Hash The hash of the file. You can use this to look up other reputation stores you may have or
investigate where else the file might be in your environment.

Managing messages and files in quarantine


After you select a message or group of messages you have several options for managing messages in quarantine.
Do nothing. If you choose to do nothing, the message will be deleted by Office 365 automatically upon
expiration. By default, spam, bulk, malware, phishing, and messages quarantined because they matched a
mail flow rule are kept in quarantine for 30 days. When Office 365 deletes a message from quarantine, you
can't get it back. If you like, you can change the retention period for quarantined messages by configuring
the Retain spam for (days) setting in your anti-spam policies. For more information, see Setting the
quarantine retention period in this article.
View message header Choose this link to see the message header text. To analyze the header in depth,
copy the message header text to your clipboard, and then choose Microsoft Message Header Analyzer
to go to the Remote Connectivity Analyzer (right-click and choose Open in a new tab if you don't want to
leave Office 365 to complete this task).Paste the message header onto the page in the Message Header
Analyzer section, and choose Analyze headers.
Preview message Lets you see raw or HTML versions of the message body text. In the HTML view, links
are disabled.
Download message or Download file. Choose this option to download a copy of the message or file to
your local device. You'll need to confirm that you understand the risks associated with downloading items
from quarantine before you'll be allowed to do so. Messages are saved in .eml format to a folder you
specify. Quarantined files are saved in their original format.
Delete If you want, you can immediately delete a quarantined item (or set of items) instead of waiting for
the expiration date set by Office 365. To delete a message or file, in the quarantine list, select the item and
then choose Delete. To delete multiple items at once, select the checkbox to the left of the items in the
quarantine list, and then on the Bulk actions page that appears, choose Delete selected messages or
Delete selected files.
Release Release a quarantined item (or set of items) and report the items as falsely quarantined (false
positives) to Microsoft.
To release and report a single message or file, in the quarantine list, select the item, choose Release file or
Release message. On the next page, ensure that report messages to Microsoft for analysis or report
files to Microsoft for analysis is selected.
To release multiple items at once, select the checkbox to the left of the items in the quarantine list, and then
on the Bulk actions page that appears, choose Release files or Release messages. On the next page,
ensure that report messages to Microsoft for analysis or report files to Microsoft for analysis is
selected.
When you're releasing messages, be aware of the following:
When you perform a bulk release of multiple messages at once, the messages are released to all originally
identified recipients. If you only want to release messages only to specific recipients, you need to release
the messages one at a time and identify the recipients individually.
A message cannot be released more than once to the same recipient.
When you're releasing a message to more than one recipient, only recipients who have not previously
received the message will appear in the list of potential recipients.
When you choose to report false positives, if the message or messages you release were quarantined as
spam, bulk, phishing, or as containing malware, the message will also be reported to the Microsoft Spam
Analysis Team. The team will evaluate and analyze the message, and, depending on the results of the
analysis, the service-wide spam content filter rules may be adjusted to allow the message through.

Setting the quarantine retention period


You can configure how long messages and files will remain in quarantine before they expire. By default,
quarantined items are kept for 30 days. You configure this setting for each policy that you create. You can also
modify the value for the default policy as described in this article.
To modify the quarantine retention period for the default spam filter policy in the Security and Compliance
Center
1. Using a work or school account that has global administrator privileges in your Office 365 organization,
sign in to Office 365 and go to the Security and Compliance Center.
2. On the left, expand Threat Management, choose Policy, and then choose Anti-spam.

TIP
To go directly to the anti-spam page in the Security & Compliance Center, use this URL: >
https://protection.office.com/?hash=/antispam

3. Choose Custom to display the Custom settings tab.


4. Expand the Default spam filter policy (always ON ) row.
5. Choose Edit policy. The settings for the default spam filter policy appear in a new page.
6. Expand Spam and bulk actions.
7. Under Quarantine, in the Retain spam for (days) text box, enter the amount of time you want Office 365
to retain messages and files in quarantine. The default is 30 days. This is also the maximum.
8. Choose Save.
Find and release quarantined messages as a user in
Office 365
9/25/2018 • 5 minutes to read • Edit Online

As an Office 365 user, you can manage messages that were sent to quarantine instead of sent to you in one of two
ways: by responding to spam notifications sent to you directly (if your admin has set this up), or by using the
Security & Compliance Center.

NOTE
If you're an admin, you can manage quarantined messages for other people in your organization.

View messages that were sent to quarantine instead of to you


1. Sign in to Office 365 and go to the Security and Compliance Center using your work or school account.
2. On the left, expand Threat Management, choose Review, and then choose Quarantine.

TIP
To go directly to the Quarantine page in the Security & Compliance Center, use this URL: >
https://protection.office.com/?hash=/quarantine

By default, the Security & Compliance Center displays all email messages that have been quarantined as spam.
The messages are sorted from newest to oldest based on the Date the message was received. Sender, Subject,
and the expiration date (under Expires ) are also displayed for each message. You can sort on a field by clicking the
corresponding column header; click a column header a second time to reverse the sort order.
You can view a list of all quarantined messages, or you can search for specific messages by filtering. You can only
do bulk operations on up to 100 items, so filtering can also help reduce your result set if you have more than that.
You can quickly filter messages for a single quarantine reason by choosing an option from the drop-down list.
Options include:
Mail identified as spam. These quarantined messages are shown by default.
Mail identified as bulk mail.
After you find a specific quarantined message, click the message to view details about it, and take actions. You can
release the message to your mailbox, preview the message, download the message, or delete the message from
quarantine immediately.

NOTE
You must have admin permissions in Office 365 to work with quarantined messages that were sent to other users.

To filter and find quarantined messages


If you have a lot of quarantined items, you can reduce the number to a manageable set by filtering them.
1. On the Quarantine page, choose whether you want to view spam or bulk quarantined messages.
2. Under Sort results by, choose any combination of conditions by setting the appropriate filter or filters (you
can't use wildcards at this time). There are several conditions you can choose, including the following:
Message ID Use this to select a specific message when you know the message ID.
For example, if a specific message is sent by, or intended for, a user in your organization, but it never
reached its destination, you can search for the message by using a message trace (see Run a Message trace
and View Results). If you discover that the message was sent to quarantine, perhaps because it matched a
mail flow rule or was identified as spam, you can then easily find this message in quarantine by specifying
its Message ID. Be sure to include the full Message ID string. This might include angle brackets (<>), for
example:
<79239079-d95a-483a-aacf-e954f592a0f6@XYZPR00BM0200.contoso.com\>
Sender email address Choose to filter by a single sender email address.
Recipient email address Choose to filter by a single recipient email address.
Subject Enter the subject of an email address you want to find.
Date range You can choose to filter by the date the message was sent to quarantine. You can specify the
date or a date range, including the time.
Expiration date To filter by expiration date, choose Advanced filter. You can select messages that will be
deleted from quarantine within the next 24 hours ( Today), within the next 48 hours ( Next 2 days), within
the next week ( Next 7 days), or you can select a custom time interval.

IMPORTANT
By default, spam and bulk messages are kept in quarantine for 30 days. However, this time period is configurable and
your admin might have set a different quarantine retention period. When Office 365 deletes a message from
quarantine, you can't get it back.

View details for a specific message


After you select a message, you'll see a summary of the message properties in a pane on the right side of the page.
Message ID: The unique identifier for the message.
Sender Address: Who sent the message.
Received: The date the message was received.
Subject: The text of the Subject line in the message.
Quarantine reason: Shows if a message has been identified as Spam or Bulk.
Expires: The date when the message will be deleted from quarantine.
Released to: All email addresses (if any) to which the message has been released.
Not yet released to: All email addresses (if any) to which the message has not been released. You can
choose Release if you want to release the message to your mailbox (more about releasing messages in the
next section).
You can get even more details about the message by choosing one of the following options:
View message header Choose this to see the message header text. To analyze the header in depth, copy
the message header text to your clipboard, and then choose Microsoft Message Header Analyzer to go
to the Remote Connectivity Analyzer (right-click and choose Open in a new tab if you don't want to leave
Office 365 to complete this task). Paste the message header onto the page in the Message Header Analyzer
section, and choose Analyze headers.
Preview message Lets you see raw or HTML versions of the message body text. In the HTML view, links
are disabled.

Manage your quarantined messages


After you select a message or group of messages, you have several options for managing messages in quarantine.
Do nothing. If you choose to do nothing, the message will be deleted by Office 365 automatically upon
expiration. Remember, when Office 365 deletes a message from quarantine, you can't get it back.
Release message Release a quarantined message (or set of messages) so that the message is sent to your
mailbox. When you release a message, you have the option to report the message to Microsoft for analysis.
When you choose to report a message, also called reporting a message as a false positive, the message is
reported to the Microsoft Spam Analysis Team. The team evaluates and analyzes false positive messages,
and, depending on the results of the analysis, the service-wide spam content filter rules may be adjusted to
allow these messages through.
Download message Lets you download the message as a .eml file. Once you download a message, you
can review the .eml file using your email client prior to releasing the message.
Remove from quarantine Deletes the message immediately from quarantine without releasing the
message to your mailbox.
Quarantine FAQ
8/21/2018 • 3 minutes to read • Edit Online

This topic provides frequently asked questions and answers about the hosted quarantine. Answers are applicable
for Microsoft Exchange Online and Exchange Online Protection customers.
Q. How do I manage malware-quarantined messages in quarantine?
You need to use the Security & Compliance Center in order to view and work with messages that were sent to
quarantine because they contain malware. For more information, see Quarantine email messages in Office 365.
Q. How do I configure the service to send spam -quarantined messages to the quarantine?
A. By default, content-filtered messages are sent to the recipients Junk Email folder. However, admins can
configure content filter policies to send spam-quarantined messages to the quarantine instead. For more
information about the different actions that can be performed on content-filtered messages, see Configure your
spam filter policies.
Q. Does the service have administrator and end user management of spam -quarantined messages?
A. As an administrator, you can search for and view details about all quarantined email messages in the Exchange
admin center (EAC ). After locating the message, you can release it to specific users and optionally report it as a
false positive (not junk) to the Microsoft Spam Analysis Team. For more information, see Find and release
quarantined messages as an administrator.
As an end user, you can manage your own spam-quarantined messages via:
The spam quarantine user interface. For more information, see Find and Release Quarantined Messages (End
Users).
Q. How do I grant access to the spam quarantine for my end users?
A. In order to access the end user spam quarantine, end users must have a valid Office 365 user ID and password.
EOP customers protecting on-premises mailboxes must be valid email users created via directory synchronization
or the EAC. For more information about managing users, EOP admins can refer to Manage mail users in EOP. For
EOP standalone customers, we recommend using directory synchronization and enabling Directory Based Edge
Blocking; for more information, see Use Directory Based Edge Blocking to Reject Messages Sent to Invalid
Recipients.
Q. Can anything other than spam be sent to the quarantine?
A. Messages that match a transport rule can also be sent to the administrator quarantine, if that's the configured
action. The end user quarantine is for spam only.
Q. For how long are messages kept in the quarantine?
A. By default, spam-quarantined messages are kept in the quarantine for 15 days, while quarantined messages
that matched a transport rule are kept in the quarantine for 7 days. After this period of time the messages are
deleted and are not retrievable. The retention period for quarantined messages that matched a transport rule is
not configurable. However, the retention period for spam-quarantined messages can be lowered via the Retain
spam for (days) setting in your content filter policies. For more information, see Configure your spam filter
policies.
Q. Can I release or report more than one quarantined message at a time?
A. The ability to release or report multiple messages at once is not currently available in the EAC or the end user
spam quarantine. However, admins can create a remote Windows PowerShell script to accomplish this task. Use
the Get-QuarantineMessage cmdlet to search for messages, and the Release-QuarantineMessage cmdlet to
release them.
Q. Are wildcards supported when searching for quarantined messages? Can I search for quarantined
messages for a specific domain?
A. Wildcards are not supported when specifying search criteria in the Exchange admin center. For example, when
searching for a sender, you must specify the full email address.
Using remote Windows PowerShell, admins can specify the Get-QuarantineMessage cmdlet to search for
quarantined messages for a specific domain (for example, contoso.com):

Get-QuarantineMessage | ? {$_.Senderaddress -like "*@contoso.com"}

The results can be passed to the Release-QuarantineMessage cmdlet. Include the -ReleaseToAll parameter to
release the message to all recipients. Once a message is released, it can't be released again.

Get-QuarantineMessage | ? {$_.Senderaddress -like "*@contoso.com"}


Use user spam notifications to release and report
quarantined messages in Office 365
8/21/2018 • 2 minutes to read • Edit Online

If your admin enables spam notifications for users, you'll receive a notification message that lists messages
addressed to your mailbox that were identified as spam and quarantined instead.

TIP
If you're an administrator and want to enable this feature, you can choose the option when you modify a default anti-spam
policy.

The message you receive includes the number of spam-quarantined messages you have, and the date and time (in
Universal Coordinated Time or UTC ) of the last message in the list. The list includes the following for each
message:
Sender The send name and email address of the quarantined message.
Subject The subject line text of the quarantined message.
Date The date and time (in UTC ) that the message was quarantined.
Size The size of the message, in kilobytes (KBs).
Currently, there are two actions you can take with a quarantined message:
Release to Inbox Choose this to send the message to your inbox, where you can view it.
Report as Not Junk Choose this to send a copy of the message to Microsoft for analysis. The spam team
evaluates and analyzes the message, and, depending on the results of the analysis, adjusts the anti-spam
filter rules to allow the message through.
Be aware of the following:
Messages that are quarantined because they matched a mail flow rule are not included in user quarantined
messages. Only spam-quarantined messages are listed.
You can only release a message and report it as a false positive (not junk) once.
Privileged access management in Office 365
10/25/2018 • 4 minutes to read • Edit Online

IMPORTANT
This topic covers deployment and configuration guidance for features only currently available in Office 365 E5 and Advanced
Compliance SKUs.

Privileged access management allows granular access control over privileged admin tasks in Office 365. It can
help protect your organization from breaches that may use existing privileged admin accounts with standing
access to sensitive data or access to critical configuration settings. After enabling privileged access management,
users will need to request just-in-time access to complete elevated and privileged tasks through an approval
workflow that is highly scoped and time-bound. This gives users just-enough-access to perform the task at hand,
without risking exposure of sensitive data or critical configuration settings. Enabling privileged access
management in Office 365 will enable your organization to operate with zero standing privileges and provide a
layer of defense against vulnerabilities arising because of such standing administrative access.

Layers of protection
Privileged access management complements other data and access feature protections within the Office 365
security architecture. By enabling privileged access management as part of an integrated approach to security and
protecting your organization, a layered security model can be used to maximize protection of sensitive information
and Office 365 configuration settings. As shown in the diagram below, enabling privileged access management
helps builds on the protection provided with native encryption of Office 365 data and the role based access control
security model of Office 365 services. When used in conjunction with Azure AD Privileged Identity Management,
these two features provide access control with just-in-time access at different scopes.

Privileged access management in Office 365 can be defined and scoped at the task level, while Azure AD
Privileged Identity Management applies protection at the role level with the ability to execute multiple tasks. Azure
AD Privileged Identity Management primarily allows managing accesses for AD roles and role groups, while
privileged access management in Office 365 is applied only at the task level.
Enabling privileged access management in Office 365 while already using Azure AD Privileged
Identity Management: Adding privileged access management in Office 365 provides another granular
layer of protection and audit capabilities for privileged access to Office 365 data.
Enabling Azure AD Privileged Identity Management while already using privileged access
management in Office 365: Adding Azure AD Privileged Identity Management to privileged access
management in Office 365 can extend privileged access to data outside of Office 365 that’s primarily
defined by a user’s role or identity.

Privileged access management architecture and process flow


Each of the following process flows outline the architecture of priveleged access and how it interacts with the
Office 365 substrate, Office 365 auditing, and the Exchange Management runspace.
Step 1: Configuring a privileged access policy
When configuring a privileged access policy using either the Office 365 Admin Center or Exchange Management
PowerShell, you create and define the policy and the privileged access feature processes the policy attributes in the
Office 365 substrate and logs the activity in the Office 365 Security and Compliance Center. The policy is now
enabled and ready to handle incoming requests for approvals.

Step 2: Access request


Using the Office 365 Admin Center or Exchange Management PowerShell, users can request access to elevated or
privileged tasks. The privileged access feature sends the request to the Office 365 substrate for processing against
the configured privilege access policy and records the sctivity in the Office 365 Security and Compliance Center
logs.

Step 3: Access approval


An approval request is generated and the approval group is notified by email of the pending request. If approval is
granted, the privileged access request is processed as an approval and the task is ready to be completed. If the
request is denied, task is block and no access is granted to the reqeustor. The requestor will be notified of the
request approval or denial via email message.
Step 4: Access processing
For approved requests, the task is processed by the Exchange Management runspace. The approval is checked
against the privileged access policy and processed by the Office 365 substrate. All activity for the task is logged in
the Office 365 Security and Compliance Center.

Frequently asked questions


What SKUs do I need to use privileged access in Office 365?
Privileged access management is currently only available for customers with Office 365 E5 and Advanced
Compliance SKUs.
When will privileged access be available for Office 365 workloads beyond Exchange?
We plan to offer this feature in other Office 365 workloads soon. When we’re ready to share a timeline, it will be
available through the Office 365 roadmap.
My organization needs more than 30 privileged access polices, will this limit be increased?
We're planning to increase the current limit of 30 privileged access policies per Office 365 organization soon.
Do I need to be a Global Admin to manage privileged access in Office 365?
No, you need to have the Exchange Role Management role assigned to accounts that will manage privileged
access in Office 365. However, the Global Administrator role includes this role by default and can be used to
manage privileged access if you don’t want to configure the Role Management role as a stand-alone account
permission. Users who are included in an approvers’ group don't need to be a Global Admin or have the Role
Management role assigned to review and approve requests.
How is privileged access management in Office 365 related to Customer Lockbox?
Customer Lockbox allows a level of access control for organizations for access to to data by their service provider,
i.e. Microsoft. Privileged access management in Office 365 allows granular access control within an organization
for all Office 365 privileged tasks.
Configuring privileged access management in Office
365
10/12/2018 • 7 minutes to read • Edit Online

IMPORTANT
This topic covers deployment and configuration guidance for features only currently available in Office 365 E5 and Advanced
Compliance SKUs.

This topic will guide you through enabling and configuring privileged access management in your Office 365
organization. You can use either the Microsoft 365 Admin Center or Exchange Management PowerShell to
manage and use privileged access.

Enable and configure privileged access management


Follow these steps to set up and use privileged access in your Office 365 organization:
Step 1: Create an approver's group
Before you start using privilege access, determine who will have approval authority for incoming requests
for access to elevated and privileged tasks. Any user who is part of the Approvers’ group will be able to
approve access requests. This is enabled by creating a mail-enabled security group in Office 365.
Step 2: Enable privileged access
Privileged access needs to be explicitly turned on in Office 365 with the default approver group and
including a set of system accounts that you’d want to be excluded from the privileged access management
access control.
Step 3: Create an access policy
Creating an approval policy allows you to define the specific approval requirements scoped at individual
tasks. The approval type options are Auto or Manual.
Step 4: Submit/approve privileged access requests
Once enabled, privileged access requires approvals for executing any task that has an associated approval
policy defined. Users needing to execute tasks included in the an approval policy must request and be
granted access approval in order to have permissions necessary to execute the task.
After approval is granted, the requesting user can execute the intended task and privileged access will authorize
and execute the task on users’ behalf. The approval remains valid for the requested duration (default duration is 4
hours), during which the requester can execute the intended task multiple times. All such executions are logged
and made available for security and compliance auditing.
NOTE
If you want to use Exchange Management PowerShell to enable and configure privileged access, follow the steps in Connect
to Exchange Online PowerShell using Multi-Factor authentication to connect to Exchange Online PowerShell with your Office
365 credentials. You do not need to enable multi-factor authentication for your Office 365 organization to use the steps to
enable privileged access while connecting to Exchange Online PowerShell. Connecting with multi-factor authentication
creates an OAuth token that is used by privileged access for signing your requests.

Step 1 - Create an approver's group


1. Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
2. In the Admin Center, go to Groups > Add a group.
3. Select the mail-enabled security group group type and then complete the Name, Group email address,
and Description fields for the new group.
4. Save the group. It may take a few minutes for the group to be fully configured and to appear in the Office
365 Admin Center.
5. Select the new approver's group and select edit to add users to the group.
6. Save the group.

Step 2 - Enable privileged access


Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Enable the Require approvals for privileged access control.
4. Assign the approver's group you created in Step 1 as the Default approvers group.
5. Save and Close.
Using Exchange Management PowerShell
Run the following command in Exchange Online PowerShell to enable privileged access and to assign the
approver's group:

Enable-ElevatedAccessControl -AdminGroup '<default approver group>' -SystemAccounts


@('<systemAccountUPN1>','<systemAccountUPN2>')

Example:

Enable-ElevatedAccessControl -AdminGroup 'pamapprovers@fabrikam.onmicrosoft.com' -SystemAccounts


@('sys1@fabrikamorg.onmicrosoft.com', sys2@fabrikamorg.onmicrosoft.com')

NOTE
System accounts feature is made available to ensure certain automations within your organizations can work without
dependency on privileged access, however it is recommended that such exclusions be exceptional and those allowed should
be approved and audited regularly.
Step 3 - Create an access policy
You can create and configure up to 30 privileged access policies for your Office 365 organization.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Select Manage access policies and requests.
4. Select Configure policies and select Add a policy.
5. From the drop-down fields, select the appropriate values for your organization:
Policy type: Task, Role, or Role Group
Policy scope: Exchange or Office 365
Policy name: Select from the available policies
Approval type: Manual or Auto
Approval group: Select the approvers group created in Step 1
6. Select Create and then Close. It may take a few minutes for the policy to be fully configured and enabled.
Using Exchange Management PowerShell
Run the following command in Exchange Online PowerShell to create and define an approval policy:

New-ElevatedAccessApprovalPolicy -Task 'Exchange\<exchange management cmdlet name>' -ApprovalType <Manual,


Auto> -ApproverGroup '<default/custom approver group>'

Example:

New-ElevatedAccessApprovalPolicy -Task 'Exchange\New-MoveRequest' -ApprovalType Manual -ApproverGroup


'mbmanagers@fabrikamorg.onmicrosoft.com'

Step 4: Submit/approve privileged access requests


Requesting elevation authorization to execute privileged tasks
Requests for privileged access are valid for up to 24 hours after the request is submitted. If not approved or
denied, the requests expire and access is not approved.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using your credentials.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Select Manage access policies and requests.
4. Select New request. From the drop-down fields, select the appropriate values for your organization:
Request type: Task, Role, or Role Group
Request scope: Exchange
Request for: Select from the available policies
Duration (hours): Number of hours of requested access. There isn't a limit on the number of hours that
can be requested.
Comments: Text field for comments related to your access request
5. Select Save and then Close. Your request will be sent to the approver's group via email.
Using Exchange Management PowerShell
Run the following command in Exchange Online PowerShell to create and submit an approval request to the
approver's group:

New-ElevatedAccessRequest -Task 'Exchange\<exchange management cmdlet name>' -Reason '<appropriate reason>' -


DurationHours <duration in hours>

Example:

New-ElevatedAccessRequest -Task 'Exchange\New-MoveRequest' -Reason 'Attempting to fix the user mailbox error'
-DurationHours 4

View status of elevation requests


After an approval request is created, elevation request status can be reviewed in the Admin Center or in Exchange
Management PowerShell using the associated with request ID.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using your credentials.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Select Manage access policies and requests.
4. Select View to filter submitted requests by Pending, Approved, Denied, or Customer Lockbox status.
Using Exchange Management PowerShell
Run the following command in Exchange Online PowerShell to view a approval request status for a specific
request ID:

Get-ElevatedAccessRequest -Identity <request ID> | select RequestStatus

Example:

Get-ElevatedAccessRequest -Identity 28560ed0-419d-4cc3-8f5b-603911cbd450 | select RequestStatus

Approving an elevation authorization request


When an approval request is created, members of the relevant approver group will receive an email notification
and can approve the request associated with the request ID. The requestor will be notified of the request approval
or denial via email message.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using your credentials.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Select Manage access policies and requests.
4. Select a listed request to view the details and to take action on the request.
5. Select Approve to approve the request or select Deny to deny the request. Previously approved requests
can have access revoked by selecting Revoke.
Using Exchange Management PowerShell
Run the following command in Exchange Online PowerShell to approve an elevation authorization request:

Approve-ElevatedAccessRequest -RequestId <request id> -Comment '<approval comment>'

Example:

Approve-ElevatedAccessRequest -RequestId a4bc1bdf-00a1-42b4-be65-b6c63d6be279 -Comment '<approval comment>'

Run the following command in Exchange Online PowerShell to deny an elevation authorization request:

Deny-ElevatedAccessRequest -RequestId <request id> -Comment '<denial comment>'

Example:

Deny-ElevatedAccessRequest -RequestId a4bc1bdf-00a1-42b4-be65-b6c63d6be279 -Comment '<denial comment>'

Delete a privileged access policy in Office 365


You can delete a privileged access policy if it is no longer needed in your organization.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Select Manage access policies and requests.
4. Select Configure policies.
5. Select the policy you want to delete, then select Remove Policy.
6. Select Close.
Using Exchange Management PowerShell
Run the following command in Exchange Online Powershell to delete a privileged access policy:

Remove-ElevatedAccessApprovalPolicy -Identity <identity GUID of the policy you want to delete>

Disable privileged access in Office 365


If needed, you can disable privileged access management for your organization. Disabling privileged access does
not delete any associated approval policies or approver groups.
Using the Microsoft 365 Admin Center
1. Sign into the Microsoft 365 Admin Center using credentials for an admin account in your organization.
2. In the Admin Center, go to Settings > Security & Privacy > Privileged access.
3. Enable the Require approvals for privileged access control.
Using Exchange Management PowerShell
Run the following command in Exchange Online Powershell to disable privileged access:

Disable-ElevatedAccessControl
Search for content in Office 365
11/8/2018 • 3 minutes to read • Edit Online

Use the Content Search tool in the Security & Compliance Center to quickly find email in Exchange mailboxes,
documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for
Business. You can use the content search tool to search for email, documents, and instant messaging
conversations in Office 365 collaboration tools such as Microsoft Teams and Office 365 Groups.

Search for content


The first step is to starting using the Content Search tool to choose content locations to search and configure a
keyword query to search for specific items. Or, you can just leave the query blank and return all items in the target
locations.
Create and run a content search
Build search queries and use conditions to narrow your search
Configure search permissions filtering so that an eDiscovery manager can only search subset of mailboxes
or sites in your organization
Run an ID list search to search for specific email messages
Search cloud-based mailboxes for on-premises users in Office 365
View keyword statistics for the results of a search and then refine the query if necessary
Search for third-party data that your organization has imported to Office 365
Bulk edit the query and content locations for multiple searches
Preserve Bcc recipients so you can search for them

Perform actions on content you find


After you run a search and refine it as necessary, the next step is to do something with the results returned by the
search. You can export and download the results to your local computer or in the case of a email attack on your
organization, you can delete the results of a search from user mailboxes.
Export the results of a content search and download them to your local computer
Search for and delete email messages , such as messages that content a virus, dangerous attachment or
phishing messages
Export a report about the results of a content search, without exporting the actual results
Increase the download speed when you export search results

Learn more about content search


Content Search is easy to use, but it's also a powerful tool. Behind-the-scenes, there's a lot going on. The more you
know about it and understand its behavior and its limitations, the more successful you'll be using it for your
organization's search and investigation needs. Learn about:
Partially indexed items in Exchange and SharePoint and how to include or exclude them when you export
and download search results
Investigate partially indexed items and determine your organization's exposure to them
Limits of the Content Search tool, such as the maximum number of searches that you can run at one time
and the maximum number of content locations you can include in a single search
Estimated and actual search results and the reasons why there might be differences between them when
you export and download search results
De-duplication in search results that you can enable when you export email messages that are the results of
a search

Use scripts for advanced scenarios


Sometimes you have to perform more advanced, complex, and repetitive content search tasks. In these cases, it's
easier and fast to use PowerShell commands in the Security & Compliance Center. To help make this easier, we've
created a number of Security & Compliance Center PowerShell scripts to help you complete complex content
search-related tasks.
Search specific mailbox and site folders (called a targeted collection ) when you're confident that items
responsive to a case are located in that folder
Search the mailbox and OneDrive location for a list of users
Create, report on, and delete multiple searches to quickly and efficiently identify and cull search data
Clone a content search and quickly compare the results of different keyword search queries run on the
same content locations; or use the script to save time by not having to re-enter a large number of content
locations when you create a new search
Content Search in Office 365
12/7/2018 • 21 minutes to read • Edit Online

You can use the Content Search eDiscovery tool in the Office 365 Security & Compliance Center to search for in-
place items such as email, documents, and instant messaging conversations in your Office 365 organization. Use
this tool to search for items in these Office 365 services:
Exchange Online mailboxes and public folders
SharePoint Online sites and OneDrive for Business accounts
Skype for Business conversations
Microsoft Teams
Office 365 Groups
After you run a Content Search, the number of content locations and an estimated number of search results are
displayed in the search profile. You can also quickly view statistics, such as the content locations that have the
most items that match the search query. After you run a search, you can preview the results or export them to a
local computer.

Create a new search


To have access to the Content search page to run searches and preview and export search results, an
administrator, compliance officer, or eDiscovery manager must be a member of the eDiscovery Manager role
group in the Security & Compliance Center. For more information, see Assign eDiscovery permissions in the
Office 365 Security & Compliance Center.
1. Go to https://protection.office.com.
2. Sign in using your Office 365 email address and password.
3. In the Security & Compliance Center, click Search & investigation > Content search.
4. On the Search page, click the arrow next to New search.

You can choose one of the following options:


Guided search - This option starts a wizard that guides you through the creating the search. The user
interface to select content locations and build the search query are the same as the New search option.
New search - This option displays an updated user interface to create a new search. This is the default
option if you click New search.
Search by ID List - This option lets you search for specific email messages and other mailbox items using
a list of Exchange IDs. To create an ID list search (formally called a targeted search), you submit a comma
separated value (CSV ) file that identifies the specific mailbox items to search for. For instructions, see
Prepare a CSV file for an ID list Content Search in Office 365.
The remainder of the steps in this procedure will follow the default new search workflow.
5. Click New search in the drop-down list.
6. Under Search query, specify the following things.

Keywords to search for - Type a search query in Keywords box. You can specify keywords, message
properties such as sent and received dates, or document properties such as file names or the date that a
document was last changed. You can use a more complex queries that use a Boolean operator, such as
AND, OR, NOT, and NEAR. You can also search for sensitive information (such as social security
numbers) in documents, or search for documents that have been shared externally. If you leave the
keyword box empty, all content located in the specified content locations will be included in the search
results.
Alternatively, you can click the Show keyword list checkbox and the type a keyword in each row. If you
do this, the keywords on each row are connected by a logical operator ( c:s) that is similar in functionality
to the OR operator in the search query that's created.
Why use the keyword list? You can get statistics that show how many items match each keyword. This can
help you quickly identify which keywords are the most (and least) effective. You can also use a keyword
phrase (surrounded by parentheses) in a row. For more information about search statistics, see View
keyword statistics for Content Search results.
[!NOTE ] To help reduce issues caused by large keyword lists, you're now limited to a maximum of 20 rows
in the keyword list.
Conditions - You can add search conditions to narrow a search and return a more refined set of results.
Each condition adds a clause to the search query that is created and run when you start the search. A
condition is logically connected to the keyword query (specified in the keyword box) by a logical operator (
c:c) that is similar in functionality to the AND operator. That means that items have to satisfy both the
keyword query and one or more conditions to be included in the results. This is how conditions help to
narrow your results. For a list and description of conditions that you can use in a search query, see the
"Search conditions" section in Keyword queries and search conditions for Content Search.
Locations - hoose the content locations to search.
All locations - Use this option to search all content locations in your organization. This includes
email in all Exchange mailboxes (including all inactive mailboxes, mailboxes for all Office 365
Groups, mailboxes for all Microsoft Teams), all Skype for Business conversations, all SharePoint and
OneDrive for Business sites (including the sites for all Office 365 Groups and Microsoft Teams), and
items in all Exchange public folders.
Specific locations - Use this option to search specific content locations. You can search all content
locations for a specific Office 365 service (such as searching all Exchange mailboxes or search all
SharePoint sites) or you can search specific locations in any of the Office 365 services that are
displayed.

Note that you can also add distribution groups to the list of Exchange mailboxes to search. For
distribution groups, the mailboxes of group members are searched. Note that dynamic distribution
groups aren't supported.
Important: When you search all mailbox locations or just specific mailboxes, data from
MyAnalytics and other Office 365 applications that's saved to user mailboxes will be included when
you export the results of a Content Search. This data will not be included in the estimated search
results and it won't be available for preview. It will only be included when you export and download
the search results; see Exporting data from MyAnalytics and other Office 365 applications in the
"More information about content search" section.
7. After you've set up your search query, click Save & run.
8. On the Save search page, type a name for the search, and an optional description that helps identify the
search. Note that the name of the search has to be unique in your organization.
9. Click Save to start the search.
After you save and run the search, any results returned by the search are displayed in the results pane.
Depending on how you have the preview setting configured, the search results are display or you have to
click Preview results to view them. See the next section for details.
To access this content search again or access other content searches listed on the Content search page, select
the search and then click Open.
To clear the results or create a new search, click New search.

Preview search results


There are two configuration settings for previewing search results. After you run a new a new search or open an
existing search, click ** Individual results ** to view the following preview settings:

1. Preview results automatically - This setting displays the search results after you a run a search.
2. Preview results manually - This setting displays placeholders in the search results pane, and displays the
Preview results button that you have to click to display the search results. This is the default setting; it
helps enhance search performance by not automatically displaying the search results when you open an
existing search.
There are limits related to how many items are available to be previewed. For more information, see Limits for
Search in the Office 365 Security & Compliance Center.
For a list of supported file types that can be previewed, see Previewing search results in the "More information
about content search" section. If a file type isn't supported for preview or to download a copy of a document, you
can click Download original file to download it to your local computer. For .aspx Web pages, the URL for the
page is included though you might not have permissions to access the page.
Also note that unindexed items aren't available for previewing.

View information and statistics about a search


After you create and run a content search, you can view statistics about the estimated search results. This includes
a summary of the search results, the query statistics such as the number of content locations with items that
match the search query, and the name of content locations that have the most matching items. You can display
statistics for one or more content searches. This lets you to quickly compare the results for multiple searches and
make decisions about the effectiveness of your search queries.
You can also download the search statistics and keyword statistics to a CSV file. This lets you use the filtering and
sorting features in Excel to compare results, and prepare reports for your search results.
To view search statistics:
1. On the Content search page in the Security & Compliance Center, click Open and then click the search
that you want to view the statistic for.
2. On the fly out page, click Open query.
3. In the Individual results drop down list, click Search profile.
4. In the Type drop down list, click one of the following options depending on the search statistics you want
to view.
Summary - Displays statistics for each type of content locations searched. This contents the number of
content locations that contained items that matched the search query, and the total number and size of
search result items. This is the default setting.
Queries - Displays statistics about the search query. This includes the type of content location the query
statistics are applicable to, part of the search query the statistics are applicable to (note that Primary
indicates the entire search query), the number of the content locations that contain items that match the
search query, and the total number and size and items that were found (in the specified content location)
that match the search query. Note that statistics for unindexed items (also called partially indexed items)
are also displayed. However, only partially indexed items from mailboxes are included in the statistics.
Partially indexed items from SharePoint and OneDrive are not included in the statistics.
Top locations - Displays statistics about the number of items that match the search query in each content
location that was searched. The top 1,000 locations are displayed.
For more detailed information about search statistics, see View keyword statistics for Content Search results.

Export search results


After a search is successfully run, you can export the search results to a local computer. When you export email
results, they can be downloaded to your computer as PST files or as individual messages (.msg files). When you
export content from SharePoint and OneDrive sites, copies of native Office documents are exported. There are
also additional documents and reports that are included with the exported search results. You can also just export
the search results report and not the actual items.
To export search results:
1. On the Content search page in the Security & Compliance Center, click Open and then click the search
that you want to export the search results for.
2. On the fly out page, click More, and then click Export results. Note that you can also export a search
results report.
3. Complete the sections on the Export results fly out page. Be sure to use the scroll bar to view all export
options.
For more detailed instructions and troubleshooting tips, see:
Export search results from the Office 365 Security & Compliance Center
Export a Content Search report

More information about content search


See the following sections for more information about content searches.
Content search limits
Building a search query
Searching OneDrive accounts
Searching Microsoft Teams and Office 365 Groups
Searching inactive mailboxes
Previewing search results
Partially indexed items
Exporting data from MyAnalytics and other Office 365 applications
Content search limits
For a description of the limits that are applied to the Content Search feature, see Limits for Search in the
Office 365 Security & Compliance Center.
Microsoft collects performance information for Content Searches run by all Office 365 organizations.
While the complexity of the search query can impact search times, the biggest factor that affects how long
searches take is the number of mailboxes searched. Although Microsoft doesn't provide a Service Level
Agreement for search times, the following table lists average search times for a Content Search based on
the number of mailboxes included in the search.

NUMBER OF MAILBOXES AVERAGE SEARCH TIME

100 30 seconds

1,000 45 seconds

10,000 4 minutes

25,000 10 minutes

50,000 20 minutes

100,000 25 minutes

Building a search query


For detailed information about creating a search query, using Boolean search operators and search conditions,
and searching for sensitive information types and content shared with users outside your organization, see
Keyword queries and search conditions for Content Search .
Keeping the following things in mind when using the keyword list to create a search query.
You have to select the Show keyword list checkbox and then type each keyword in a separate row to
create a search query where the keywords (or keyword phrases) in each row are connected by the OR
operator. If you just paste a list of keywords in the keyword box or press the Enter key after typing a
keyword, they won't be connected by the OR operator. Here are incorrect and correct example of adding a
list of keywords.
Incorrect
Correct

You can also prepare a list of keywords or keyword phrases in an Excel file or a plain text file, and then
copy and paste your list in to the keyword list. To do this, you have to select the Show keyword list check
box. Then, click the first row in the keyword list and paste your list. Each line from the Excel or text file will
be pasted in to separate row in the keyword list.
After you create a query using the keyword list, it's a good idea to verify the search query syntax to make
the search query is what you intended. In the search query that's displayed under Query in the details
pane, the keywords are separated by the text (c:s). This indicates that the keywords are connected by a
logical operator similar in functionality to the OR operator. Similarly, if your search query includes
conditions, the keywords and the conditions are separated by the text (c:c). This indicates that the
keywords are connected to the conditions with a logical operator similar in functionality to the AND
operator. Here's an example of the search query (displayed in the Details pane) that results when using the
keyword list and a condition.

When you run a content search, Office 365 automatically checks your search query for unsupported
characters and for Boolean operators that might not be capitalized. Unsupported characters are often
hidden and typically cause a search error or return unintended results. For more information about the
unsupported characters that are checked, see Check your Content Search query for errors.
If you have a search query that contains keywords for non-English characters (such as Chinese characters),
you can click Query language-country/region and select a language-country culture code value for
the search. Note that the default language/region is neutral. How can you tell if you need to change the
language setting for a content search? If you're certain content locations contain the non-English
characters you're searching for, but the search returns no results, the language setting might be the cause.
Searching OneDrive accounts
To collect a list of the URLs for the OneDrive sites in your organization, see Create a list of all OneDrive
locations in your organization. This script in this article creates a text file that contains a list of all OneDrive
sites. To run this script, you'll have to install and use the SharePoint Online Management Shell. Be sure to
append the URL for your organization's MySite domain to each OneDrive site that you want to search.
This is the domain that contains all your OneDrive; for example, https://contoso-my.sharepoint.com .
Here's an example of a URL for a user's OneDrive site:
https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft.com .

In the rare case that a person's user principal name (UPN ) is changed, the URL for their OneDrive location
will also be changed to incorporate the new UPN. If this happens, you'll have to modify a content search
by adding the user's new OneDrive URL and removing the old one.
Searching Microsoft Teams and Office 365 Groups
You can search the mailbox that's associated with an Office 365 Group or a Microsoft Team. Because Microsoft
Teams are built on Office 365 Groups, searching them is very similar. In both cases, only the group or team
mailbox is searched; the mailboxes of the group or team members aren't searched. To search them, you have to
specifically add them to the search.
Keep the following things in mind when searching for content in Microsoft Teams and Office 365 Groups.
To search for content located in Microsoft Teams and Office 365 Groups, you have to specify the mailbox
and SharePoint site that are associated with a team or group.
Run the Get-UnifiedGroup cmdlet in Exchange Online to view properties for a Microsoft Team or an
Office 365 Group. This is a good way to get the URL for the site that's associated with a team or a group.
For example, the following command displays selected properties for an Office 365 Group named Senior
Leadership Team:

Get-UnifiedGroup "Senior Leadership Team" | FL DisplayName,Alias,PrimarySmtpAddress,SharePointSiteUrl


DisplayName : Senior Leadership Team
Alias : seniorleadershipteam
PrimarySmtpAddress : seniorleadershipteam@contoso.onmicrosoft.com
SharePointSiteUrl : https://contoso.sharepoint.com/sites/seniorleadershipteam

NOTE
To run the Get-UnifiedGroup cmdlet, you have to be assigned the View-Only Recipients role in Exchange Online or
be a member of a role group that's assigned the View-Only Recipients role.

When a user's mailbox is searched, any Microsoft Team or Office 365 Group that the user is a member of
won't be searched. Similarly, when you search a Microsoft Team or an Office 365 Group, only the group
mailbox and group site that you specify is searched; the mailboxes and OneDrive for Business accounts of
group members aren't searched unless you explicitly add them to the search.
To get a list of the members of a Microsoft Team or an Office 365 Group, you can view the properties on
the Home > Groups page in the Office 365 admin center. Alternatively, you can run the following
command in Exchange Online PowerShell:

Get-UnifiedGroupLinks <group or team name> -LinkType Members | FL DisplayName,PrimarySmtpAddress

NOTE
To run the Get-UnifiedGroupLinks cmdlet, you have to be assigned the View-Only Recipients role in Exchange
Online or be a member of a role group that's assigned the View-Only Recipients role.
Conversations that are part of a Microsoft Teams channel are stored in the mailbox that's associated with
the Microsoft Team. Similarly, files that team members share in a channel are stored on the team's
SharePoint site. Therefore, you have to add the Microsoft Team mailbox and SharePoint site as a content
location to search conversations and files in a channel.
Alternatively, conversations that are part of the Chat list in Microsoft Teams are stored in the Exchange
Online mailbox of the users who participate in the chat. And files that a user shares in Chat conversations
are stored in the OneDrive for Business account of the user who shares the file. Therefore, you have to add
the individual user mailboxes and OneDrive for Business accounts as content locations to search
conversations and files in the Chat list.

NOTE
In an Exchange hybrid deployment, users with an on-premises mailbox might participate in conversations that are
part of the Chat list in Microsoft Teams. In this case, content from these conversations is also searchable because
it's saved to a cloud-based storage area (called a cloud-based mailbox for on-premises users) for users who have
an on-premises mailbox. For more information, see Searching cloud-based mailboxes for on-premises users in
Office 365.

Every Microsoft Team or team channel contains a Wiki for note-taking and collaboration. The Wiki content
is automatically saved to a file with a .mht format. This file is stored in the Teams Wiki Data document
library on the team's SharePoint site. You can use the Content Search tool to search the Wiki by specifying
the team's SharePoint site as the content location to search.

NOTE
The capability to search the Wiki for a Microsoft Team or Channel (when you search the team's SharePoint site) was
released on June 22, 2017. Wiki pages that were saved or updated on that date or after are available to be
searched. Wiki pages last saved or updated before that date aren't available for search.

Summary information for meetings and calls in a Microsoft Teams channel are also stored in the
mailboxes of users who dialed into the meeting or call. This means you can use Content Search to search
these summary records. Summary information includes:
Date, start time, end time, and duration of a meeting or call
The date and time when each participant joined or left the meeting or call
Calls sent to voice mail
Missed or unanswered calls
Call transfers, which are represented as two separate calls
Note that it can take up to 8 hours for meeting and call summary records to be available to be searched.
In the search results, meeting summaries are identified as Meeting in the Type field; call summaries are
identified as Call. Additionally, conversations that are part of a Teams channel and 1xN chats are identified
as IM in the Type field.
You can use the Kind email property or the Message kind search condition to search specifically for
content in Microsoft Teams.
To use the Kind property as part of the keyword search query, in the Keywords box of a search
query, type kind:microsoftteams .

To use a search condition, add the Message kind condition and use the value microsoftteams .
Note that conditions are logically connected to the keyword query by the AND operator. That means an item
must match both the keyword query and the search condition to be returned in the search results. For more
information, see the "Guidelines for using conditions" section in Keyword queries and search conditions for
Content Search.
Searching inactive mailboxes
You can search inactive mailboxes in a content search. To get a list of the inactive mailboxes in your organization,
run the command Get-Mailbox -InactiveMailboxOnly in Exchange Online PowerShell. Alternatively, you can go to
Data governance > Retention in the Security & Compliance Center, and then click More > Inactive
mailboxes.
Here are a few things to keep in mind when searching inactive mailboxes.
If a content search includes a user mailbox and that mailbox is then made inactive, the content search will
continue to search the inactive mailbox when you re-run the search after it becomes inactive.
In some cases, a user may have an active mailbox and an inactive mailbox that have the same SMTP
address. In this case, only the specific mailbox that you select as a location for a content search will be
searched. In other words, if you add a user's mailbox to a search, you can't assume that both their active
and inactive mailboxes will be searched; only the mailbox that you explicitly add to the search will be
searched.
We strongly recommend that you avoid having an active mailbox and inactive mailbox with the same
SMTP address. If you need to reuse the SMTP address that is currently assigned to an inactive mailbox,
we recommend that you recover the inactive mailbox or restore the contents of an inactive mailbox to an
active mailbox (or the archive of an active mailbox), and then delete the inactive mailbox. For more
information, see one of the following topics:
Recover an inactive mailbox in Office 365
Restore an inactive mailbox in Office 365
Delete an inactive mailbox in Office 365
Previewing search results
You can preview supported file types in the preview pane. If a file type isn't supported, you'll have to download a
copy of the file to your local computer to view it. The following file types are supported and can be previewed in
the search results pane.
.txt, .html, .mhtml
.eml
.doc, .docx, .docm
.pptm, .pptx
.pdf
Additionally, the following file container types are supported. You can view the list of files in the container in the
preview pane.
.zip
.gzip
Partially indexed items
As previously explained, partially indexed items in mailboxes are included in the estimated search results;
partially indexed items from SharePoint and OneDrive are not included in the estimated search results.
If a partially item matches the search query (because other message or document properties meet the
search criteria), it won't be included in the estimated number of unindexed items. If an partially item is
excluded by the search criteria, it also won't be included in the estimated number of partially indexed
items. For more information, see Partially indexed items in Content Search in Office 365.
Exporting data from MyAnalytics and other Office 365 applications
Data from MyAnalytics (such as insights on how users spend their time based on mail and calendar data
in their mailbox) and data from other Office 365 applications is a saved to a hidden location (in a non-IPM
subtree) in user's cloud-based mailbox. After you run a Content Search, this data isn't included in the
estimated search results, the query statistics, and it isn't available for preview. However this data will be
exported when you export the results of a search.
The MyAnalytics data and the data from other Office 365 applications is exported to a folder named
"Other Office 365 data". This folder includes subfolders for each user.
Keyword queries and search conditions for Content
Search
9/21/2018 • 31 minutes to read • Edit Online

This topic describes the email and document properties that you can search for in email items in Exchange Online
and documents stored on SharePoint and OneDrive for Business sites by using the Content Search feature in the
Office 365 Security & Compliance Center. You can also use the *-ComplianceSearch cmdlets in Security &
Compliance Center PowerShell to search for these properties. The topic also describes:
Using Boolean search operators, search conditions, and other search query techniques to refine your search
results.
Searching for sensitive data types and custom sensitive data types in SharePoint and OneDrive for Business.
Searching for site content that's shared with users outside of your organization
For step-by-step instructions on how to create a Content Search, see Content Search in Office 365. |

NOTE
Content Search in the Security & Compliance Center and the corresponding *-ComplianceSearch cmdlets in Security &
Compliance Center PowerShell use the Keyword Query Language (KQL). For more detailed information, see Keyword Query
Language syntax reference.

Searchable email properties


The following table lists email message properties that can be searched by using the Content Search feature in the
Security & Compliance Center or by using the New-ComplianceSearch or the Set-ComplianceSearch cmdlet.
The table includes an example of the property:value syntax for each property and a description of the search results
returned by the examples. You can type these property:value pairs in the keywords box for a Content Search.

SEARCH RESULTS RETURNED


PROPERTY PROPERTY DESCRIPTION EXAMPLES BY THE EXAMPLES

AttachmentNames The names of files attached Messages that have an


attachmentnames:annualreport.ppt
to an email message. attachmentnames:annual* attached file named
annualreport.ppt. In the
second example, using the
wildcard returns messages
with the word "annual" in the
file name of an attachment.

Bcc The BCC field of an email bcc:pilarp@contoso.com All examples return


message.1 bcc:pilarp messages with Pilar Pinilla
bcc:"Pilar Pinilla" included in the Bcc field.
SEARCH RESULTS RETURNED
PROPERTY PROPERTY DESCRIPTION EXAMPLES BY THE EXAMPLES

Category The categories to search. category:"Red Category" Messages that have been
Categories can be defined by assigned the red category in
users by using Outlook or the source mailboxes.
Outlook Web App. The
possible values are:

blue
green
orange
purple
red
yellow

Cc The CC field of an email cc:pilarp@contoso.com In both examples, messages


message.1 cc:"Pilar Pinilla" with Pilar Pinilla specified in
the CC field.

Folderid The folder ID (GUID) of a The first example returns all


folderid:4D6DD7F943C29041A65787E30F02AD1F00000000013A0000
specific mailbox folder. If you items in the specified mailbox
folderid:2370FB455F82FC44BE31397F47B632A70000000001160000
use this property, be sure to AND participants:garthf@contoso.com
folder. The second example
search the mailbox that the return all items in the
specified folder is located in. specified mailbox folder that
Note that only the specified were sent or received by
folder will be searched. Any garthf@contoso.com.
subfolders in the folder won't
be searched. To search sub-
folders, you need to use the
Folderid property for the
sub-folder you want to
search.
For more information about
searching for the Folderid
property and using a script
to obtain the folder IDs for a
specific mailbox, see Use
Content Search in Office 365
for targeted collections.

From The sender of an email from:pilarp@contoso.com Messages sent by the


message.1 from:contoso.com specified user or sent from a
specified domain.

HasAttachment Indicates whether or not a from:pilar@contoso.com Messages sent by the


message has an attachment. AND hasattachment:true specified user that have
Use the values true or false. attachments.

Importance The importance of an email importance:high Messages that are marked as


message, which a sender can importance:medium high importance, medium
specify when sending a importance:low importance, or low
message. By default, importance.
messages are sent with
normal importance, unless
the sender sets the
importance as high or low.
SEARCH RESULTS RETURNED
PROPERTY PROPERTY DESCRIPTION EXAMPLES BY THE EXAMPLES

IsRead Indicates whether or not isread:true The first example returns


messages have been read. isread:false messages with the IsRead
Use the values true or false. property set to True. The
second example returns
messages with the IsRead
property set to False.

ItemClass Use this property to search The first example returns


itemclass:ipm.externaldata.Facebook*
specific third-party data AND subject:contoso Facebook items that contain
types that your organization itemclass:ipm.externaldata.Twitter*
the word "contoso" in the
AND from:"Ann Beebe" AND "Northwind
imported to Office 365. Use Traders" Subject property. The second
the following syntax for this example returns Twitter
property: items that were posted by
itemclass:ipm.externaldata. Ann Beebe and that contain
<third-party data type>* the keyword phrase
"Northwind Traders".
For a complete list of values
to use for third-party data
types for the ItemClass
property, see Use Content
Search to search third-party
data that was imported to
Office 365.

Kind The type of email message kind:email The first example returns
to search for. Possible values: kind:email OR kind:im email messages that meet
contacts OR kind:voicemail the search criteria. The
docs kind:externaldata second example returns
email email messages, instant
externaldata messaging conversations
faxes (including Skype for Business
im conversations and chats in
journals Microsoft Teams), and voice
meetings messages that meet the
microsoftteams (returns search criteria. The third
items from chats, meetings, example returns items that
and calls in Microsoft Teams) were imported to mailboxes
notes in Office 365 from third-
posts party data sources, such as
rssfeeds Twitter, Facebook, and Cisco
tasks Jabber, that meet the search
voicemail criteria. For more
information, see Archiving
third-party data in Office
365.

Participants All the people fields in an Messages sent by or sent to


participants:garthf@contoso.com
email message; these fields participants:contoso.com garthf@contoso.com. The
are From, To, CC, and BCC.1 second example returns all
messages sent by or sent to
a user in the contoso.com
domain.

Received The date that an email received:04/15/2016 Messages that were received
message was received by a received>=01/01/2016 on April 15, 2016. The
recipient. AND second example returns all
received<=03/31/2016
messages received between
January 1, 2016 and March
31, 2016.
SEARCH RESULTS RETURNED
PROPERTY PROPERTY DESCRIPTION EXAMPLES BY THE EXAMPLES

Recipients All recipient fields in an email recipients:garthf@contoso.comMessages sent to


message; these fields are To, recipients:contoso.com garthf@contoso.com. The
CC, and BCC.1 second example returns
messages sent to any
recipient in the contoso.com
domain.

Sent The date that an email sent:07/01/2016 Messages that were sent on
message was sent by the sent>=06/01/2016 AND the specified date or sent
sender. sent<=07/01/2016 within the specified date
range.

Size The size of an item, in bytes. size>26214400 Messages larger than 25??
size:1..1048567 MB. The second example
returns messages from 1
through 1,048,567 bytes (1
MB) in size.

Subject The text in the subject line of subject:"Quarterly Messages that contain the
an email message. Financials" phrase "Quarterly Financials"
Note: When you use the subject:northwind anywhere in the text of the
Subject property in a query, subject line. The second
???the search returns all example returns all messages
messages in which the that contain the word
subject line contains the text northwind in the subject line.
you're searching for. In other
words, the query doesn't
return only those messages
that have an exact match.
For example, if you search
for
subject:"Quarterly
Financials"
, your results will include
messages with the subject
"Quarterly Financials 2018".

To The To field of an email to:annb@contoso.com All examples return


message.1 to:annb messages where Ann Beebe
to:"Ann Beebe" is specified in the To: line.

NOTE
1 For the value of a recipient property, you can use email address (also called user principal name or UPN), display name, or
alias to specify a user. For example, you can use annb@contoso.com, annb, or "Ann Beebe" to specify the user Ann Beebe.

When searching any of the recipient properties (From, To, Cc, Bcc, Participants, and Recipients), Office 365 attempts to expand
the identity of each user by looking them up in Azure Active Directory. If the user is found in Azure Active Directory, the query
is expanded to include the user's email address (or UPN), alias, display name, and LegacyExchangeDN.

For example, a query such as participants:ronnie@contoso.com expands to


participants:ronnie@contoso.com OR participants:ronnie OR participants:"Ronald Nelson" OR participants:"
<LegacyExchangeDN>"
.

Searchable site properties


The following table lists some of the SharePoint and OneDrive for Business properties that can be searched by
using the Content Search feature in the Security & Compliance Center or by using the New-ComplianceSearch
or the Set-ComplianceSearch cmdlet. The table includes an example of the property:value syntax for each
property and a description of the search results returned by the examples.
For a complete list of SharePoint properties that can be searched, see Overview of crawled and managed properties
in SharePoint. Properties marked with a Yes in the Queryable column can be searched.

SEARCH RESULTS RETURNED


PROPERTY PROPERTY DESCRIPTION EXAMPLE BY THE EXAMPLES

Author The author field from Office author:"Garth Fort" All documents that are
documents, which persists if authored by Garth Fort.
a document is copied. For
example, if a user creates a
document and the emails it
to someone else who then
uploads it to SharePoint, the
document will still retain the
original author. Be sure to
use the user's display name
for this property.

ContentType The SharePoint content type contenttype:document All documents would be


of an item, such as Item, returned.
Document, or Video.

Created The date that an item is created\>=06/01/2016 All items created on or after
created. June 1, 2016.

CreatedBy The person that created or createdby:"Garth Fort" All items created or uploaded
uploaded an item. Be sure to by Garth Fort.
use the user's display name
for this property.

DetectedLanguage The language of an item. detectedlanguage:english All items in English.

FileExtension The extension of a file; for fileextension:xlsx All Excel files (Excel 2007 and
example, docx, one, pptx, or later)
xlsx.

FileName The name of a file. filename:"marketing The first example returns files
plan" with the exact phrase
filename:estimate "marketing plan" in the title.
The second example returns
files with the word "estimate"
in the file name.

LastModifiedTime The date that an item was lastmodifiedtime>=05/01/2016 The first example returns
last changed. lastmodifiedtime>=05/10/2016 items that were changed on
AND or after May 1, 2016. The
lastmodifiedtime<=06/1/2016
second example returns
items changed between May
1, 2016 and June 1, 2016.

ModifiedBy The person who last modifiedby:"Garth Fort" All items that were last
changed an item. Be sure to changed by Garth Fort.
use the user's display name
for this property.
SEARCH RESULTS RETURNED
PROPERTY PROPERTY DESCRIPTION EXAMPLE BY THE EXAMPLES

Path The path (URL) of a specific path:https://contoso- The first example returns all
folder on a SharePoint or my.sharepoint.com/personal/garthf_contoso_com/Documents/Private
items in the specified
OneDrive for Business site. If path:"https://contoso- OneDrive for Business folder.
my.sharepoint.com/personal/garthf_contoso_com/Documents/Shared
you use this property, be The second example returns
with Everyone/*" AND filename:confidential
sure to search the site that documents in the specified
the specified folder is located site folder (and all subfolders)
in. that contain the word
To return items located in "confidential" in the file
subfolders in the folder that name.
you specify for the path
property, you have to add /*
to the URL of the specified
folder; for example,
path:
https://contoso.sharepoint.com/Shared
Documents/*
.

Note: Using the Path


property to search OneDrive
locations won't return media
files, such as .png, .tiff, or
.wav files, in the search
results. Use a different site
property in your search
query to search for media
files in OneDrive folders.

For more information about


searching for the Path
property and using a script
to obtain the path URLs for
folders on a specific site, see
Use Content Search in Office
365 for targeted collections.

SharedWithUsersOWSUser Documents that have been sharedwithusersowsuser:garthfBoth examples return all


shared with the specified internal documents that
sharedwithusersowsuser:"garthf@contoso.com"
user and displayed on the have been explicitly shared
Shared with me page in the with Garth Fort and that
user's OneDrive for Business appear on the Shared with
site. These are documents me page in Garth Fort's
that have been explicitly OneDrive for Business
shared with the specified account.
user by other people in your
organization. When you
export documents that
match a search query that
uses the
SharedWithUsersOWSUser
property, the documents are
exported from the original
content location of the
person who shared the
document with the specified
user. For more details, see
Searching for site content
shared within your
organization.
SEARCH RESULTS RETURNED
PROPERTY PROPERTY DESCRIPTION EXAMPLE BY THE EXAMPLES

Site The URL of a site or group of site:https://contoso- The first example returns
sites in your organization. my.sharepoint.com items from the OneDrive for
site:https://contoso.sharepoint.com/sites/teams
Business sites for all users in
the organization. The second
example returns items from
all team sites.

Size The size of an item, in bytes. size>=1 The first example returns
size:1..10000 items larger than 1 byte. The
second example returns
items from 1 through 10,000
bytes in size.

Title The title of the document. title:"communication Any document that contains
The Title property is plan" the phrase "communication
metadata that's specified in plan" in the Title metadata
Microsoft Office documents. property of an Office
It's different from the file document.
name of the document.

Searchable contact properties


The following table lists the contact properties that are indexed and that you can search for using Content Search.
These are the properties that are available for users to configure for the contacts (also called personal contacts) that
are located in the personal address book of a user's mailbox. To search for contacts, you can select the mailboxes to
search and then use one or more contact properties in the keyword query.

TIP
To search for values that contain spaces, use double quotation marks ("??") to contain the phrase; for example,
businessaddress:"123 Main Street" .

PROPERTY PROPERTY DESCRIPTION

BusinessAddress The address in the Business Address property. The property


is also called the Work address on the contact properties
page.

BusinessPhone The phone number in any of the Business Phone number


properties.

CompanyName The name in the Company property.

Department The name in the Department property.

DisplayName The display name of the contact. This is the name in the Full
Name property of the contact.

EmailAddress The address for any email address property for the contact.
Note that users can add multiple email addresses for a contact.
Using this property would return contacts that match any of
the contact's email addresses.
PROPERTY PROPERTY DESCRIPTION

FileAs The File as property. This property is used to specify how the
contact is listed in the user's contact list. For example, a contact
could be listed as FirstName,LastName or
LastName,FirstName .

GivenName The name in the First Name property.

HomeAddress The address in any of the Home address properties.

HomePhone The phone number in any of the Home phone number


properties.

IMAddress The IM address property, which is typically an email address


used for instant messaging.

MiddleName The name in the Middle name property.

MobilePhone The phone number in the Mobile phone number property.

Nickname The name in the Nickname property.

OfficeLocation The value in Office or Office location property.

OtherAddress The value for the Other address property.

Surname The name in the Last name property.

Title The title in the Job title property.

Searchable sensitive data types


You can use the Content Search feature in the Security & Compliance Center to search for sensitive data, such as
credit card numbers or social security numbers, that is stored in documents on SharePoint and OneDrive for
Business sites. You can do this by using the SensitiveType property and the name of a sensitive information type in
a keyword query. For example, the query SensitiveType:"Credit Card Number" returns documents that contain a
credit card number. The query SensitiveType:"U.S. Social Security Number (SSN)" returns documents that contains
a U.S. social security number. To see a list of the sensitive data types that you can search for, go to Classifications >
Sensitive information types in the Security & Compliance Center. Or you can use the Get-
DlpSensitiveInformationType cmdlet in the Security & Compliance Center PowerShell to display a list of
sensitive information types.
You can also use the SensitiveType property to search for the name of a custom sensitive information type that
you (or another administrator) created for your organization. Note that you can use the Publisher column on the
Sensitive information types page in the Security & Compliance Center (or the Publisher property in
PowerShell) to differentiate between built-in and custom sensitive information types. For more information, see
Create a custom sensitive information type.
For more information about creating queries using the SensitiveType property, see Form a query to find sensitive
data stored on sites.

Search operators
Boolean search operators, such as AND, OR, and NOT, help you define more-precise searches by including or
excluding specific words in the search query. Other techniques, such as using property operators (such as >= or ..),
quotation marks, parentheses, and wildcards, help you refine a search query. The following table lists the operators
that you can use to narrow or broaden search results.

OPERATOR USAGE DESCRIPTION

AND keyword1 AND keyword2 Returns items that include all of the
specified keywords or property:value
expressions. For example,
from:"Ann Beebe" AND
subject:northwind
would return all messages sent by Ann
Beebe that contained the word
northwind in the subject line. 2

+ keyword1 + keyword2 + keyword3 Returns items that contain either


keyword2 or keyword3 and that also
contain keyword1 . Therefore, this
example is equivalent to the query
(keyword2 OR keyword3) AND
keyword1
.
Note that the query
keyword1 + keyword2 (with a space
after the + symbol) isn't the same as
using the ** AND ** operator. This query
would be equivalent to
"keyword1 + keyword2" and return
items with the exact phase
"keyword1 + keyword2" .

OR keyword1 OR keyword2 Returns items that include one or more


of the specified keywords or
property:value expressions. 2

NOT keyword1 NOT keyword2 Excludes items specified by a keyword or


NOT from:"Ann Beebe" a property:value expression. In the
NOT kind:im second example excludes messages sent
by Ann Beebe. The third example
excludes any instant messaging
conversations, such as Skype for
Business conversations that are saved to
the Conversation History mailbox folder.
2

- keyword1 -keyword2 The same as the NOT operator. So this


query returns items that contain
keyword1 and would exclude items
that contain keyword2 .

NEAR keyword1 NEAR(n) keyword2 Returns items with words that are near
each other, where n equals the number
of words apart. For example,
best NEAR(5) worst returns any item
where the word "worst" is within five
words of "best". If no number is
specified, the default distance is eight
words. 2
OPERATOR USAGE DESCRIPTION

ONEAR keyword1 ONEAR(n) keyword2 Similar to NEAR, but returns items with
words that are near each other in the
specified order. For example,
best ONEAR(5) worst returns any
item where the word "best" occurs
before the word "worst" and the two
words are within five words of each
other. If no number is specified, the
default distance is eight words. 2
> [!NOTE]> The ONEAR operator isn't
supported when searching mailboxes; it
only works when searching SharePoint
and OneDrive for Business sites. If
you're searching mailboxes and sites in
the same search and the query includes
the ONEAR operator, the search will
return mailbox items as if you were
using the NEAR operator. In other
words, the search returns items in which
the specified words are near each other
regardless of the order in which the
words occur.

: property:value The colon (:) in the property:value


syntax specifies that the value of the
property being searched for contains
the specified value. For example,
recipients:garthf@contoso.com
returns any message sent to
garthf@contoso.com.

= property=value The same as the : operator.

< property<value Denotes that the property being


searched is less than the specified value.
1

> property>value Denotes that the property being


searched is greater than the specified
value.1

<= property<=value Denotes that the property being


searched is less than or equal to a
specific value.1

>= property>=value Denotes that the property being


searched is greater than or equal to a
specific value.1

.. property:value1..value2 Denotes that the property being


searched is greater than or equal to
value1 and less than or equal to
value2.1

"" "fair value" Use double quotation marks (" ") to


subject:"Quarterly Financials" search for an exact phrase or term in
keyword and property:value search
queries.
OPERATOR USAGE DESCRIPTION

* cat* Prefix wildcard searches (where the


subject:set* asterisk is placed at the end of a word)
match for zero or more characters in
keywords or property:value queries.
For example, title:set* returns
documents that contain the word set,
setup, and setting (and other words that
start with "set") in the document title.

Note: You can use only prefix wildcard


searches; for example, cat* or set*. Suffix
searches ( *cat ), infix searches ( c*t ),
and substring searches ( *cat* ) are not
supported.

() (fair OR free) AND (from:contoso.com) Parentheses group together Boolean


(IPO OR initial) AND (stock OR shares) phrases, property:value items, and
(quarterly financials) keywords. For example,
(quarterly financials) returns
items that contain the words quarterly
and financials.

NOTE
1 Use this operator for properties that have date or numeric values.
2 Boolean search operators must be uppercase; for example, AND. If you use a lowercase operator, such as and, it will be

treated as a keyword in the search query.

Search conditions
You can add conditions to a search query to narrow a search and return a more refined set of results. Each condition
adds a clause to the KQL search query that is created and run when you start the search.
Conditions for common properties
Conditions for mail properties
Conditions for document properties
Operators used with conditions
Guidelines for using conditions
Examples of using conditions in search queries
Conditions for common properties
Create a condition using common properties when searching mailboxes and sites in the same search. The following
table lists the available properties to use when adding a condition.

CONDITION DESCRIPTION

Date For email, the date a message was received by a recipient or


sent by the sender. For documents, the date a document was
last modified.
CONDITION DESCRIPTION

Sender/Author For email, the person who sent a message. For documents, the
person cited in the author field from Office documents. You
can type more than one name, separated by commas. Two or
more values are logically connected by the OR operator.

Size (in bytes) For both email and documents, the size of the item (in bytes).

Subject/Title For email, the text in the subject line of a message. For
documents, the title of the document. As previously explained,
the Title property is metadata specified in Microsoft Office
documents. You can type the name of more than one
subject/title, separated by commas. Two or more values are
logically connected by the OR operator.

Compliance tag For both email and documents, labels that have been assigned
to messages and documents automatically by label policies or
labels that have been manually assigned by users. Labels are
used to classify email and documents for data governance and
enforce retention rules based on the classification defined by
the label. You can type part of the label name and use a
wildcard or type the complete label name. For more
information, see Overview of labels in Office 365.

Conditions for mail properties


Create a condition using mail properties when searching mailboxes or public folders. The following table lists the
email properties that you can use for a condition. Note that these properties are a subset of the email properties
that were previously described; these descriptions are repeated for your convenience.

CONDITION DESCRIPTION

Message kind The message type to search. This is the same property as the
Kind email property. Possible values:

contacts
docs
email
externaldata
faxes
im
journals
meetings
microsoftteams
notes
posts
rssfeeds
tasks
voicemail

Participants All the people fields in an email message; these fields are From,
To, CC, and BCC.
CONDITION DESCRIPTION

Type The message class property for an email item. This is the same
property as the ItemClass email property. It's also a multi-
value condition. So to select multiple message classes, hold the
CTRL key and then click two or more message classes in the
drop-down list that you want to add to the condition. Each
message class that you select in the list will be logically
connected by the OR operator in the corresponding search
query.
For a list of the message classes (and their corresponding
message class ID) that are used by Exchange and that you can
select in the Message class list, see Item Types and Message
Classes.

Received The date that an email message was received by a recipient.


This is the same property as the Received email property.

Recipients The person an email message was sent to. This is the same
property as the To email property.

Sender The sender of an email message.

Sent The date that an email message was sent by the sender. This is
the same property as the Sent email property.

Subject The text in the subject line of an email message.

To The recipient of an email message.

Conditions for document properties


Create a condition using document properties when searching for documents on SharePoint and OneDrive for
Business sites. The following table lists the document properties that you can use for a condition. Note that these
properties are a subset of the site properties that were previously described; these descriptions are repeated for
your convenience.

CONDITION DESCRIPTION

Author The author field from Office documents, which persists if a


document is copied. For example, if a user creates a document
and the emails it to someone else who then uploads it to
SharePoint, the document will still retain the original author.

Title The title of the document. The Title property is metadata that's
specified in Office documents. It's different than the file name
of the document.

Created The date that a document is created.

Last modified The date that a document was last changed.

File type The extension of a file; for example, docx, one, pptx, or xlsx. This
is the same property as the FileExtension site property.

Operators used with conditions


When you add a condition, you can select an operator that is relevant to type of property for the condition. The
following table describes the operators that are used with conditions and lists the equivalent that is used in the
search query.
OPERATOR QUERY EQUIVALENT DESCRIPTION

After property>date Used with date conditions. Returns


items that were sent, received, or
modified after the specified date.

Before property<date Used with date conditions. Returns


items that were sent, received, or
modified before the specified date.

Between date..date Use with date and size conditions. When


used with a date condition, returns
items there were sent, received, or
modified within the specified date range.
When used with a size condition, returns
items whose size is within the specified
range.

Contains any of (property:value) OR Used with conditions for properties that


(property:value) specify a string value. Returns items that
contain any part of one or more
specified string values.

Doesn't contain any of -property:value Used with conditions for properties that
NOT property:value specify a string value. Returns items that
don't contain any part of the specified
string value.

Doesn't equal any of -property=value Used with conditions for properties that
NOT property=value specify a string value. Returns items that
don't contain the specific string.

Equals size=value Returns items that are equal to the


specified size.1

Equals any of (property=value) OR Used with conditions for properties that


(property=value) specify a string value. Returns items that
are an exact match of one or more
specified string values.

Greater size>value Returns items where the specified


property is greater than the specified
value.1

Greater or equal size>=value Returns items where the specified


property is greater than or equal to the
specified value.1

Less size<value Returns items that are greater than or


equal to the specific value.1

Less or equal size<=value Returns items that are greater than or


equal to the specific value.1

Not equal size<>value Returns items that don't equal the


specified size.1
NOTE
1This operator is available only for conditions that use the Size property.

Guidelines for using conditions


Keep the following in mind when using search conditions.
A condition is logically connected to the keyword query (specified in the keyword box) by the AND operator.
That means that items have to satisfy both the keyword query and the condition to be included in the results.
This is how conditions help to narrow your results.
If you add two or more unique conditions to a search query (conditions that specify different properties),
those conditions are logically connected by the AND operator. That means only items that satisfy all the
conditions (in addition to any keyword query) are returned.
If you add more than one condition for the same property, those conditions are logically connected by the
OR operator. That means items that satisfy the keyword query and any one of the conditions are returned.
So, groups of the same conditions are connected to each other by the OR operator and then sets of unique
conditions are connected by the AND operator.
If you add multiple values (separated by commas or semi-colons) to a single condition, those values are
connected by the OR operator. That means items are returned if they contain any of the specified values for
the property in the condition.
The search query that is created by using the keywords box and conditions is displayed on the Search page,
in the details pane for the selected search. In a query, everything to the right of the notation (c:c) indicates
conditions that are added to the query.
Conditions only add properties to the search query; the don't add operators. This is why the query displayed
in the detail pane doesn't show operators to the right of the (c:c) notation. KQL adds the logical operators
(according to the previously explained rules) when the executing the query.
You can use the drag and drop control to re-sequence the order of conditions. Just click on the control for a
condition and move it up or down.
As previously explained, some condition properties allow you to type multiple values. Each value is logically
connected by the OR operator. This results in the same logic as having multiple instances of the same
condition, where each has a single value. The following illustrations shows an example of a single condition
with multiple values and an example of multiple conditions (for the same property) with a single value. Both
examples result in the same query: (filetype="docx") OR (filetype="pptx") OR (filetype="xlsx")
TIP
If a condition accepts multiple values, we recommend that you use a single condition and specify multiple values (separated by
commas or semi-colons). This helps ensure the query logic that's applied is what you intend.

Examples of using conditions in search queries


The following examples show the GUI-based version of a search query with conditions, the search query syntax
that is displayed in the details pane of the selected search (which is also returned by the Get-ComplianceSearch
cmdlet), and the logic of the corresponding KQL query.
Example 1
This example returns documents on SharePoint and OneDrive for Business sites that contain a credit card number
and were last modified before January 1, 2016.
GUI

Search query syntax


SensitiveType:"Credit Card Number(c:c)(lastmodifiedtime<2016-01-01)

Search query logic


SensitiveType:"Credit Card Number" AND (lastmodifiedtime<2016-01-01)

Example 2
This example returns email items or documents that contain the keyword "report", that were sent or created before
April 1, 2105, and that contain the word "northwind" in the subject field of email messages or in the title property of
documents. The query excludes Web pages that meet the other search criteria.
GUI
Search query syntax
report(c:c)(date<2016-04-01)(subjecttitle:"northwind")(-filetype="aspx")

Search query logic


report AND (date<2016-04-01) AND (subjecttitle:"northwind") NOT (filetype="aspx")

Example 3

This example returns email messages or calendar meetings that were sent between 12/1/2016 and 11/30/2016 and
that contain words that start with "phone" or "smartphone".
GUI

Search query syntax


phone* OR smartphone*(c:c)(sent=2016-12-01..2016-11-30)(kind="email")(kind="meetings")

Search query logic


phone* OR smartphone* AND (sent=2016-12-01..2016-11-30) AND ((kind="email") OR (kind="meetings"))

Searching for site content shared with external users


You can also use the Content Search feature in the Security & Compliance Center to search for documents stored
on SharePoint and OneDrive for Business sites that have been shared with people outside of your organization.
This can help you identify sensitive or proprietary information that's being shared outside your organization. You
can do this by using the ViewableByExternalUsers property in a keyword query. This property will return documents
or sites that have been shared with external users by using one of the following sharing methods:
A sharing invitation that requires users to sign in to your organization as an authenticated user.
An anonymous guest link, which allows anyone with this link to access the resource without having to be
authenticated.
Here are some examples:
The query ViewableByExternalUsers:true AND SensitiveType:"Credit Card Number" will return all items that
have been shared with people outside your organization and contain a credit card number.
The query
ViewableByExternalUsers:true AND ContentType:document AND Site:https://contoso.sharepoint.com/Sites/Teams
will return a list of documents on all team sites in the organization that have been shared with external users.

TIP
A search query such as ViewableByExternalUsers:true AND ContentType:document might return a lot of .aspx files in the
search results. To eliminate these (or other types of files), you can use the FileExtension property to exclude specific file
types; for example ViewableByExternalUsers:true AND ContentType:document NOT FileExtension:aspx .

What is considered content that is shared with people outside your organization? Documents in your organization's
SharePoint and OneDrive for Business sites that are shared by sending a sharing invitations or that are shared in
public locations. For example, the following user activities result in content that is viewable by external users:
A user shares a file or folder with a person outside your organization.
A user creates and sends a link to a shared file to a person outside your organization. This link allows the
external user to view (or edit) the file.
A user sends a sharing invitation or a guest link to a person outside your organization to view (or edit) a
shared file.
Issues using the ViewableByExternalUsers property
While the ViewableByExternalUsers property represents the status of whether a document or site is shared with
external users, there are some caveats to what this property does and doesn't reflect. In the following scenarios, the
value of the ViewableByExternalUsers property won't be updated, and the results of a Content Search query that
uses this property may be inaccurate.
Changes to sharing policy, such as turning off external sharing for a site or for the organization. The property
will still show previously shared documents as being externally accessible even though external access might
have been revoked.
Changes to group membership, such as adding or removing external users to Office 365 Groups or Office
365 security groups. The property won't automatically be updated for items the group has access to.
Sending sharing invitations to external users where the recipient hasn't accepted the invitation, and therefore
doesn't yet have access to the content.
In these scenarios, the ViewableByExternalUsers property won't reflect the current sharing status until the site or
document library is re-crawled and re-indexed.

Searching for site content shared within your organization


As previously explained, you can use the SharedWithUsersOWSUser property so search for documents that have been
shared between people in your organization. When a person shares a file (or folder) with another user inside your
organization, a link to the shared file appears on the Shared with me page in the OneDrive for Business account of
the person who the file was shared with. For example, to search for the documents that have been shared with Sara
Davis, you can use the query SharedWithUsersOWSUser:"sarad@contoso.com" . If you export the results of this search,
the original documents (located in the content location of the person who shared the documents with Sara) will be
downloaded.
Note that documents must be explicitly shared with a specific user to be returned in search results when using the
SharedWithUsersOWSUser property. For example, when a person shares a document in their OneDrive account, they
have the option to share it with anyone (inside or outside the organization), share it only with people inside the
organization, or share it with a specific person. Here's a screenshot of the Share window in OneDrive, that shows
the three sharing options.

Only documents that are shared by using the third option (shared with Specific people) will be returned by a
search query that uses the SharedWithUsersOWSUser property.

Searching for Skype for Business conversations


You can use the following keyword query to specifically search for content in Skype for Business conversations:

kind:im

Note the previous search query will also return chats from Microsoft Teams. To prevent this, you can narrow the
search results to include only Skype for Business conversations by using the following keyword query:

kind:im AND subject:conversation

The previous keyword query excludes chats in Microsoft Teams because Skype for Business conversations are
saved as email messages with a Subject line that starts with the word "Conversation".
To search for Skype for Business conversations that occurred within a specific date range, use the following
keyword query:

kind:im AND subject:conversation AND (received=startdate..enddate)

Search tips and tricks


Keyword searches are not case sensitive. For example, cat and CAT return the same results.
The Boolean operators AND, OR, NOT, NEAR, and ONEAR must be uppercase.
A space between two keywords or two property:value expressions is the same as using AND. For example,
from:"Sara Davis" subject:reorganization returns all messages sent by Sara Davis that contain the word
reorganization in the subject line.
Use syntax that matches the property:value format. Values are not case-sensitive, and they can't have a
space after the operator. If there is a space, your intended value will just be a full-text search. For example
to: pilarp searches for "pilarp" as a keyword, rather than for messages that were sent to pilarp.

When searching a recipient property, such as To, From, Cc, or Recipients, you can use an SMTP address,
alias, or display name to denote a recipient. For example, you can use pilarp@contoso.com, pilarp, or "Pilar
Pinilla".
You can use only prefix wildcard searches; for example, cat* or set*. Suffix searches ( *cat ), infix searches (
c*t ), and substring searches ( *cat* ) are not supported.
When searching a property, use double quotation marks (" ") if the search value consists of multiple words.
For example subject:budget Q1 returns messages that contain budget in the in the subject line and that
contain Q1 anywhere in the message or in any of the message properties. Using subject:"budget Q1"
returns all messages that contain budget Q1 anywhere in the subject line.
To exclude content marked with a certain property value from your search results, place a minus sign (-)
before the name of the property. For example, -from:"Sara Davis" will exclude any messages sent by Sara
Davis.
You can export items based on the item type. For example, to export Skype IM messages recived by a user,
use the syntax 'Kind:IM'. This search query returen all IM message.
View keyword statistics for Content Search results
12/7/2018 • 6 minutes to read • Edit Online

After you create and run a Content Search, you can view statistics about the estimated search results. This
includes a summary of the search results (similar to the summary of the estimated search results displayed in the
details pane), the query statistics such as the number of content locations with items that match the search query,
and the name of content locations that have the most matching items. You can display statistics for one or more
content searches. This lets you to quickly compare the results for multiple searches and make decisions about the
effectiveness of your search queries.
Additionally, you can configure new and existing searches to return statistics for each keyword in a search query.
This lets you compare the number of results for each keyword in a query and to compare the keyword statistics
from multiple searches.
You can also download the search statistics and keyword statistics to a CSV file. This lets you use the filtering and
sorting features in Excel to compare results, and prepare reports for your search results.

Get statistics for Content Searches


To display statistics for Content Searches:
1. In the Office 365 Security & Compliance Center, go to Search & investigation > Content search.
2. In the list of searches, select one or more searches, and then click Search statistics .

3. On the Search statistics page, click one of the following links to display statistics about the selected
searches.
Summary
This page displays statistics similar to the ones displayed in the details pane on the Content search page.
Statistics for all selected searches are displayed. Note that you can also re-run the selected searches from
this page to update the statistics.
a. The name of the Content Search. As previously stated, you can display and compare statistics for
multiple searches.
b. The type of content location that was searched. Each row displays statistics for mailboxes, sites, and
public folders from the specified search.
c. The number of content locations containing items that match the search query. For mailboxes, this
statistic also includes the number of archive mailboxes that contain items that match the search query.
d. The total number of items of all specified content locations that match the search query. Examples of
item types include email messages, calendar items, and documents. If an item contains multiple instances
of a keyword that is being searched for, it's only counted once in the total number of items. For example, if
you're searching for words "stock" or "fraud" and an email message contains three instances of the word
"stock", it's only counted once in the Items column.
e. The total size of all items that were found in the specified content location that match the search query.
Queries
This page displays statistics about the search query.

a. The name of the Content Search that the row contains query statistics for.
b. The type of content location that the query statistics are applicable to.
c. This column indicates which part of the search query the statistics are applicable to. Primary indicates
the entire search query. If you use a keyword list when you create or edit a search query, statistics for each
component of the query are included in this table. See the Get keyword statistics for Content Searches
section in this article for more information.
d. This column contains the actual search query that run by the Content Search tool. Note that the tool
automatically adds a few additional components to the query that you create.
When you search for all content in mailboxes (by not specifying any keywords), the actual key word
query is size>=0 so that all items are returned.
When you search SharePoint Online and OneDrive for Business sites, the two following
components are added:
NOT IsExternalContent:1 - Excludes any content from an on-premises SharePoint organization.
NOT IsOneNotePage:1 - Excludes all OneNote files because these would be duplicates of any
document that matches the search query.
e. The number of the content locations (specified by the ** Location type ** column) that contain items that
match the search query listed in the Query column.
f. The number of items (from the specified content location) that match the search query listed in the
Query column. As previously explained, if an item contains multiple instances of a keyword that is being
searched for, it's only counted once in the this column.
g. The total size of all items that were found (in the specified content location) that match the search query
in the Query column.
Top locations
This page displays statistics about the number of items that match the search query in each content
location that was searched. The top 1,000 locations are displayed. If you view statistics for multiple
searches, the top 1,000 locations for each search are displayed. Note that a content location isn't included
on this page if it doesn't contain any items that match the search query.

a. The name of the content location.


b. The type of content location that the location statistics are applicable to.
c. There are columns for each search that you're displaying statistics for. This column shows the number
(and total size) of items that match the search query in each content location. Note that when you're
displaying statistics for multiple searches, the "NA" in this column indicates that the content location wasn't
included in that search.

Get keyword statistics for Content Searches


As previous explained, the Queries page shows the search query and the number (and size) of items that match
the query. If you use a keyword list when you create or edit a search query, you can get enhanced statistics that
show how many items match each keyword or keyword phrase. This can help you quickly identify which parts of
the query are the most (and least) effective. For example, if a keyword returns a large number of items, you might
choose to refine the keyword query to narrow the search results. You can set up a keyword list when you create or
edit a Content Search.
To create a keyword list and view keyword statistics for a Content Search:
1. In the Office 365 Security & Compliance Center, go to Search & investigation > Content search.
2. In the list of Content Searches, click and a search, and then click Edit .
3. Click Query and then do the following things:

a. Click the Show keyword list check box.


b. Type a keyword or keyword phase in a row in the keywords table. For example, type budget in the first
row and then type security in the second row.
4. After adding the keywords that you want to search and get statistics for, click Search to run the revised
search.
5. When the search is completed, select it in the list of searches, and then click Search statistics . You can
also display and compare keyword statistics for multiple searches.
6. On the Search statistics page, click Query to display the keyword statistics for the selected searches.
As shown in the previous screenshot, the statistics for each keyword are displayed; this includes:
The keyword statistics for each type of content location included in the search.
The actual search query for each keyword, which includes any conditions from the search query.
The complete search query (identified as Primary in the Part column) and the statistics for the
complete query. Note these are the same statistics displayed on the Summary page.

NOTE
To help reduce issues caused by large keyword lists, you're now limited to a maximum of 20 rows in the keyword list of a
search query.
Export Content Search results from the Office 365
Security & Compliance Center
12/7/2018 • 22 minutes to read • Edit Online

After a Content Search is successfully run, you can export the search results to a local computer. When you
export email results, they're downloaded to your computer as PST files. When you export content from
SharePoint and OneDrive for Business sites, copies of native Office documents are exported. There are
additional documents and reports that are included with the exported search results.
Additionally, any RMS -encrypted email messages that are included in the results of a Content Search will be
decrypted when you export them (as individual messages). This decryption capability is enabled by default for
members of the eDiscovery Manager role group. This is because the RMS Decrypt management role is assigned
to this role group. See the More information section for details about RMS decryption when you export search
results.
Exporting the results of a Content Search involves preparing the results, and then downloading them to a local
computer.

Before you begin


To export search results, you have to be assigned the Export management role in the Office 365 Security
& Compliance Center. This role is assigned to the built-in eDiscovery Manager role group. It isn't
assigned by default to the Organization Management role group. For more information, see Assign
eDiscovery permissions in the Office 365 Security & Compliance Center.
The computer you use to export the search results has to meet the following system requirements:
32- or 64-bit versions of Windows 7 and later versions
Microsoft .NET Framework 4.7
A supported browser:
Microsoft Edge
OR
Microsoft Internet Explorer 10 and later versions
Note: Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce
applications. Exporting search results using an unsupported browser with third-party extensions or
add-ons isn't supported.
When you download search results (described in Step 2), you can increase the download speed by
configuring a Windows Registry setting on the computer you use to export the search results. For more
information, see Increase the download speed when exporting eDiscovery search results from Office 365.
When you export search results, the data is temporarily stored in a unique Microsoft Azure storage
location in the Microsoft cloud before it's downloaded to your local computer. Be sure your organization
can connect to the endpoint in Azure, which is *.blob.core.windows.net (the wildcard represents a
unique identifier for your export). The search results data is deleted from the Azure storage location two
weeks after it's created.
If your organization uses a proxy server to communicate with the Internet, you need to define the proxy
server settings on the computer that you use to export the search results (so the export tool can be
authenticated by your proxy server). To do this, open the machine.config file in the location that matches
your version of Windows.
32-bit - %windir%\Microsoft.NET\Framework\[version]\Config\machine.config

64-bit - %windir%\Microsoft.NET\Framework64\[version]\Config\machine.config

Add the following lines to the machine.config file somewhere between the <configuration> and
</configuration> tags. Be sure to replace ProxyServer and Port with the correct values for your
organization; for example, proxy01.contoso.com:80 .

<system.net>
<defaultProxy enabled="true" useDefaultCredentials="true">
<proxy proxyaddress="http://ProxyServer :Port "
usesystemdefault="False"
bypassonlocal="True"
autoDetect="False" />
</defaultProxy>
</system.net>

See the section for a description of the limits for exporting search results.
The maximum size of a PST file that can be exported is 10 GB. If you want to change this default size, you
can edit the Windows Registry on the computer that you use to export the search results. See Change the
size of PST files when exporting eDiscovery search results.

Step 1: Prepare search results for export


The first step is to prepare the search results for exporting. When you prepare results, they are uploaded to an
Azure storage location in the Microsoft cloud. Note that content from mailboxes and sites is uploaded at a
maximum rate of 2 GB per hour.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Search & investigation > Content search.
4. On the Content search page, select a search.
5. In the details pane, under Export results to a computer, click Start export.

NOTE
If the results for a search are older than 7 days, you are prompted to update the search results. If this happens,
cancel the export, click Update search results in the details pane for the selected search, and then start the
export again after the results are updated.

6. On the Export the search results page, under Include these items from the search, choose one of the
following options:
Export only indexed items
Export indexed and partially indexed items
Export only partially indexed items
See the More information section for a description about how partially indexed items are exported. For
more information about partially indexed items, see Partially indexed items in Content Search.
7. Under Export Exchange content as, choose one of the following options:
One PST file for each mailbox - Exports one PST file for each user mailbox that contains search
results. Any results from the user's archive mailbox are included in the same PST file. Note that
this option reproduces the mailbox folder structure from the source mailbox.
One PST file containing all messages - Exports a single PST file (named Exchange.pst ) that
contains the search results from all source mailboxes included in the search. Note that this option
reproduces the mailbox folder structure for each message.
One PST file containing all messages in a single folder - Exports search results to a single
PST file where all messages are located in a single, top-level folder. This option lets reviewers
review items in chronological order (items are sorted by sent date) without having to navigate the
original mailbox folder structure for each item.
Individual messages - Exports search results as individual email messages, using the .msg
format. If you select this option, email search results are exported to a folder in the file system. The
folder path for individual messages is the same as the one used if you exported the results to PST
files.

IMPORTANT
To decrypt RMS-encrypted messages when they're exported, you must export email search results as
individual messages. Encrypted messages will remain encrypted if you export the search results as a PST
file.

8. Click the Enable de-duplication checkbox to exclude duplicate messages. This option appears only if
the content sources of the search includes Exchange mailboxes or public folders.
If you select this option, only one copy of a message will be exported even if multiple copies of the same
message are found in the mailboxes that were searched. The export results report (Results.csv) will
contain a row for every copy of a duplicate message so that you can identify the mailboxes (or public
folders) that contain a copy of the duplicate message. For more information about de-duplication and
how duplicate items are identified, see De-duplication in eDiscovery search results.
9. Click the Include versions for SharePoint documents checkbox to export all versions of SharePoint
documents. This option appears only if the content sources of the search includes SharePoint or
OneDrive for Business sites.
10. Click the Export files in a compressed (zipped) folder checkbox to export search results to
compressed folders. This option is available only when you choose to export Exchange items as individual
messages and when the search results include SharePoint or OneDrive documents. This option is
primarily used to work around the 260 character limit in Windows file path names when items are
exported. See the "Filenames of exported items" in the More information section.
11. Click Start export.
The search results are prepared for downloading, which means they're being uploaded to the Azure
storage location in the Microsoft cloud. When the search results are ready for download, the Download
exported results link is displayed under Export results to a computer in the details pane.

Step 2: Download the search results


The next step is to download the search results from the Azure storage location to your local computer.
As previously explained, you can increase the download speed by configuring a Windows Registry setting on the
computer you use to export the search results. For more information, see Increase the download speed when
exporting eDiscovery search results from Office 365.
1. In the details pane for the search that you started the export for, under Export results to a computer,
click Download exported results.
The Download exported results window is displayed and contains the following information about the
search results that will be downloaded to your computer.
The number of items that will be downloaded.
The estimated total size of the items that will be downloaded.
Whether indexed or unindexed will be exported. Unindexed items are items that have an
recognized format, are encrypted, or weren't indexed for other reasons. For more information, see
Unindexed items in Content Search.
Whether or not versions of SharePoint documents will be downloaded.
The status of the export preparation process. You can start downloading search results even if the
preparation of the data isn't complete.
2. Under Export key, click Copy to clipboard. You will use this key in step 5 to download the search
results.

NOTE
Because anyone can install and start the eDiscovery Export tool, and then use this key to download the search
results, be sure to take precautions to protect this key just like you would protect passwords or other security-
related information.

3. Click Download results.


4. If you're prompted to install the MicrosoftOffice 365 eDiscovery Export Tool, click Install.
5. In the eDiscovery Export Tool, paste the export key that you copied in step 2 in the appropriate box.
6. Click Browse to specify the location where you want to download the search result files.

NOTE
Due to the high amount of disk activity (reads and writes), you should download search results to a local disk
drive; don't download them to a mapped network drive or other network location.

7. Click Start to download the search results to your computer.


The eDiscovery Export Tool displays status information about the export process, including an estimate
of the number (and size) of the remaining items to be downloaded. When the export process is complete,
you can access the files in the location where they were downloaded.

More information
Here's more information about exporting search results.
Export limits
Export reports
Exporting partially indexed items
Exporting individual messages or PST files
Decrypting RMS -encrypted messages
Filenames of exported items
Miscellaneous
Export limits
Exporting search results from the Security & Compliance Center has the following limits:
You can export a maximum of 2 TB of data from a single Content Search. If the search results are
larger than 2 TB, consider using date ranges or other types of filters to decrease the total size of
the search results.
Your organization can export a maximum of 2 TB of data during a single day.
You can have a maximum of 10 exports running at the same time within your organization.
A single user can run a maximum of three exports at the same time.
Exporting Content Search reports doesn't count against any of the export limits.
As previously stated, search results from mailboxes and sites are uploaded to the Azure storage location
(as described in Step 1: Prepare search results for export ) at a maximum rate of 2 GB per hour.
The maximum size of a PST file that can be exported is 10 GB by default. That means if the search results
from a user's mailbox are larger than 10 GB, the search results for the mailbox will be exported in two (or
more) separate PST files. Additionally, if you choose to export all search results in a single PST file, the
PST file will be spilt into additional PST files if the total size of the search results is larger than 10 GB. If
you want to change this default size, you can edit the Windows Registry on the computer that you use to
export the search results. See Change the size of PST files when exporting eDiscovery search results.
Additionally, the search results from a specific mailbox won't be divided among multiple PST files unless
the content from a single mailbox is more than 10 GB. If you chose to export the search results in one
PST file for that contains all messages in a single folder and the search results are larger than 10 GB, the
items are still organized in chronological order, so they will be spilt into additional PST files based on the
sent date.
Export reports
When you export search results, the following reports are included in addition to the search results.
Export Summary An Excel document that contains a summary of the export. This includes
information such as the number of content sources that were searched, the estimated and
downloaded sizes of the search results, and the estimated and downloaded number of items that
were exported.
Manifest A manifest file (in XML format) that contains information about each item included in
the search results.
Results An Excel document that contains information about each item that is download as a search
result. For email, the result log contains information about each message, including:
The location of the message in the source mailbox (including whether the message is in the
primary or archive mailbox).
The date the message was sent or received.
The Subject line from the message.
The sender and recipients of the message.
Whether the message is a duplicate message if you enabled the de-duplication option when
exporting the search results. Duplicate messages will have a value in the Duplicate to Item
column that identifies the message as a duplicate. The value in the Duplicate to Item
column contains the item identity of the message that was exported. For more information,
see De-duplication in eDiscovery search results.
For documents from SharePoint and OneDrive for Business sites, the result log contains
information about each document, including:
The URL for the document.
The URL for the site collection where the document is located.
The date that the document was last modified.
The name of the document (which is located in the Subject column in the result log).
Unindexed Items An Excel document that contains information about any partially indexed items
that would be included in the search results. If you don't include partially indexed items when you
generate the search results report, this report will still be downloaded, but will be empty.
Errors and Warnings Contains errors and warnings for files encountered during export. See the
Error Details column for information specific to each individual error or warning.
Skipped Items When you export search results from SharePoint and OneDrive for Business sites,
the export will usually include a skipped items report (SkippedItems.csv). The items cited in this
report are typically items that won't be downloaded, such as a folder or a document set. Not
exporting this types of items is by design. For other items that were skipped, the 'Error Type' and
'Error Details' field in the skipped items report show the reason the item was skipped and wasn't
download with the other search results.
Trace Log Contains detailed logging information about the export process and can help uncover
issues during export.

NOTE
You can just export these documents without having to export the actual search results. See Export a
Content Search report.

Exporting partially indexed items


If you're exporting mailbox items from a content search that returns all mailbox items in the search results
(because no keywords where included in the search query), partially indexed items won't be copied to the
PST file that contains the unindexed items. This is because all items, including any partially indexed items,
are automatically included in the regular search results. This means that partially indexed items will be
included in a PST file (or as individual messages) that contains the other, indexed items.
Additionally, if you export both the indexed and partially indexed items or if you export only the indexed
items from a content search that returns all items, the same number of items will be downloaded. This
happens even though the estimated search results for the content search (displayed in the search
statistics in the Security & Compliance Center) will still include a separate estimate for the number of
partially indexed items. For example, let's say that the estimate for a search that includes all items (no
keywords in the search query) shows that 1,000 items were found and that 200 partially indexed items
were also found. In this case, the 1,000 items include the partially indexed items because the search
returns all items. In other words, there are 1,000 total items returned by the search, and not 1,200 items
(as you might expect). If you export the results of this search and choose to export indexed and partially
indexed items (or just indexed items), then 1,000 items will be downloaded. Again, that's because partially
indexed items are included with the regular (indexed) results when you use a blank search query to return
all items. In this same example, if you choose to export only partially indexed items, then only the 200
unindexed items would be downloaded.
Also note that in the previous example (when you export indexed and partially indexed items or you
export only indexed items) , the Export Summary report included with the exported search results
would list 1,000 items estimated items and 1,000 downloaded items for the same reasons as previously
described.
If the search that you're exporting results from was a search of specific content locations or all content
locations in your organization, only the partially items from content locations that contain items that
match the search criteria will be exported. In other words, if no search results are found in a mailbox or
site, then any partially indexed items in that mailbox or site won't be exported. The reason for this is that
exporting partially indexed items from lots of locations in the organization might increase the likelihood
of export errors and increase the time it takes to export and download the search results.
To export partially indexed items from all content locations for a search, configure the search to return all
items (by removing any keywords from the search query) and then export only partially indexed items
when you export the search results.

When exporting search results from SharePoint or OneDrive for Business sites, the ability to export
unindexed items also depends on the export option that you select and whether a site that was searched
contains an indexed item that matches the search criteria. For example, if you search specific SharePoint
or OneDrive for Business sites and no search results are found, then no unindexed items from those sites
will be exported if you choose the second export option to export both indexed and unindexed items. If an
indexed item from a site does match the search criteria, then all unindexed items from that site will be
exported when exporting both indexed and unindexed items. The following illustration describes the
export options based on whether or not a site contains an indexed item that matches the search criteria.

A - Only indexed items that matches the search criteria are exported. No partially indexed items are
exported.
B - If no indexed items from a site match the search criteria, then partially indexed items from that same
site aren't exported. If indexed items from a site are returned in the search results, then the partially
indexed items from that site are exported. In other words, only the partially indexed items from sites that
contain items that match the search criteria are exported.
C - All partially indexed items from all sites in the search are exported, regardless of whether a site
contains items that match the search criteria.
If you choose to export partially indexed items, partially indexed mailbox items are exported in a separate
PST file regardless of the option that you choose under Export Exchange content as.
If partially indexed items are returned in the search results (because other properties of an partially
indexed items matched the search criteria), then those partially indexed are exported with the regular
search results. So, if you choose to export both indexed items and partially indexed items (by selecting the
All items, including ones that have unrecognized format, are encrypted, or weren't indexed for
other reasons export option), the partially indexed items exported with the regular results will be listed
in the Results.csv report. They will not be listed in the Unindexed items.csv report.
Exporting individual messages or PST files
If the file path name of a message exceeds the maximum character limit for Windows, the file path name
is truncated. But the original file path name will be listed in the Manifest and ResultsLog.
As previously explained, email search results are exported to a folder in the file system. The folder path
for individual messages would replicate the folder path in the user's mailbox. For example, for a search
named "ContosoCase101" messages in a user's inbox would be located in the folder path
~ContosoCase101\\<date of export\Exchange\user@contoso.com (Primary)\Top of Information Store\Inbox .

If you choose to export email messages in one PST file containing all messages in a single folder, a
Deleted Items folder and a Search Folders folder are included in the top level of the PST folder. These
folders will be empty.
Decrypting RMS -encrypted messages
As previously explained, to decrypt RMS -encrypted messages when you export them, you have to export
the search results as individual messages. If you export search results to a PST file, RMS -encrypted
messages will remain encrypted.
The RMS decryption feature in Content Search doesn't decrypt messages encrypted with Office 365
Message Encryption (OME ) when you export search results. However, if a message encrypted with OME
is sent by a user in your organization, the copy of the message in the user's Sent folder isn't encrypted
and will be viewable after it's exported. However, if messages encrypted with OME are received by users
in your organization, they won't be decrypted after they're exported. For more information about OME,
see Office 365 Message Encryption.
Messages that are decrypted are identified in the ResultsLog report. This report contains a column
named Decode Status, and a value of Decoded in this column identifies the messages the were
decrypted.
Currently, this decryption capability doesn't include encrypted content from SharePoint and OneDrive for
Business sites. Only RMS -encrypted email messages will be decrypted when you export them.
If an RMS -encrypted email message has an attachment (such as a document or another email message)
that's also encrypted, only the top-level email message will be decrypted.
You can't preview an RMS -encrypted email message. To view an encrypted message, you have to export
it.
If you need to prevent someone from decrypting RMS -encrypted messages, you'll have to create a
custom role group (by copying the built-in eDiscovery Manager role group) and then remove the RMS
Decrypt management role from the custom role group. Then add the person who you don't want to
decrypt messages as a member of the custom role group.
Filenames of exported items
There is a 260-character limit (imposed by the operating system) for the full path name for email
messages and site documents exported to your local computer. The full path name for exported items
includes the item's original location and the folder location on the local computer where the search results
are downloaded to. For example, if you specify to download the search results to
C:\Users\Admin\Desktop\SearchResults in the eDiscovery Export tool, then the full pathname for a
downloaded email item would be
C:\Users\Admin\Desktop\SearchResults\ContentSearch1\03.15.2017-1242PM\Exchange\sarad@contoso.com
(Primary)\Top of Information Store\Inbox\Insider trading investigation.msg
.
If the 260-character limit is exceeded, the full path name for an item will be truncated.
If the full path name is longer than 260 characters, the file name will be shortened to get under the
limit; note that the truncated filename (excluding the file extension) won't be less than 8 characters.
If the full path name is still too long after shortening the file name, the item is moved from its
current location to the parent folder. If the pathname is still too long, then the process is repeated:
shorten the filename, and if necessary move again to the parent folder. This process is repeated
until the full pathname is under the 260-character limit.
If a truncated full path name already exists, a version number will be added to the end of the
filename; for example, statusmessage(2).msg .
To help mitigate this issue, consider downloading search results to a location with a short path
name; for example, downloading search results to a folder named C:\Results would add fewer
characters to the path names of exported items than downloading them to a folder named
C:\Users\Admin\Desktop\Results .

When you export site documents, it's also possible that the original file name of a document will be
modified. This happens specifically for documents that have been deleted from a SharePoint or OneDrive
for Business site that's been placed on hold. After a document that's located on a site that's on hold is
deleted, the deleted document is automatically moved to the Preservation Hold library for the site (which
was created when the site was placed on hold). When the deleted document is moved to the Preservation
Hold library, a randomly-generated and unique ID is appended to the original filename of the document.
For example, if the filename for a document is FY2017Budget.xlsx and that document is later deleted and
moved to the Preservation Hold library, the filename of the document that is moved to the Preservation
Hold library is modified to something like
FY2017Budget_DEAF727D-0478-4A7F-87DE-5487F033C81A2000-07-05T10-37-55.xlsx . If a document in the
Preservation Hold library matches the query of a Content Search and you export the results of that
search, the exported file will have the modified filename; in this example, the filename of the exported
document would be FY2017Budget_DEAF727D-0478-4A7F-87DE-5487F033C81A2000-07-05T10-37-55.xlsx .
Additionally, when a document located on a site that's on hold is modified (and versioning for the
document library in the site has been enabled), a copy of the file is automatically created in the
Preservation Hold library. In this case, a randomly-generated and unique ID is also appended to the
filename of the document that's copied to the Preservation Hold library.
The reason why filenames of documents that are moved or copied to the Preservation Hold library is to
prevent conflicting filenames. For more information about placing a hold on sites and the Preservation
Hold library, see Overview of in-place hold in SharePoint Server 2016.
Miscellaneous
All search results and the export reports are included in a folder that has the same name as the Content
Search. The email messages that were exported are located in a folder named Exchange. Documents are
located in a folder named SharePoint.
The file system metadata for documents on SharePoint and OneDrive for Business sites is maintained
when documents are exported to your local computer. That means document properties, such as created
and last modified dates, aren't changed when documents are exported.
If your search results include a list item from SharePoint that matches the search query, all rows in the list
will be exported in addition to the item that matches the search query. This includes any attachments in
the list. The reason for this is to provide a context for list items that are returned in the search results. Also
note that the additional list items and attachments may cause the count of exported items to be different
than the original estimate of search results.
Export a Content Search report
8/21/2018 • 6 minutes to read • Edit Online

Instead of exporting the full set of search results from a Content Search in the Office 365 Security & Compliance
Center (and from a Content Search that's associated with an eDiscovery case), you can just export the same
reports that are generated when you export search results.
When you export a report, it's downloaded to a folder that has the same name as the Content Search, but that's
appended with _ReportsOnly . For example, if the Content Search is named ContosoCase0815 , then the report is
downloaded to a folder named ContosoCase0815_ReportsOnly . For a list of documents that are included in the
report, see What's included in the report.

Before you begin


To export a Content Search report, you have to be assigned the Compliance Search management role in
the Office 365 Security & Compliance Center. This role is assigned to the built-in eDiscovery Manager and
Organization Management role groups. It isn't assigned by default to the Organization Management role
group. For more information, see Assign eDiscovery permissions in the Office 365 Security & Compliance
Center.
When you export a report, the data is temporarily stored in a unique Windows Azure storage area in the
Microsoft cloud before it's downloaded to your local computer. Be sure your organization can connect to
the endpoint in Azure, which is *.blob.core.windows.net (the wildcard represents a unique identifier for
your export). The search results data is deleted from the Azure storage area two weeks after it's created.
The computer you use to export the search results has to meet the following system requirements:
32- or 64-bit versions of Windows 7 and later versions
Microsoft .NET Framework 4.7
A supported browser:
Microsoft Edge
or
Microsoft Internet Explorer 10 and later versions
Note: Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce applications.
Exporting search results using an unsupported browser with third-party extensions or add-ons isn't
supported.

Generate and download a Content Search report


The steps to generate and download a Content Search report are very similar to actually exporting search results.

Step 1: Generate the report for export


The first step is to prepare the report for downloading to your computer exporting. When you the report, the
report documents are uploaded to an Azure storage area in the Microsoft cloud.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Search & investigation > Content search.
4. On the Content search page, select a search.
5. In the details pane, under Export report to a computer, click Generate report.

NOTE
If the results for a search are older than 7 days, you are prompted to update the search results. If this happens,
cancel the export, click Update search results in the details pane for the selected search, and then start the report
export again after the results are updated.

6. On the Export a report page, under Include these items from the search, choose one of the following
options:
Export only indexed items
Export indexed and unindexed items
Export only unindexed items
For more information about unindexed items, see Partially indexed items in Content Search.
7. Choose to include search statistics for all versions of SharePoint documents. This option appears only if the
content sources of the search includes SharePoint or OneDrive for Business sites.
8. Click Generate report.
The search results report is prepared for downloading, which means the report documents will be
uploaded to the Azure storage area in the Microsoft cloud. When the report is ready for download, the
Download report link is displayed under Export report to a computer in the details pane.

NOTE
You can also export a report for a Content Search that's associated with an eDiscovery case. To do this, go to Search &
investigation > eDiscovery, select a case, and click Edit . On the Searches page, select a search, and then click Export
> Export a report.

Step 2: Download the report


The next step is to download the report from the Azure storage area to your local computer.
1. In the details pane for the search that you generated the report for, under Export report to a computer,
click Download report.
The Download report page is displayed and contains the following information about the report till be
downloaded to your computer.
The number of items that will be downloaded.
The estimated total size of the items that will be downloaded.
Whether indexed or unindexed will be exported. Unindexed items are items that have an recognized
format, are encrypted, or weren't indexed for other reasons.
Whether or not versions of SharePoint documents will be downloaded.
The status of the report export process. You can start downloading the report even if the
preparation of the report isn't complete.
2. Under Export key, click Copy to clipboard. You will use this key in step 5 to download the report.

IMPORTANT
Because anyone can install and start the eDiscovery Export tool, and then use this key to download the search
report, be sure to take precautions to protect this key just like you would protect passwords or other security-
related information.

3. Click Download report.


4. If you're prompted to install the MicrosoftOffice 365 eDiscovery Export Tool, click Install.
5. In the eDiscovery Export Tool, paste the export key that you copied in step 2 in the appropriate box.
6. Click Browse to specify the location where you want to download the report.
7. Click Start to download the search results to your computer.
The eDiscovery Export Tool displays status information about the export process, including an estimate
of the number (and size) of the remaining items to be downloaded. When the export process is complete,
you can access the files in the location where they were downloaded.

NOTE
You can download the report for a Content Search that's associated with an eDiscovery case. To do this, go to Search &
investigation > eDiscovery, select a case, and click Edit . On the Exports page, select an report export, and then click
Download report in the details pane.

What's included in the report


When you generate and export a report about the results of a Content Search, the following documents are
downloaded:
Export Summary - An Excel document that contains a summary of the export. This includes information
such as the number of content sources that were searched, the number of search results from each content
location, the estimated number of items, the actual number of items that would be exported, and the
estimated and actual size of items that would be exported.

NOTE
If you include unindexed items when exporting the report, the number of unindexed items are included in the total
number of estimated search results and in the total number of downloaded search results (if you were to export the
search results) that are listed in the Export Summary report. In other words, the total number of items that would
be downloaded is equal to the total number of estimated results and the total number of unindexed items.

Manifest - A manifest file (in XML format) that contains information about each item included in the
search results.
Results - An Excel document that contains a row with information about each indexed item that would be
exported with the search results. For email, the result log contains information about each message,
including:
The location of the message in the source mailbox (including whether the message is in the primary
or archive mailbox).
The date the message was sent or received.
The Subject line from the message.
The sender and recipients of the message.
For documents from SharePoint and OneDrive for Business sites, the Results log contains
information about each document, including:
The URL for the document.
The URL for the site collection where the document is located.
The date that the document was last modified.
The name of the document (which is located in the Subject column in the result log).

NOTE
The number of rows in the Results report should be equal to the total number of search results that would
be downloaded minus the total number of items listed in the Unindexed Items report.

Unindexed Items - An Excel document that contains information about any unindexed items that would
be included in the search results. If you don't include unindexed items when you generate the search
results report, this report will still be downloaded, but will be empty.
Search for and delete messages - Admin help
8/21/2018 • 5 minutes to read • Edit Online

Administrators can use the Search-Mailbox cmdlet to search user mailboxes and then delete messages from a
mailbox.
To search and delete messages in one step, run the Search-Mailbox cmdlet with the DeleteContent switch.
However, when you do this, you can't preview search results or generate a log of messages that will be returned by
the search, and you may inadvertently delete messages that you didn't intend to. To preview a log of the messages
found in the search before they're deleted, run the Search-Mailbox cmdlet with the LogOnly switch.
As an additional safeguard, you can first copy the messages to another mailbox by using the TargetMailbox and
TargetFolder parameters. By doing this, you retain a copy of the deleted messages in case you need to access them
again.

Before you begin


Estimated time to complete: 10 minutes. The actual time may vary depending on the size of the mailbox and
the search query.
You can't use the Exchange admin center (EAC ) to perform these procedures. You must use the Shell.
You need to be assigned both of the following management roles to search for and delete messages in users'
mailboxes:
Mailbox Search- This role allows you to search for messages across multiple mailboxes in your
organization. Administrators aren't assigned this role by default. To assign yourself this role so that
you can search mailboxes, add yourself as a member of the Discovery Management role group. See
Add a User to the Discovery Management Role Group.
Mailbox Import Export - This role allows you to delete messages from a user's mailbox. By default,
this role isn't assigned to any role group. To delete messages from users' mailboxes, you can add the
Mailbox Import Export role to the Organization Management role group. For more information, see
the "Add a role to a role group" section in Manage Role Groups .
If the mailbox from which you want to delete messages has single item recovery enabled, you must first
disable the feature. For more information, see Enable or disable single item recovery for a mailbox.
If the mailbox from which you want to delete messages is placed on hold, we recommend that you check
with your records management or legal department before removing the hold and deleting the mailbox
content. After you obtain approval, follow the steps listed in the topic Clean Up the Recoverable Items
Folder.
You can search a maximum of 10,000 mailboxes using the Search-Mailbox cmdlet. If you're an Exchange
Online organization and have more than 10,000 mailboxes, you can use the Compliance Search feature (or
the corresponding New-ComplianceSearch cmdlet) to search an unlimited number of mailboxes. Then
you can use the New-ComplianceSearchAction cmdlet to delete the messages returned by a compliance
search. For more information, see Search for and delete email messages from your Office 365 organization.
If you include a search query (by using the SearchQuery parameter), the Search-Mailbox cmdlet will return
a maximum of 10,000 items in the search results. Therefore if you include a search query, you might have to
run the Search-Mailbox command multiple times to delete more than 10,000 items.
The user's archive mailbox will also be searched when you run the Search-Mailbox cmdlet. Similarly, items
in the primary archive mailbox will be deleted when you use the Search-Mailbox cmdlet with the
DeleteContent switch. To prevent this, you can include the DoNotIncludeArchive switch. Also, we
recommend that you don't use the DeleteContent switch to delete messages in Exchange Online mailboxes
that have auto-expanding archiving enabled because unexpected data loss may occur.

Search messages and log the search results


This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field and logs the search results in the SearchAndDeleteLog folder of the administrator's mailbox.
Messages aren't copied to or deleted from the target mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -TargetMailbox


administrator -TargetFolder "SearchAndDeleteLog" -LogOnly -LogLevel Full

This example searches all mailboxes in the organization for messages that have any type of attached file that
contains the word "Trojan" in the filename and sends a log message to the administrator's mailbox.

Get-Mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery attachment:trojan* -TargetMailbox administrator


-TargetFolder "SearchAndDeleteLog" -LogOnly -LogLevel Full

For detailed syntax and parameter information, see Search-Mailbox.

Search and delete messages


This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field and deletes the messages from the source mailbox without copying the search results to another
folder. As previously explained, you need to be assigned the Mailbox Import Export management role to delete
messages from a user's mailbox.

IMPORTANT
When you use the Search-Mailbox cmdlet with the DeleteContent switch, messages are permanently deleted from the
source mailbox. Before you permanently delete messages, we recommend that you either use the LogOnly switch to generate
a log of the messages found in the search before they're deleted or copy the messages to another mailbox before deleting
them from the source mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -DeleteContent

This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field, copies the search results to the folder AprilStewart-DeletedMessages in the mailbox BackupMailbox,
and deletes the messages from April's mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -TargetMailbox


"BackupMailbox" -TargetFolder "AprilStewart-DeletedMessages" -LogLevel Full -DeleteContent

This example searches all mailboxes in the organization for messages with the subject line "Download this file", and
then permanently deletes them.

Get-Mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery 'Subject:"Download this file"' -DeleteContent


For detailed syntax and parameter information, see Search-Mailbox.

Using the -LogLevel Full parameter


In some of the previous examples, the LogLevel parameter, with the Full value is used to log detailed information
about the results returned by the Search-Mailbox cmdlet. When you included this parameter, an email message is
created and sent to the mailbox specified by the TargetMailbox parameter. The log file (which is a CSV -formatted
file named Search Results.csv) is attached to this email message, and will be located in the folder specified by the
TargetFolder parameter. The log file contains a row for each message that's included in the search results when you
run the Search-Mailbox cmdlet.
Searching cloud-based mailboxes for on-premises
users in Office 365
8/21/2018 • 8 minutes to read • Edit Online

If your organization has an Exchange hybrid deployment and has enabled Microsoft Teams, users can use the
Teams chat application for instant messaging. For the cloud-based user, the Teams chat data (also called 1xN chats)
is saved to their primary cloud-based mailbox. When an on-premises user uses the Team chat application, their
primary mailbox is located on-premises. To get around this limitation, Microsoft has released a new feature where
a cloud-based storage area (called a cloud-based mailbox for on-premises users) is created to store Teams chat
data for on-premises users. This lets you use the Content Search tool in the Office 365 Security & Compliance
Center to search and export Teams chat data for on-premises users.
Here are the requirements and limitation for setting up and to set up and search cloud-based mailboxes for on-
premises users:
The user accounts in your on-premises directory service (such as Active Directory) must be synchronized
with Azure Active Directory, the directory service in Office 365. This means that a mail user account is
created in Office 365 and is associated with a user whose primary mailbox is located in the on-premises
organization.
The cloud-based mailbox for on-premises users is used only store Teams chat data. An on-premises user
can't sign in to the cloud-based mailbox or access in any way. It can't be used to send or receive email
messages.
You have to submit a request to Microsoft Support to enable your organization to search for Teams chat
data in the cloud-based mailboxes for on-premises users. See Filing a request with Microsoft Support to
enable this feature in the Security & Compliance Center in this article.
Note: Teams channel conversations are always stored in the cloud-based mailbox that's associated with the Team.
That means you can use Content Search to search channel conversations without have to file a support request.
For more information about searching Teams channel conversations, see Searching Microsoft Teams and Office
365 Groups.

How it works
If a Microsoft Teams-enabled user has an on-premises mailbox and their user account/identity has been synched
to the cloud, Microsoft creates a cloud-based mailbox to store 1xN Teams chat data. After the Teams chat data is
stored in the cloud-based mailbox, it's indexed for search. This lets you Use Content Search (and searches
associated with eDiscovery cases) to search, preview, and export Teams chat data for on-premises users. You can
also use *ComplianceSearch cmdlets in the Office 365 Security & Compliance Center PowerShell to search for
Teams chat data for on-premises users.
The following graphic shows the workflow of how Teams chat data for on-premises users is available to search,
preview, and export.
In addition to this new capability, you can still use Content Search to search, preview, and export Teams content in
the cloud-based SharePoint site and Exchange mailbox associated with each Microsoft Team and 1xN Teams chat
data in the Exchange Online mailbox for cloud-based users.

Filing a request with Microsoft Support to enable this feature in the


Security & Compliance Center
You must file a request with Microsoft Support to enable your organization to use the graphical user interface in
the Security & Compliance Center to search for Teams chat data in the cloud-based mailboxes for on-premises
users. Note that this feature is available in Office 365 Security & Compliance Center PowerShell. You don't have to
submit a support request to use PowerShell to search for Teams chat data for on-premises users.
Include the following information when you submit the request to Microsoft Support:
The default domain name of your Office 365 organization.
The tenant name and tenant ID of your Office 365 organization. You can find these in the Azure Active
Directory portal (under Manage > Properties). See Find your Office 365 tenant ID.
The following title or description of the purpose of the support request: "Enable Application Content Search
for On-premises Users". This will help route the request to the Office 365 eDiscovery engineering team
who will implement the request.
After the engineering change is made, Microsoft Support will send you an estimated deployment date. Note that
the deployment process usually takes 2-3 weeks after you submit the support request.
What happens after this feature is enabled?
After this feature is deployed in your Office 365 organization, the following changes are made in Content Search
and in searches associated with an eDiscovery case in the Security & Compliance Center:
The Add Office app content for on-premises users checkbox is added under the Locations in Content
Search.
On-premises users are displayed in the content locations picker that you use to select user mailboxes to
search.

Searching for Teams chat content in cloud-based mailboxes for on-


premises users
After the feature has been enabled, you can use Content Search in the Security & Compliance Center to search for
Teams chat data in the cloud-based mailboxes for on-premises users.
1. In the Security & Compliance Center, go to Search & investigation > Content search
2. On the Search page, click New search.
As previously explained, the Add Office app content for on-premises users checkbox is displayed under
Locations. Note that it is selected by default.
3. Create the keyword query and add conditions to the search query if necessary. To only search for Team
chats data, you can add the following query in the Keywords box:

kind:im

4. At this point, you can choose one of the following options under Locations:
All locations - Select this option to search the mailboxes of all users in your organization. When the
checkbox is selected, all cloud-based mailboxes for on-premises users will also be searched.
Specific locations - Select this option and then click Modify > Choose user, groups, or teams to
search specific mailboxes. As previously explained, the locations picker will let you search for on-
premises users.
5. Save and run the search. Any search results from the cloud-based mailboxes for on-premises users can be
previewed like any other search results. Additionally, you can you can export the search results (including
any Teams chat data) to a PST file. For more information, see:
Create a new search
Preview search results
Export Content Search results from the Office 365 Security & Compliance Center

Using PowerShell to search for Teams chat data in cloud-based


mailboxes for on-premises users
You can use the New-ComplianceSearch and Set-ComplianceSearch cmdlets in the Office 365 Security &
Compliance Center PowerShell to search the cloud-based mailbox for on-premises users. As previously explained,
you don't have to submit a support request to use PowerShell to search for Teams chat data for on-premises users.
1. Connect to Office 365 Security & Compliance Center PowerShell.
2. Run the following PowerShell command to create a new content searches the cloud-based mailboxes of on-
premises users.

New-ComplianceSearch <name of new search> -ContentMatchQuery <search query> -ExchangeLocation <on-


premises user> -IncludeUserAppContent $true -AllowNotFoundExchangeLocationsEnabled $true

The IncludeUserAppContent parameter is used to specify the cloud-based mailbox for the user or users
who are specified by the ExchangeLocation parameter. The AllowNotFoundExchangeLocationsEnabled
allows cloud-based mailboxes for on-premises users. When you use the $true value for this parameter, the
search doesn't try to validate the existence of the mailbox before it runs. This is required to search the
cloud-based mailboxes for on-premises users because these types of mailboxes don't resolve as regular
mailboxes.
The following example searches for Teams chats (which are instant messages) that contain keyword
"redstone" in the cloud-based mailbox of Sara Davis, who is an on-premises user in the Contoso
organization.

New-ComplianceSearch "Redstone_Search" -ContentMatchQuery "redstone AND kind:im" -ExchangeLocation


sarad@contoso.com -IncludeUserAppContent $true -AllowNotFoundExchangeLocationsEnabled $true

After you create a new search, be sure to use the Start-ComplianceSearch cmdlet to run the search.
For more information using these cmdlets, see:
New -ComplianceSearch
Set-ComplianceSearch
Start-ComplianceSearch

Known issues
Currently, you can only search, preview, and export content in cloud-based mailboxes for on-premises
users. Placing a cloud-based mailbox for an on-premises user on a hold associated with an eDiscovery case
or assigning it to an Office 365 retention policy is not supported.
The content location picker for eDiscovery holds displays on-premises users and will let you select them.
However, as previously explained the hold will not be applied to the on-premises user.

Frequently asked questions


Where are cloud-based mailboxes for on-premises users located?
Cloud-based mailboxes are created and stored in the same datacenter as your Office 365 organization.
Are there any other requirements other than submitting a support request?
As previously explained, the identities of users with on-prem mailboxes must be synchronized to your cloud-based
organization so that a corresponding mail user account is created for each on-premises user account in Office 365.
Additionally, your organization must have an Office 365 enterprise subscription, such as an Office 365 Enterprise
E1, E3, or E5 subscription.
Is there a risk of losing the Teams chat data if the user's on-premises mailbox is migrated to the cloud?
No. When you migrate the primary mailbox of an on-premises user to the cloud, the Teams chat data for that user
will be migrated to their new cloud-based primary mailbox.
Can I apply an eDiscovery hold or Office 365 retention policies to on-premises users?
No.
Can Content Search find older Teams chats for on-premises users before the time my organization
submitted the request to enable this feature?
Microsoft started storing the Teams chat data for on-premises users on January 31, 2018. So, if the identity of an
on-premises Teams user has been synched between Active Directory and Azure Active Directory since this date,
then their Teams chat data will be stored in a cloud-based mailbox and will be searchable using Content Search.
Microsoft is also working on storing Teams chat data from prior to January 31, 2018 in the cloud-based mailboxes
for on-premises users. More information about this will be available soon.
Bulk edit Content Searches in the Office 365 Security
& Compliance Center
9/26/2018 • 6 minutes to read • Edit Online

You can use the Bulk Search Editor in the Office 365 Security & Compliance Center to edit multiple Content
Searches at the same time. Using this tool lets you quickly change the query and content locations for one or more
searches. Then you can re-run the searches and get new estimated search results for the revised searches. The
editor also lets you copy and paste queries and content locations from a Microsoft Excel file or text file. This means
you can use the Search Statistics tool to view the statistics of one or more searches, export the statistics to a CSV
file where you can edit the queries and content locations in Excel. Then you use the Bulk Search Editor to add the
revised queries and content locations to the searches. After you've revised one or more searches, you can re-start
them and get new estimated search results.
For more information about using the Search Statistics tool, see View keyword statistics for Content Search
results.

Use the Bulk Search Editor to change queries


1. In the Security & Compliance Center, go to Search & investigation > Content search.
2. In the list of searches, select one or more searches, and then click Bulk Search Editor .

The following information is displayed on the Queries page of the Bulk Search Editor.

a. The Search column displays the name of the Content Search. As previously stated, you can edit the query
for multiple searches.
b. The Query column displays the query for the Content Search listed in the Search column. If the query
was created using the keyword list feature, the keywords are separated by the text ** (c:s) . This indicates
that the keywords are connected by the OR operator. Additionally, if the query includes
conditions, the keywords and the conditions are separated by the text ** (c:c) . This indicates that
the keywords (or keyword phases) are connected to the conditions by the AND operator. For example, in
the previous screenshot the for search ContosoSearch1, the KQL query that is equivalent to
customer (c:s) pricing(c:c)(date=2000-01-01..2016-09-30) would be
(customer OR pricing) AND (date=2002-01-01..2016-09-30) .

3. To edit a query, click in the cell of the query that you want to change and doing one of the following things.
Note that the cell is bordered by a blue box when you click it.
Type the new query in the cell. Note that you can't edit a portion of the query. You have to type the
entire query.
Or
Paste a new query in the cell. This assumes that you've copied the query text from a file, such as a text
file or an Excel file.
4. After you've edited one or more queries on the Queries page, click Save.
The revised query is displayed in the Query column for the selected search.
5. Click Close to close the Bulk Search Editor.
6. On the Content search page, select the search that you edited, and click Start search to restart the search
using the revised query.
Here are some tips for editing queries using the Bulk Search Editor:
Copy the existing query (by using Ctrl C ) to a text file. Edit the query in the text file, and then copy the
revised query and paste it (using Ctrl V ) back into the cell on the Queries page.
You can also copy queries from other applications (such as Microsoft Word or Microsoft Excel). However, be
aware that you might inadvertently add unsupported characters to a query using the Bulk Search Editor.
The best way to prevent unsupported characters is to just type the query in a cell on the Queries page.
Alternatively, you can copy a query from Word or Excel and then paste it to file in a plain text editor, such as
Microsoft Notepad. Then save the text file and select ANSI in the Encoding drop-down list. This will
remove any formatting and unsupported characters. Then you can copy and paste the query from the text
file to the Queries page.

Use the Bulk Search Editor to change content locations


1. In the Bulk Search Editor for one or more selected searches, click Enable bulk location editor, and then
click the Locations link that is displayed on the page.
The following information is displayed on the Locations page of the Bulk Search Editor.
a. Mailboxes to searchThis section displays a column for each selected Content Search, and row for each
mailbox that's included in the search. A checkmark indicates that the mailbox is included in the search. You
can add additional mailboxes to a search by typing the email address of the mailbox in a blank row and then
clicking the checkbox for the Content Search that you want to add it to. Or you can remove a mailbox from a
search by clearing the checkbox.
b. SharePoint sites to searchThis section displays a row for each SharePoint and OneDrive site that
included in each selected Content Search. A checkmark indicates that the site is included in the search. You
can add additional sites to a search by typing the URL for the site in a blank row and then and clicking the
checkbox for the Content Search that you want to add it to. Or you can remove a site from a search by
clearing the checkbox.
c. Other search optionsThis section indicates whether unindexed items and public folders are included in
the search. To include these, make sure the checkbox is selected. To remove them, clear the checkbox.
2. After you've edited one or more of the sections on the Locations page, click Save.
The revised content locations are displayed in the appropriate section for the selected searches.
3. Click Close to close the Bulk Search Editor.
4. On the Content search page, select the search that you edited, and click Start search to restart the search
using the revised content locations.
Here are some tips for editing content locations using the Bulk Search Editor:
You can edit Content Searches to search all mailboxes or sites in the organization by typing All in a blank
row in the Mailboxes to search or SharePoint sites to search section and then clicking the checkbox.
You can add multiple content locations to one or more searches by copying multiple rows from a text file or
an Excel file and then pasting them to a section on the Locations page. After you add new locations, be sure
to select the checkbox for each search that you want add the location to.

TIP
To generate a list of email addresses for all the users in your organization, run the PowerShell command in Step 2 in
Use Content Search to search the mailbox and OneDrive for Business site for a list of users. Or use the script in
Create a list of all OneDrive locations in your organization to generate a list of all OneDrive for Business sites in your
organization. Note that you'll have to append the URL for your's organization's MySite domain (for example,
https://contoso-my.sharepoint.com) to the OneDrive for Business sites that's created by the script. After you have list
of email addresses or OneDrive for Business sites, you can copy and paste them to the Locations page in the Bulk
Search Editor.

After you click Save to save changes in Bulk Search Editor, the email address for mailboxes that you added
to a search will be validated. If the email address doesn't exist, an error message is displayed saying the
mailbox can't be located. Note that URLs for sites aren't validated.
Prepare a CSV file for an ID list Content Search in
Office 365
9/26/2018 • 5 minutes to read • Edit Online

You can search for specific mailbox email messages and other mailbox items using a list of Exchange IDs. To create
an ID list search (formally called a targeted search), you submit a comma separated value (CSV ) file that identifies
the specific mailbox items to search for. For this CSV file you use the Results.csv file or the Unindexed Items.csv
file that are included when you export the Content Search results or export a Content Search report from and
existing Content Search. Then you edit one of these files to indicate the specific items to search for, and then create
a new ID list search and submit the CSV file.
Here's a quick overview of the process for creating an ID list search.
1. Create and run a new or guided Content Search in the Security & Compliance Center.
2. Export the content search results or export the content search report. For more information, see:
Export Content Search results from the Office 365 Security & Compliance Center
Export a Content Search report
3. Edit the Results.csv file or the Unindexed Items.csv and identify the specific mailbox items that you want
to include in the ID list search. See the instructions for preparing a CSV file for an ID list search.
4. Create a new ID list search (see the instructions) and submit the CSV file that you prepared. The search
query that's created will only search for the items selected in the CSV file.

NOTE
ID list searches are only supported for mailbox items. You can't search for SharePoint and OneDrive documents in an ID list
search.

Why create an ID list search? If you're unable to determine if an item is responsive to an eDiscovery request
based on the metadata in the Results.csv or Unindexed Items.csv files, you can use an ID list search to find,
preview, and then export that item to determine if it's responsive to the case you're investigating. ID list searches
are typically used to search for and return a specific set of unindexed items.

Prepare the CSV file for an ID list search


After you export the search results or report for a content search, you can perform the following steps to prepare
the CSV file for an ID list search. This CSV file will identify every item in the ID list search.
Note that you can use a CSV file from a search that included SharePoint sites and OneDrive accounts, but you can
select only mailbox items for an ID list search. If you select a document in SharePoint or OneDrive, the CSV file
will fail validation when you create an ID list search.
1. Open the Results.csv or Unindexed Items.csv file in Excel.
2. Insert a new column and name it Selected. It doesn't matter where you insert the column. For convenience,
consider inserting it to the left of the first column.
3. In the Selected column, type Yes in the cell that corresponds to the item that you want to search for. Repeat
this step for every item that you want to search for.

IMPORTANT
When you open the CSV file in Excel, the data format for the Document ID column is changed to General. This
results in displaying the document ID for an item in scientific notation. For example, the document ID of
"481037338205" is displayed as "4.81037E+11" You have to perform the next steps to change the data format of
the Document ID column to Number to restore the correct format for the document ID. If you don't do this, the ID
list search that uses the CSV file will fail.

4. Right-click the entire Document ID column and select Format Cells.


5. In the Category box, click Number.
6. Change the number of decimal places to 0, and then click OK to save your changes. Notice that the values
in the Document ID column are changed to numbers.
Here's an example of the a CSV file that's ready to be submitted for a ID list content search.

7. Save the CSV file or use Save As to the save the file with different file name. In both cases, be sure to save
the file with the CSV format.

Create an ID list search


The next step is to create a new ID list Content Search and submit the CSV file that you prepared in the previous
step.

IMPORTANT
You should create an ID list search no more than 2 days after exporting the results or report from a Content Search. If the
search results or report where exported more than 2 days ago, you should re-export the search results or report to
generate updated CSV files. Then you can prepare one of the updated CSV files and use it to create an ID list search.

1. In the Security & Compliance Center, go to Search & investigation > Content search.
2. On the Search page, click the arrow next to New search, and then click Search by ID List.
3. On the Search by ID List flyout, name the search (and optionally describe it) and then click Browse and
select the CSV file that you prepared in the previous step.
Office 365 attempts to validate the CSV file. If the validation is unsuccessful, an error message is displayed
that might help you troubleshoot the validation errors. The CSV file has to be successfully validated to
create an ID list search.
4. After the CSV file is successfully validated, click Search to create the ID list search.
Here's an example of the estimated search results and the query that's generated for an ID list search.

Note that the number of estimated items displayed in statistics for the ID search should match the number
of items that you selected in the CSV file.
5. Preview or export the items returned by the ID list search.

NOTE
If you move a mailbox after creating an ID list search, the query for the search won't return the specified items. That's
because the DocumentId property for mailbox items are changed when a mailbox is moved. In the rare instance when a
mailbox is moved after you create an ID list search, you should create a new content search (or update the search results for
the existing content search) and then export the search results or report to generate updated CSV files that can be used to
create a new ID list search.
Use Content Search to search third-party data that
was imported to Office 365
9/26/2018 • 2 minutes to read • Edit Online

You can use the Content Search eDiscovery tool in the Office 365 Security & Compliance Center to search for
items that were imported to mailboxes in Office 365 from a third-party data source. You can create a query to
search all imported third-party data items or you can create a query to only search specific third-party data items.
Additionally, you can also create a query-based Preservation Policy or a query-based eDiscovery hold to preserve
third-party data in Office 365.
For more information about importing third-party data and a list of the third-party data types that can be
imported to Office 365, see Archiving third-party data in Office 365.

Creating a query to search all third-party data


To search (or place on hold) any type of third-party data that you've imported to Office 365, you can you can use
the kind:externaldata message property-value pair in the keyword box for a Content Search or when creating a
query-based hold. For example, to search for items that were imported from any third-party data source and
contain the word "contoso" in the Subject property of the imported item, you would use the following query:

kind:externaldata AND subject:contoso

The previous keyword query example includes the subject property. For a list of other properties for third-party
data items that can included in a keyword query, see the "More information" section in Archiving third-party data
in Office 365.
When creating queries to search and hold third-party data, you can also use conditions to narrow the search
results. For more information about creating Content Search queries, see Keyword queries and search conditions
for Content Search.

Creating a query to search specific types of third-party data


Instead of searching all types of third-party data, you can create queries that only search for a specify type of
third-party data by using the following message property-value pair in the keyword box for a Content Search:

itemclass:ipm.externaldata.<third-party data type>*

For example, to only search Facebook data that contains the word "contoso" in the Subject property, you would
use the following query:

itemclass:ipm.externaldata.Facebook* AND subject:contoso

The following table lists the third-party data types that you can search, and the value to use for the itemclass:
message property to specifically search for that type of third-party data. Note that the query syntax isn't case
sensitive.
THIRD-PARTY DATA TYPE VALUE FOR ITEMCLASS: PROPERTY

AIM ipm.externaldata.AIM*

American Idol ipm.externaldata.AmericanIdol*

AOL with Pivot Client ipm.externaldata.Pivot.IM

Apple Juice ipm.externaldata.AppleJuice*

Ares ipm.externaldata.Ares*

Axs Encrypted ipm.externaldata.AxsEncrypted*

Axs Exchange ipm.externaldata.AxsExchange*

Axs Local Archive ipm.externaldata.AxsLocalArchive*

Axs Placeholder ipm.externaldata.AxsPlaceHolder*

Axs Signed ipm.externaldata.AxsSigned*

Bazaarvoice ipm.externaldata.Bazaarvoice*

Bearshare ipm.externaldata.Bearshare*

BitTorrent ipm.externaldata.BitTorrent*

Blackberry ipm.externaldata.Blackberry*

BlackBerry Call Logs ipm.externaldata.BlackBerryCall*

BlackBerry Messenger ipm.externaldata.BlackBerryMessenger*

BlackBerry PIN ipm.externaldata.BlackBerryPIN*

BlackBerry SMS ipm.externaldata.BlackBerrySMS*

Bloomberg ipm.externaldata.Bloomberg*

Bloomberg Mail ipm.externaldata.BloombergMail*

Bloomberg Messaging ipm.externaldata.BloombergMessaging*

Box ipm.externaldata.Box*

Cisco IM & Presence Server ipm.externaldata.Jabber.IM

Cisco Jabber ipm.externaldata.Jabber*


THIRD-PARTY DATA TYPE VALUE FOR ITEMCLASS: PROPERTY

CipherCloud for Salesforce Chatter ipm.externaldata.Chatter.Post


ipm.externaldata.Chatter.Comment

Direct Connect ipm.externaldata.DirectConnect*

Facebook ipm.externaldata.Facebook*

FastTrack ipm.externaldata.FastTrack*

FXConnect ipm.externaldata.FXConnect.chat

Flickr ipm.externaldata.Flickr*

Gnutella ipm.externaldata.Gnutella*

Google+ ipm.externaldata.GooglePlus*

Google Talk ipm.externaldata.GoogleTalk*

GoToMyPC ipm.externaldata.GoToMyPC*

HipChat ipm.externaldata.HipChat*

Hopster ipm.externaldata.Hopster*

HubConnex ipm.externaldata.HubConnex*

IBM Connections ipm.externaldata.Connections*

IBM SameTime ipm.externaldata.Sametime*

ICE Chat ipm.externaldata.ICEChat.Chat

Indii Messenger ipm.externaldata.Indii*

Instagram ipm.externaldata.Instagram*

Instant Bloomberg ipm.externaldata.InstantBloomberg*

InvestEdge ipm.externaldata.InvestEdge*

IRC ipm.externaldata.IRC*

Jive ipm.externaldata.Jive*

JiveApiRetention ipm.externaldata.JiveApiRetention*

JXTA ipm.externaldata.JXTA*
THIRD-PARTY DATA TYPE VALUE FOR ITEMCLASS: PROPERTY

LinkedIn ipm.externaldata.LinkedIn*

MFTP ipm.externaldata.MFTP*

Microsoft UC ipm.externaldata.MicrosoftUC*

Mind Align ipm.externaldata.MindAlign*

Mobile Guard ipm.externaldata.MobileGuard*

MSN ipm.externaldata.MSN*

MySpace ipm.externaldata.MySpace*

NEONetwork ipm.externaldata.NEONetwork*

OpenNap ipm.externaldata.OpenNap*

Pinterest ipm.externaldata.Pinterest*

Pivot ipm.externaldata.Pivot*

QQ ipm.externaldata.QQ*

Microsoft SharePoint ipm.externaldata.SharePoint*

Salesforce Chatter ipm.externaldata.Chatter*

Skype for Business ipm.externaldata.Skype*

Slack Enterprise Grid ipm.externaldata.Slack.IM

SoftEther ipm.externaldata.SoftEther*

Squawker ipm.externaldata.Squawker*

Symphony ipm.externaldata.Symphony*

Thomson Reuters ipm.externaldata.Reuters*

Thomson Reuters Eikon Messenger ipm.externaldata.ReutersEikon*

Tor ipm.externaldata.Tor*

TTT ipm.externaldata.TTT*

Twitter ipm.externaldata.Twitter*
THIRD-PARTY DATA TYPE VALUE FOR ITEMCLASS: PROPERTY

UBS Chat ipm.externaldata.UBS*

Vimeo ipm.externaldata.Vimeo*

WinMX ipm.externaldata.WinMX*

Winny ipm.externaldata.Winny*

Yahoo! ipm.externaldata.Yahoo!*

Yammer ipm.externaldata.Yammer*

YellowJacket ipm.externaldata.YellowJacket*

YouTube ipm.externaldata.YouTube*
Use Content Search in your eDiscovery workflow
9/26/2018 • 13 minutes to read • Edit Online

The Content Search feature in the Office 365 Security & Compliance Center allows you to search all mailboxes in
your organization. Unlike In-Place eDiscovery in Exchange Online (where you can search up to 10,000 mailboxes),
there are no limits for the number of target mailboxes in a single search. For scenarios that require you to perform
organization-wide searches, you can use Content Search to search all mailboxes. Then you can use the workflow
features of In-Place eDiscovery to perform other eDiscovery-related tasks, such as placing mailboxes on hold and
exporting search results. For example, let's say you have to search all mailboxes to identify specific custodians that
are responsive to a legal case. You can use Content Search in the Security & Compliance Center to search all
mailboxes in your organization to identify those that are responsive to the case. Then you can use that list of
custodian mailboxes as the source mailboxes for an In-Place eDiscovery search in Exchange Online. Using In-Place
eDiscovery also allows you to put a hold on those source mailboxes, copy search results to a discovery mailbox,
and export the search results.
This topic includes a script that you can run to create an In-Place eDiscovery search in Exchange Online by using
the list of source mailboxes and search query from a search created in the Security & Compliance Center. Here's
an overview of the process:
Step 1: Create a Content Search to search all mailboxes in your organization
Step 2: Connect to the Security & Compliance Center and Exchange Online in a single remote PowerShell session
Step 3: Run the script to create an In-Place eDiscovery search from the Content Search
Step 4: Start the In-Place eDiscovery search

Step 1: Create a Content Search to search all mailboxes in your


organization
The first step is to use the Security & Compliance Center (or Security & Compliance Center PowerShell) to create a
Content Search that searches all mailboxes in your organization. There's no limit for the number of mailboxes for a
single Content Search. Specify an appropriate keyword query (or a query for sensitive information types) so that
the search returns only those source mailboxes that are relevant to your investigation. If necessary, refine the
search query to narrow the scope of search results and source mailboxes that are returned.

NOTE
If the source Content Search doesn't return any results, an In-Place eDiscovery won't be created when you run the script in
Step 3. You may have to revise the search query then rerun the Content Search to return search results.

Use the Security & Compliance Center to search all mailboxes


1. Go to the Office 365 Security & Compliance Center.
2. Click Search & investigation, click Content search, and then click New .
3. On the New search page, type a name for the Content Search.
4. Under Where do you want us to look?, click Search all mailboxes, and then click Next.
5. In the box under What do you want us to look for?, type a search query in the box. You can specify
keywords, message properties such as sent and received dates, or document properties such as file names
or the date that a document was last changed. You can use a more complex queries that use a Boolean
operator, such as AND, OR, NOT or NEAR, or you can also search for sensitive information (such as social
security numbers) in messages. For more information about creating search queries, see Keyword queries
for Content Search.
6. Click Search to save the search settings and start the search.
After a while, an estimate of the search results displayed in the details pane. The estimate includes the total
size and number of items for the search results. After the search is completed, you can preview the search
results. If necessary, click Refresh to update the information in the details pane.
7. If necessary, refine the search query to narrow the scope of search results and then restart the search.
Use Security & Compliance Center PowerShell to search all mailboxes
You can also use the New-ComplianceSearch cmdlet to search all mailboxes in your organization. The first step
is to Connect to Office 365 Security & Compliance Center PowerShell.
Here's an example of using PowerShell to search all mailboxes in your organization. The search query returns all
messages sent between January 1, 2015 and June 30, 2015 and that contain the phrase "financial report" in the
subject line. The first command creates the search, and the second command runs the search.

New-ComplianceSearch -Name "Search All-Financial Report" -ExchangeLocation all -ContentMatchQuery


'sent>=01/01/2015 AND sent<=06/30/2015 AND subject:"financial report"'

Start-ComplianceSearch -Identity "Search All-Financial Report"

For more information, see New -ComplianceSearch.


Verify the number of source mailboxes in the Content Search
A Content Search returns a maximum of 1,000 source mailboxes that contain search results. If there are more than
1,000 mailboxes that contain content that matches the search query, only the top 1,000 mailboxes with the most
search results are included in the Content Search that you created in the previous step. So if more than 1,000
mailboxes contain search results, some of those mailboxes won't be included in the list of source mailboxes copied
to the new In-Place eDiscovery search created in Step 3.
To help you create a Content Search with no more than 1,000 source mailboxes, follow these steps to run a script
that displays the number of source mailboxes (that contain search results) returned by the Content Search you
created in Step 1.
1. Save the following text to a PowerShell script file by using a filename suffix of .ps1. For example, you could save
it to a file named SourceMailboxes.ps1 .
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=1)]
[string]$SearchName
)
$search = Get-ComplianceSearch $SearchName
if ($search.Status -ne "Completed")
{
"Please wait until the search finishes.";
break;
}
$results = $search.SuccessResults;
if (($search.Items -le 0) -or ([string]::IsNullOrWhiteSpace($results)))
{
"The Content Search " + $SearchName + " didn't return any useful results.";
break;
}
$mailboxes = @();
$lines = $results -split '[\r\n]+';
foreach ($line in $lines)
{
if ($line -match 'Location: (\S+),.+Item count: (\d+)' -and $matches[2] -gt 0)
{
$mailboxes += $matches[1];
}
}
"Number of mailboxes that have search hits: " + $mailboxes.Count

2. In Security & Compliance Center PowerShell, go to the folder where the script you created in the previous
step is located, and then run the script; for example:

.\SourceMailboxes.ps1

3. When prompted by the script, type the name of the Content Search that you created in Step 1.
The script displays the number of source mailboxes that contain search results.
If there are more than 1,000 source mailboxes, try creating two (or more) Content Searches. For example, search
half of your organization's mailboxes in one Content Search and the other half in another Content Search. You
could also change the search criteria to reduce the number of mailboxes that contain search results. For example,
you could include a date range or refine the keyword query.

Step 2: Connect to the Security & Compliance Center and Exchange


Online in a single remote PowerShell session
The next step is to connect Windows PowerShell to both the Security & Compliance Center and to your Exchange
Online organization. This is necessary because the script that you run in Step 3 requires access to the Content
Search cmdlets in the Security & Compliance Center and the In-Place eDiscovery cmdlets in Exchange Online.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1. For example,
you could save it to a file named ConnectEXO-CC.ps1 .
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.outlook.com/powershell-liveid -Credential $UserCredential -Authentication Basic -
AllowRedirection
Import-PSSession $Session -DisableNameChecking
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $UserCredential -
Authentication Basic -AllowRedirection
Import-PSSession $Session -AllowClobber -DisableNameChecking
$Host.UI.RawUI.WindowTitle = $UserCredential.UserName + " (Exchange Online + Compliance Center)"

2. On your local computer, open Windows PowerShell, go to the folder where the script that you created in the
previous step is located, and then run the script; for example:

.\ConnectEXO-CC.ps1

How do you know if this worked? After you run the script, cmdlets from the Security & Compliance Center and
Exchange Online are imported into your local PowerShell session. If you don't receive any errors, you connected
successfully. A quick test is to run a Security & Compliance Center cmdlet—for example, Install-
UnifiedCompliancePrerequisite —and an Exchange Online cmdlet, such as Get-Mailbox.

Step 3: Run the script to create an In-Place eDiscovery search from the
Content Search
After you create the dual PowerShell session in Step 2, the next step is to run a script that will convert an existing
Content Search to an In-Place eDiscovery search. Here's what the script does:
Prompts you for the name of the Content Search to convert.
Verifies that the Content Search has completed running. If the Content Search doesn't return any results,
and In-Place eDiscovery won't be created.
Saves a list of the source mailboxes from the Content Search that contain search results to a variable.
Creates a new In-Place eDiscovery search, with the following properties. Note that the new search isn't
started. You'll start it in step 4.
Name - The name of the new search uses this format: <Name of Content Search>_MBSearch1. If
you run the script again and use the same source Content Search, the search will be named <Name
of Content Search>_MBSearch2.
Source mailboxes - All mailboxes from the Content Search that contain search results.
Search query - The new search uses the search query from the Content Search. If the Content
Search includes all content (where the search query is blank) the new search will also have a blank
search query and will include all content found in the source mailboxes.
Estimate only search - The new search is marked as an estimate-only search. It won't copy search
results to a discovery mailbox after you start it.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of ps1. For example, you
could save it to a file named CreateMBSearchFromComplianceSearch.ps1 .
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=1)]
[string]$SearchName,
[switch]$original,
[switch]$restoreOriginal
)
$search = Get-ComplianceSearch $SearchName
if ($search.Status -ne "Completed")
{
"Please wait until the search finishes";
break;
}
$results = $search.SuccessResults;
if (($search.Items -le 0) -or ([string]::IsNullOrWhiteSpace($results)))
{
"The Content Search " + $SearchName + " didn't return any useful results";
"A mailbox search object wasn't created";
break;
}
$mailboxes = @();
$lines = $results -split '[\r\n]+';
foreach ($line in $lines)
{
if ($line -match 'Location: (\S+),.+Item count: (\d+)' -and $matches[2] -gt 0)
{
$mailboxes += $matches[1];
}
}
$msPrefix = $SearchName + "_MBSearch";
$I = 1;
$mbSearches = Get-MailboxSearch;
while ($true)
{
$found = $false;
$mbsName = "$msPrefix$I";
foreach ($mbs in $mbSearches)
{
if ($mbs.Name -eq $mbsName)
{
$found = $true;
break;
}
}
if (!$found)
{
break;
}
$I++;
}
$query = $search.KeywordQuery;
if ([string]::IsNullOrWhiteSpace($query))
{
$query = $search.ContentMatchQuery;
}
if ([string]::IsNullOrWhiteSpace($query))
{
New-MailboxSearch "$msPrefix$i" -SourceMailboxes $mailboxes -EstimateOnly;
}
else
{
New-MailboxSearch "$msPrefix$i" -SourceMailboxes $mailboxes -SearchQuery $query -EstimateOnly;
}

2. In the Windows PowerShell session that you created in Step 2, go to the folder where the script that you
created in the previous step is located, and then run the script; for example:

.\CreateMBSearchFromComplianceSearch.ps1

3. When prompted by the script, type the name of the Content Search that you want to covert to an In-Place
eDiscovery search (for example, the search that you created in Step 1), and then press Enter.
If the script is successful, a new In-Place eDiscovery search is created with a status of NotStarted. Run the
command Get-MailboxSearch <Name of Content Search>_MBSearch1 | FL to display the properties of the new
search.

Step 4: Start the In-Place eDiscovery search


The script that you run in Step 3 creates a new In-Place eDiscovery search, but doesn't start it. The next step is to
start the search so you can get an estimate of the search results.
1. In the Exchange admin center (EAC ), go to Compliance management > In-Place eDiscovery & Hold.
2. In the list view, select the In-Place eDiscovery search that you created in Step 3.
3. Click Search > Estimate search results to start the search and return an estimate of the total size and
number of items returned by the search.
The estimates are displayed in the details pane. Click Refresh to update the information displayed in the
details pane.
4. To preview the results after the search is completed, click Preview search results in the details pane.

Next steps after creating and running the In-Place eDiscovery search
After you create and start the In-Place eDiscovery search that was created by the script in Step 3, you can use the
normal In-Place eDiscovery workflow to perform different eDiscovery actions on the search results.
Create an In-Place Hold
1. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.
2. In the list view, select the In-Place eDiscovery search that you created in Step 3, and then click Edit .
3. On the In-Place Hold page, select the Place content matching the search query in selected
mailboxes on hold check box and then select one of the following options:
Hold indefinitely - Choose this option to place items returned by the search on an indefinite hold. Items
on hold will be preserved until you remove the mailbox from the search or remove the search.
Specify number of days to hold items relative to their received date - Choose this option to hold
items for a specific period. The duration is calculated from the date a mailbox item is received or created.
4. Click Save to create the In-Place Hold and restart the search.
Return to top
Copy the search results
1. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.
2. In the list view, select the In-Place eDiscovery search that you created in Step 3.
3. Click Search , and then click Copy search results from the drop-down list.
4. In Copy Search Results, select from the following options:
Include unsearchable items - Select this check box to include mailbox items that couldn't be
searched (for example, messages with attachments of file types that couldn't be indexed by Exchange
Search).
Enable de-duplication - Select this check box to exclude duplicate messages. Only a single instance
of a message will be copied to the discovery mailbox.
Enable full logging - Select this check box to include a full log in search results.
Send me mail when the copy is completed - Select this check box to get an email notification
when the search is completed.
Copy results to this discovery mailbox - Click Browse to select the discovery mailbox where you
want the search results copied to.
5. Click Copy to start the process to copy the search results to the specified discovery mailbox.
6. Click Refresh to update the information about the copying status that is displayed in the details pane.
7. When copying is complete, click Open to open the discovery mailbox to view the search results.
Export the search results
1. In the EAC, go to Compliance management > In-Place eDiscovery & Hold.
2. In the list view, select the In-Place eDiscovery search that you created in Step 3, and then click Export to a
PST file.
3. In the eDiscovery PST Export Tool window, do the following:
Click Browse to specify the location where you want to download the PST file.
Click the Enable deduplication checkbox to exclude duplicate messages. Only a single instance of a
message will be included in the PST file.
Click the Include unsearchable items checkbox to include mailbox items that couldn't be searched
(for example, messages with attachments of file types that couldn't be indexed by Exchange Search).
Unsearchable items are exported to a separate PST file.
4. Click Start to export the search results to a PST file.
A window is displayed that contains status information about the export process.
Check your Content Search query for errors
9/26/2018 • 2 minutes to read • Edit Online

When you create or edit a Content Search, you can have Office 365 check your query for unsupported characters
and Boolean operators that might not be capitalized. How? Just click Check query for typos on the query page of
a Content Search.

Here's a list of the unsupported characters that we check for. Unsupported characters are often hidden, and they
typically cause a search error or return unintended results.
Smart quotation marks - Smart single and double quotation marks (also called curly quotes) aren't
supported. Only straight quotation marks can be used in a search query.
Non-printable and control characters - Non-printable and control characters don't represent a written
symbol, such as a alpha-numeric character. Examples of non-printable and control characters include
characters that format text or separate lines of text.
Left-to-right and right-to-left marks - These are control characters used to indicate text direction for left-
to-right languages (such as English and Spanish) and right-to-left languages (such as Arabic and Hebrew ).
Lowercase Boolean operators - If you use a Boolean operator, such as AND, OR, and NOT in a search
query, it must be uppercase. When we check a query for typos, the query syntax will often indicate that a
Boolean operator is being used even though lowercase operators might be used; for example,
(WordA or WordB) and (WordC or WordD) .

What happens if a query has an unsupported character?


If unsupported characters are found in your query, a warning message is displayed that says unsupported
characters that were found and a suggests an alternative. Then you then have the option keep the original query or
replace it with the suggested revised query. Here's an example of the warning message that's displayed after you
click Check query for typos for the search query in the previous screenshot. Notice that the original query
contains smart quotes and lowercase Boolean operators.
How to prevent unsupported characters in your search queries
Unsupported characters are typically added to a query when you copy the query or parts of the query from other
applications (such as Microsoft Word or Microsoft Excel) and copy them to the keyword box on the query page of
a Content Search. The best way to prevent unsupported characters is to just type the query in the keyword box.
Alternatively, you can copy a query from Word or Excel and then paste it to file in a plain text editor, such as
Microsoft Notepad. Then save the text file and select ANSI in the Encoding drop-down list. This will remove any
formatting and unsupported characters. Then you can copy and paste the query from the text file to the keyword
query box.
Limits for Content Search in the Office 365 Security &
Compliance Center
10/2/2018 • 7 minutes to read • Edit Online

NOTE
The limits in this topic are different from the current limits for In-Place eDiscovery in Exchange Online and for the eDiscovery
Center in SharePoint Online.

Various limits are applied to the Content Search feature in the Office 365 Security & Compliance Center. This
include searches run on the Content search page and searches that are associated with an eDiscovery case.
These limits help to maintain the health and quality of services provided to Office 365 organizations. There are
also limits related to the indexing of email messages in Exchange Online for search. You can't modify the Content
Search or email indexing limits, but you should be aware of them so that you can take these limits into
consideration when planning, running, and troubleshooting Content Searches.
Contents
Content Search limits
Indexing limits for email messages
More information

Content Search limits


The following table lists the search limits in the Security & Compliance Center.

DESCRIPTION OF LIMIT LIMIT

The maximum number of mailboxes or sites that can be No limit


searched in a single Content Search

The maximum number of Content Searches that can run at No limit


the same time in your organization.

The maximum number of Content Searches that a single user 10


can start at the same time. Note that this limit is most likely
hit when the user tries to start multiple searches by using the
Get-ComplianceSearch | Start-ComplianceSearch
command in Security & Compliance Center PowerShell.

The maximum number of items per user mailbox that are 100
displayed on the preview page when previewing Content
Search results.

The maximum number of items found in all user mailboxes 1,000


that are displayed on the preview page when previewing
Content Search results. The newest items are displayed.
DESCRIPTION OF LIMIT LIMIT

The maximum number of user mailboxes that can be 1,000


previewed for search results. If there are more than 1000
mailboxes that contain content that matches the search
query, only the top 1000 mailboxes with the most search
results will be available for preview.

The maximum number of items found in SharePoint and 200


OneDrive for Business sites that are displayed on the preview
page when previewing Content Search results. The newest
items are displayed.

The maximum number of sites (in SharePoint and OneDrive 200


for Business) that can be previewed for search results. If there
are more than 200 total sites that contain content that
matches the search query, only the top 200 sites with the
most search results will be available for preview.

The maximum number of items per public folder mailbox that 100
are displayed on the preview page when previewing Content
Search results.

The maximum number of items found in all public folder 200


mailboxes that are displayed on the preview page when
previewing Content Search results.

The maximum number of public mailboxes that can be 500


previewed for search results. If there are more than 500 public
folder mailboxes that contain content that matches the search
query, only the top 500 public folder mailboxes with the most
search results will be available for preview.

The maximum number of characters for the search query Mailboxes: 10,000
(including operators and conditions) for a Content Search. Sites: 4,000 when searching all sites or 2,000 when searching
up to 20 sites 1
Note: This limit takes effect after the query is expanded,
which means the query will get expanded against each of the
keywords. For example, if a search query has 15 keywords
and additional parameters and conditions, the query gets
expanded 15 times, each with the other parameters and
conditions in the query. So even though the number of
characters in search query may be below the limit, it's the
expanded query that may contribute to exceeding this limit.

Maximum number of variants returned when using a prefix 10,000 2


wildcard to search for an exact phrase in a search query or
when using a prefix wildcard and the NEAR or ONEAR
Boolean operator.

The minimum number of alpha characters for prefix wildcards; 3


for example, time* , one* , or set* .
DESCRIPTION OF LIMIT LIMIT

The maximum number of mailboxes in a Content Search that 50,000


you can delete items in by doing a "search and purge" action
(by using the New-ComplianceSearchAction -Purge
command). If the Content Search that you're doing a purge
action for has more source mailboxes than this limit, the
purge action will fail. For more information about search and
purge, see Search for and delete email messages in your
Office 365 organization.

NOTE
1 When searching SharePoint and OneDrive for Business locations, the characters in the URLs of the sites being searched are
counted against this limit.
2 For non-phrase queries (a keyword value that doesn't use double quotation marks) we use a special prefix index. This tells

us that a word occurs in a document, but not where it occurs in the document. To do a phrase query (a keyword value with
double quotation marks), we need to compare the position within the document for the words in the phrase. This means
that we can't use the prefix index for phrase queries. In this case, we internally expand the query with all possible words that
the prefix expands to; for example, "time*" can expand to "time OR timer OR times OR timex OR timeboxed OR …" .
10,000 is the maximum number of variants the word can expand to, not the number of documents matching the query.
There is no upper limit for non-phrase terms.

Return to top

Indexing limits for email messages


The following table describes the indexing limits that might result in an email message being returned as an
unindexed item or a partially indexed item in the results of a Content Search.

INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum attachment size (excluding 150 MB The maximum size of an email


Excel files) attachment that will parse for indexing.
Any attachment that's larger than this
limit won't be parsed for indexing, and
the message with the attachment will
be marked as partially indexed.

Note: Parsing is the process where the


indexing service extracts text from the
attachment, removes unnecessary
characters like punctuation and spaces,
and then divides the text into words (in
a process called tokenization), that are
then stored in the index.

Maximum size of Excel files 4 MB The maximum size of an Excel file


located on a site or attached to an
email message that will be parsed for
indexing. Any Excel file that's larger than
this limit won't be parsed, and the file
or the email the message with the file
attachment will be marked as
unindexed.
INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum number of attachments 250 The maximum number of files attached


to an email message that will be parsed
for indexing. If a message has more
than 250 attachments, the first 250
attachments are parsed and indexed,
and the message is marked as partially
indexed because it had additional
attachments that weren't parsed.

Maximum attachment depth 30 The maximum number of nested


attachments that are parsed. For
example, if an email message has
another message attached to it and the
attached message has an attached
Word document, the Word document
and the attached message will be
indexed. This behavior will continue for
up to 30 nested attachments.

Maximum number of attached images 0 An image that's attached to an email


message is skipped by the parser and
isn't indexed.

Maximum time spent parsing an item 30 seconds A maximum of 30 seconds is spent


parsing an item for indexing. If the
parsing time exceeds 30 seconds, the
item is marked as partially indexed.

Maximum parser output 2 million characters The maximum amount of text output
from the parser that's indexed. For
example, if the parser extracted 8
million characters from a document,
only the first 2 million characters are
indexed.

Maximum annotation tokens 2 million When an email message is indexed,


each word is annotated with different
processing instructions that specify how
that word should be indexed. Each set
of processing instructions is called an
annotation token. To maintain the
quality of service in Office 365, there is
a limit of 2 million annotation tokens
for an email message.

Maximum body size in index 67 million characters The total number of characters in the
body of an email message and all its
attachments. When an email message is
indexed, all text in the body of the
message and in all attachments is
concatenated into a single string. The
maximum size of this string that is
indexed is 67 million characters.
INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum unique tokens in body 1 million As previously explained, tokens are the
result of extracting text from content,
removing punctuation and spaces, and
then dividing it into words (called
tokens) that are stored in the index. For
example, the phrase
"cat, mouse, bird, dog, dog"
contains 5 tokens. But only 4 of these
are unique tokens. There is a limit of 1
million unique tokens per email
message, which helps prevent the index
from getting too large with random
tokens.

Return to top

More information
There are additional limits related to different aspects of Content Search, such as exporting search results and
content indexing. For a description of these limits, see the following topics:
-
Partially indexed items in Content Search in Office 365
Investigating partially indexed items in Office 365 eDiscovery
Search limits for SharePoint Online
For information about Content Searches, see:
Content Search in Office 365
Keyword queries and search conditions for Content Search
Return to top
Partially indexed items in Content Search in Office
365
8/21/2018 • 11 minutes to read • Edit Online

A Content Search that you run from the Office 365 Security & Compliance Center automatically includes
partially indexed items in the estimated search results when you run a search. Partially indexed items are
Exchange mailbox items and documents on SharePoint and OneDrive for Business sites that for some reason
weren't completely indexed for search. In Exchange, a partially indexed item typically contains a file—of a file
type that can't be indexed—that is attached to an email message. Here are some other reasons why items can't
be indexed for search and are returned as partially indexed items when you run a search:
The file type is unrecognized or unsupported for indexing.
Messages have an attached file without a valid handler, such as image files; this is the most common cause
of partially indexed email items.
The file type is supported for indexing but an indexing error occurred for a specific file.
Too many files attached to an email message.
A file attached to an email message is too large.
A file is encrypted with non-Microsoft technologies.
A file is password-protected.

NOTE
Most Office 365 organizations have less than 1% of content by volume and less than 12% by size that is partially indexed.
The reason for the difference between volume and size is that larger files have a higher probability of containing content
that can't be completely indexed.

For legal investigations, your organization may be required to review partially indexed items. You can also
specify whether to include partially indexed items when you export search results to a local computer or when
you prepare the results for analysis with Office 365 Advanced eDiscovery. For more information, see
Investigating partially indexed items in Office 365 eDiscovery.

File types not indexed for search


Certain types of files, such as Bitmap or MP3 files, don't contain content that can be indexed. As a result, the
search indexing servers in Exchange and SharePoint don't perform full-text indexing on these types of files.
These types of files are considered to be unsupported file types. There are also file types for which full-text
indexing has been disabled, either by default or by an administrator. Unsupported and disabled file types are
labeled as unindexed items in Content Searches. As previously stated, partially indexed items can be included in
the set of search results when you run a search, export the search results to a local computer, or prepare search
results for Advanced eDiscovery.
For a list of supported and disabled file formats, see the following topics:
Exchange - File formats indexed by Exchange Search
Exchange - Get-SearchDocumentFormat
SharePoint - Default crawled file name extensions and parsed file types in SharePoint

Messages and documents with partially indexed file types can be


returned in search results
Not every email message with an partially indexed file attachment or every partially indexed SharePoint
document is automatically returned as an partially indexed item. That's because other message or document
properties, such as the Subject property in email messages and the Title or Author properties for documents
are indexed and available to be searched. For example, a keyword search for "financial" will return items with an
partially indexed file attachment if that keyword appears in the subject of an email message or in the file name or
title of a document. However, if the keyword appears only in the body of the file, the message or document
would be returned as a partially indexed item.
Similarly, messages with partially indexed file attachments and documents of an partially indexed file type are
included in search results when other message or document properties, which are indexed and searchable, meet
the search criteria. Message properties that are indexed for search include sent and received dates, sender and
recipient, the file name of an attachment, and text in the message body. Document properties indexed for search
include created and modified dates. So even though a message attachment may be an partially indexed item, the
message will be included in the regular search results if the value of other message or document properties
matches the search criteria.
For a list of email and document properties that you can search for by using the Search feature in the Security &
Compliance Center, see Keyword queries and search conditions for Content Search.

Partially indexed items included in the search results


Your organization might be required to identify and perform additional analysis on partially indexed items to
determine what they are, what they contain, and whether they're relevant to a specific investigation. As
previously explained, the partially indexed items in the content locations that are searched are automatically
included with the estimated search results. You have the option to include these partially indexed items when you
export search results or prepare the search results for Advanced eDiscovery. To include partially indexed items
when you're exporting search results or preparing them for Advanced eDiscovery, select one of the options to
include items that have an unrecognized format, are encrypted, or weren't indexed for other reasons.
Keep the following in mind about partially indexed items:
When you run a content search, the total number and size of partially indexed items (returned by the
search query) are displayed in search statistics in the details pane, as labeled as "unindexed items".
When you export search results and include partially indexed items, partially indexed Exchange items are
exported to a separate PST file for each mailbox in which they are located, or as individual messages if
you select the option to download Exchange items as messages. partially indexed SharePoint items are
exported to a folder named Uncrawlable.
If the search that you're exporting results from was a search of specific content locations or all content
locations in your organization, only the unindexed items from content locations that contain items that
match the search criteria will be exported. In other words, if no search results are found in a mailbox or
site, then any unindexed items in that mailbox or site won't be exported. The reason for this is that
exporting partially indexed items from lots of locations in the organization might increase the likelihood of
export errors and increase the time it takes to export and download the search results.
To export partially indexed items from all content locations for a search, configure the search to return all
items (by removing any keywords from the search query) and then export only partially indexed items
when you export the search results (by clicking Only items that have an unrecognized format, are
encrypted, or weren't indexed for other reasons under Output options).
If you choose to include all mailbox items in the search results, or if a search query doesn't specify any
keywords or only specifies a date range, partially indexed items might not be copied to the PST file that
contains the partially indexed items. This is because all items, including any partially indexed items, will be
automatically included in the regular search results.
Partially indexed items aren't available to be previewed. You have to export the search results to view
partially indexed items returned by the search.

Partially indexed items excluded from the search results


If an item is partially indexed but it doesn't meet the search query criteria, it won't be included as a partially
indexed item in the search results. In other words, the item is excluded from the search results. For example, let's
say you run a search and don't include any keywords or properties because you want to include all content. But
you include a date range condition for the query. If a partially indexed item falls outside of that date range, it
won't be included as a partially indexed item. Date ranges are an effective way to exclude partially indexed items
from your search results.
Similarly, if you choose to include partially indexed items when you export the results of a search, partially
indexed items that were excluded from the search results won't be exported.
One exception to this rule is when you create a query-based hold that's associated with an eDiscovery case. If
you create a query-based hold, all partially indexed items are placed on hold. This includes partially indexed
items that don't match the search query criteria and partially indexed items that might fall outside of a date range
condition. For more information about creating query-based holds, see Step 4 in eDiscovery cases in the Office
365 Security & Compliance Center.

Indexing limits for messages in Content Search


The following table describes the indexing limits that might result in an email message being returned as a
partially indexed item in a Content Search in Office 365.
For a list of indexing limits for SharePoint documents, see Search limits for SharePoint Online.

INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum attachment size (excluding 150 MB The maximum size of an email


Excel files) attachment that will parse for indexing.
Any attachment that's larger than this
limit won't be parsed for indexing, and
the message with the attachment will
be marked as partially indexed.

Note: Parsing is the process where the


indexing service extracts text from the
attachment, removes unnecessary
characters like punctuation and spaces,
and then divides the text into words (in
a process called tokenization), that are
then stored in the index.

Maximum size of Excel files 4 MB The maximum size of an Excel file


located on a site or attached to an
email message that will be parsed for
indexing. Any Excel file that's larger
than this limit won't be parsed, and the
file or the email the message with the
file attachment will be marked as
unindexed.
INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum number of attachments 250 The maximum number of files attached


to an email message that will be parsed
for indexing. If a message has more
than 250 attachments, the first 250
attachments are parsed and indexed,
and the message is marked as partially
indexed because it had additional
attachments that weren't parsed.

Maximum attachment depth 30 The maximum number of nested


attachments that are parsed. For
example, if an email message has
another message attached to it and
the attached message has an attached
Word document, the Word document
and the attached message will be
indexed. This behavior will continue for
up to 30 nested attachments.

Maximum number of attached images 0 An image that's attached to an email


message is skipped by the parser and
isn't indexed.

Maximum time spent parsing an item 30 seconds A maximum of 30 seconds is spent


parsing an item for indexing. If the
parsing time exceeds 30 seconds, the
item is marked as partially indexed.

Maximum parser output 2 million characters The maximum amount of text output
from the parser that's indexed. For
example, if the parser extracted 8
million characters from a document,
only the first 2 million characters are
indexed.

Maximum annotation tokens 2 million When an email message is indexed,


each word is annotated with different
processing instructions that specify
how that word should be indexed. Each
set of processing instructions is called
an annotation token. To maintain the
quality of service in Office 365, there is
a limit of 2 million annotation tokens
for an email message.

Maximum body size in index 67 million characters The total number of characters in the
body of an email message and all its
attachments. When an email message
is indexed, all text in the body of the
message and in all attachments is
concatenated into a single string. The
maximum size of this string that is
indexed is 67 million characters.
INDEXING LIMIT MAXIMUM VALUE DESCRIPTION

Maximum unique tokens in body 1 million As previously explained, tokens are the
result of extracting text from content,
removing punctuation and spaces, and
then dividing it into words (called
tokens) that are stored in the index.
For example, the phrase
"cat, mouse, bird, dog, dog"
contains 5 tokens. But only 4 of these
are unique tokens. There is a limit of 1
million unique tokens per email
message, which helps prevent the
index from getting too large with
random tokens.

More information about partially indexed items


As previously stated, because message and document properties and their metadata are indexed, a
keyword search might return results if that keyword appears in the indexed metadata. However, that same
keyword search might not return the same item if the keyword only appears in the content of an item with
an unsupported file type. In this case, the item would be returned as a partially indexed item.
If a partially indexed item is included in the search results because it met the search query criteria (and
wasn't excluded) then it won't be included as a partially indexed item in the estimated search statistics.
Also, it won't be included with partially indexed items when you export search results.
Although a file type is supported for indexing and is indexed, there can be indexing or search errors that
will cause a file to be returned as a partially indexed item. For example, searching a very large Excel file
might be partially successful (because the first 4 MB are indexed), but then fails because the file size limit
is exceeded. In this case, it's possible that the same file is returned with the search results and as a partially
indexed item.
Attached files encrypted with Microsoft technologies are indexed and can be searched. Files encrypted
with non-Microsoft technologies are partially indexed.
Email messages encrypted with S/MIME are partially indexed. This includes encrypted messages with or
without file attachments.
Messages protected using Information Rights Management (IRM ) are indexed and will be included in the
search results if they match the search query.

See also
Investigating partially indexed items in Office 365 eDiscovery
Investigating partially indexed items in Office 365
eDiscovery
9/26/2018 • 9 minutes to read • Edit Online

A Content Search that you run from the Office 365 Security & Compliance Center automatically includes partially
indexed items in the estimated search results when you run a search. Partially indexed items are Exchange mailbox
items and documents on SharePoint and OneDrive for Business sites that for some reason weren't completely
indexed for search. Most email messages and site documents are successfully indexed because they fall within the
Indexing limits for email messages. However, some items may exceed these indexing limits, and will be partially
indexed. Here are other reasons why items can't be indexed for search and are returned as partially indexed items
when you run a Content Search:
Email messages have an attached file of a file type that can't be indexed; in most cases, the file type is
unrecognized or unsupported for indexing
Email messages have an attached file without a valid handler, such as image files; this is the most common
cause of partially indexed email items
Too many files attached to an email message
A file attached to an email message is too large
The file type is supported for indexing but an indexing error occurred for a specific file
Although it varies, most Office 365 organizations customers have less than 1% of content by volume and less than
12% of content by size that is partially indexed. The reason for the difference between the volume versus size is
that larger files have a higher probability of containing content that can't be completely indexed.

Why does the partially indexed item count change for a search?
After you run a Content Search in the Office 365 Security & Compliance Center, the total number and size of
partially indexed items in the locations that were searched are listed in the search result statistics that are
displayed in the detailed statistics for the search. Note these are called unindexed items in the search statistics.
Here are a few things that will affect the number of partially indexed items that are returned in the search results:
If an item is partially indexed and matches the search query, it's included in both the count (and size) of
search result items and partially indexed items. However, when the results of that same search are
exported, the item is included only with set of search results; it's not included as a partially indexed item.
If you specify a date range for a search query (by including it in the keyword query or by using a condition),
any partially indexed item that doesn't match the date range isn't included in the count of partially indexed
items. Only the partially indexed items that fall within date range are included in the count of partially
indexed items.
Note: Partially indexed items located in SharePoint and OneDrive sites are not included in the estimate of
partially indexed items that's displayed in the detailed statistics for the search. However, partially indexed items
can be exported when you export the results of a Content Search. For example, if you only search sites in a
Content Search, the estimated number partially indexed items will be zero.

Calculating the ratio of partially indexed items in your organization


To understand your organization's exposure to partially indexed items, you can run a search for all content in all
mailboxes (by using a blank keyword query). In the following example below, there are 56,208 (4,830 MB ) fully
indexed items and 470 (316 MB ) partially indexed items.

You can determine the percentage of partially indexed items by using the following calculations.
To calculate the ratio of partially indexed items in your organization:
(Total number of partially indexed items/Total number of items) x 100

(470/56,208) x 100 = 0.84%

By using the search results from the previous example, .84% of all mailboxes items are partially indexed.
To calculate the percentage of the size of partially indexed items in your organization:
(Size of all partially indexed items/Size of all items) x 100

(316 MB/4830 MB) x 100 = 6.54%

So in the previous example, 6.54% of the total size of mailbox items are from partially indexed items. As
previously stated, most Office 365 organizations customers have less than 1% of content by volume and less than
12% of content by size that is partially indexed.

Working with partially indexed items


In cases when you need to examine partially items to validate that they don't contain relevant information, you can
export a content search report that contains information about partially indexed items. When you export a content
search report, be sure to choose one of the export options that includes partially indexed items.

When you export content search results or a content search report using one of these options, the export includes
a report named Unindexed Items.csv. This report includes most of the same information as the ResultsLog.csv file;
however, the Unindexed Items.csv file also includes two fields related to partially indexed items: Error Tags and
Error Properties. These fields contain information about the indexing error for each partially indexed item. Using
the information in these two fields can help you determine whether or not the indexing error for a particular
impacts your investigation. If it does, you can perform a targeted content search and retrieve and export specific
email messages and SharePoint or OneDrive documents so that you can examine them to determine if they're
relevant to your investigation. For step-by-step instructions, see Prepare a CSV file for a targeted Content Search
in Office 365.
Note: The Unindexed Items.csv file also contains fields named Error Type and Error Message. These are legacy
fields that contain information that is similar to the information in the Error Tags and Error Properties fields, but
with less detailed information. You can safely ignore these legacy fields.

Errors related to partially indexed items


Error tags are made up of two pieces of information, the error and the file type. For example, in this error/filetype
pair:

parseroutputsize_xls

parseroutputsize is the error and xls is the file type of the file the error occurred on. In cases were the file type
wasn't recognized or the file type was doesn't apply to the error, you will see the value noformat in place of the file
type.
The following is a list of indexing errors and a description of the possible cause of the error.

ERROR TAG DESCRIPTION

attachmentcount An email message had too many attachments, and some of


these attachments weren't processed.

attachmentdepth The content retriever and document parser found too many
levels of attachments nested inside other attachments. Some
of these attachments were not processed.

attachmentrms An attachment failed decoding because it was RMS-protected.

attachmentsize A file attached to an email message was too large and


couldn't be processed.

indexingtruncated When writing the processed email message to the index, one
of the indexable properties was too large and was truncated.
The truncated properties are listed in Error Properties field.

invalidunicode An email message contained text that couldn't be processed


as valid Unicode. Indexing for this item may be incomplete.

parserencrypted The content of attachment or email message is encrypted,


and Office 365 couldn't decode the content.

parsererror An unknown error occurred during parsing. This typically


results from a software bug or a service crash.

parserinputsize An attachment was too large for the parser to handle, and the
parsing of that attachment didn't happen or wasn't
completed.

parsermalformed An attachment was malformed and couldn't be handled by


the parser. This result from can old file formats, files created by
incompatible software, or viruses pretending to be something
other than claimed.

parseroutputsize The output from the parsing of an attachment was too large
and had to be truncated.
ERROR TAG DESCRIPTION

parserunknowntype An attachment had a file type that Office 365 couldn't detect.

parserunsupportedtype An attachment had a file type that Office 365could detect, but
parsing that file type isn't supported.

propertytoobig The value of an email property in Exchange Store was too


large to be retrieved and the message couldn't be processed.
This typically only happens to the body property of an email
message.

retrieverrms The content retriever failed to decode an RMS-protected


message.

wordbreakertruncated Too many words were identified in the document during


indexing. Processing of the property stopped when reaching
the limit, and the property is truncated.

Error fields describe which fields are affected by the processing error listed in the Error Tags field. If you're
searching a property such as subject or participants , errors in the body of the message won't impact the
results of your search. This can be useful when determining exactly which partially indexed items you might need
to further investigate.

Using a PowerShell script to determine your organization's exposure to


partially indexed email items
The following steps show you how to run a PowerShell script that searches for all items in all Exchange mailboxes,
and then generates a report about your organization's ratio of partially indexed email items (by count and by size)
and displays the number of items (and their file type) for each indexing error that occurs. Use the error tag
descriptions in the previous section to identify the indexing error.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
PartiallyIndexedItems.ps1 .
write-host "**************************************************"
write-host " Office 365 Security &amp; Compliance Center " -foregroundColor yellow -backgroundcolor
darkgreen
write-host " eDiscovery Partially Indexed Item Statistics " -foregroundColor yellow -backgroundcolor
darkgreen
write-host "**************************************************"
" "
# Create a search with Error Tags Refinders enabled
Remove-ComplianceSearch "RefinerTest" -Confirm:$false -ErrorAction 'SilentlyContinue'
New-ComplianceSearch -Name "RefinerTest" -ContentMatchQuery "size>0" -RefinerNames ErrorTags -
ExchangeLocation ALL
Start-ComplianceSearch "RefinerTest"
# Loop while search is in progress
do{
Write-host "Waiting for search to complete..."
Start-Sleep -s 5
$complianceSearch = Get-ComplianceSearch "RefinerTest"
}while ($complianceSearch.Status -ne 'Completed')
$refiners = $complianceSearch.Refiners | ConvertFrom-Json
$errorTagProperties = $refiners.Entries | Get-Member -MemberType NoteProperty
$partiallyIndexedRatio = $complianceSearch.UnindexedItems / $complianceSearch.Items
$partiallyIndexedSizeRatio = $complianceSearch.UnindexedSize / $complianceSearch.Size
" "
"===== Partially indexed items ====="
" Total Ratio"
"Count {0:N0}{1:P2}" -f $complianceSearch.Items.ToString("N0").PadRight(15, " "), $partiallyIndexedRatio
"Size(GB) {0:N2}{1:P2}" -f ($complianceSearch.Size / 1GB).ToString("N2").PadRight(15, " "),
$partiallyIndexedSizeRatio
" "
Write-Host ===== Reasons for partially indexed items =====
foreach($errorTagProperty in $errorTagProperties)
{
$name = $refiners.Entries.($errorTagProperty.Name).Name
$count = $refiners.Entries.($errorTagProperty.Name).TotalCount
$frag = $name.Split("{_}")
$errorTag = $frag[0]
$fileType = $frag[1]
if ($errorTag -ne $lastErrorTag)
{
$errorTag
}
" " + $fileType + " => " + $count
$lastErrorTag = $errorTag
}

2. Connect to Office 365 Security & Compliance Center PowerShell.


3. In Security & Compliance Center PowerShell, go to the folder where you saved the script in step 1, and
then run the script; for example:

.\PartiallyIndexedItems.ps1

Here's an example fo the output returned by the script.


Note the following:
1. The total number and size of email items, and your organization's ratio of partially indexed email items (by
count and by size)
2. A list error tags and the corresponding file types for which the error occurred.

See also
Partially indexed items in Content Search in Office 365
De-duplication in eDiscovery search results
9/26/2018 • 5 minutes to read • Edit Online

This article describes how de-duplication of eDiscovery search results works and explains the limitations of the
de-duplication algorithm.
When using Office 365 eDiscovery tools to export the results of an eDiscovery search, you have the option to de-
duplicate the results that are exported. What does this mean? When you enable de-duplication (by default, de-
duplication isn't enabled), only one copy of an email message is exported even though multiple instances of the
same message might have been found in the mailboxes that were searched. De-duplication helps you save time
by reducing the number of items that you have to review and analyze after the search results are exported. But it's
important to understand how de-duplication works and be aware that there are limitations to the algorithm that
might cause a unique item to be marked as a duplicate during the export process.

How duplicate messages are identified


Office 365 eDiscovery tools use a combination of the following email properties to determine whether a message
is a duplicate:
InternetMessageId - This property specifies the Internet message identifier of an email message, which is
a globally unique identifier that refers to a specific version of a specific message. This ID is generated by
the sender's email client program or host email system that sends the message. If a person sends a
message to more than one recipient, the Internet message ID will be the same for each instance of the
message. Subsequent revisions to the original message will receive a different message identifier.
ConversationTopic - his property specifies the subject of the conversation thread of a message. The value
of the ConversationTopic property is the string that describes the overall topic of the conversation. A
conservation consists of an initial message and all messages sent in reply to the initial message. Messages
within the same conversation have the same value for the ConversationTopic property. The value of this
property is typically the Subject line from the initial message that spawned the conversation.
BodyTagInfo - This is an internal Exchange store property. The value of this property is calculated by
checking various attributes in the body of the message. This property is used to identify differences in the
body of messages.
During the eDiscovery export process, these three properties are compared for every message that matches the
search criteria. If these properties are identical for two (or more) messages, those messages are determined to be
duplicates and the result is that only one copy of the message will be exported if de-duplication is enabled. The
message that is exported is known as the "source item". Information about duplicate messages is included in the
Results.csv and Manifest.xml reports that are included with the exported search results. In the Results.csv file,
a duplicate message is identified by having a value in the Duplicate to Item column. The value in this column
matches the value in the Item Identity column for the message that was exported.
The following graphics show how duplicate messages are displayed in the Results.csv and Manifest.xml reports
that are exported with the search results. These reports don't include the email properties previously described,
which are used in the de-duplication algorithm. Instead, the reports include the Item Identity property that is
assigned to items by the Exchange store.
Results.csv report (viewed in Excel)
Manifest.xml report (viewed in Excel)

Additionally, other properties from duplicate messages are included in the export reports. This includes the
mailbox the duplicate message is located in, whether the message was sent to a distribution group, and whether
the message was Cc'd or Bcc'd to another user.

Limitations of the de-duplication algorithm


There are some known limitations of the de-duplication algorithm that might cause unique items to get marked
as duplicates. It's important to understand these limitations so you can decide whether or not to use the optional
de-duplication feature.
There's one situation where the de-duplication feature might mistakenly identify a message as a duplicate and not
export it (but still cite it as a duplicate in the export reports). These are messages that a user edits but doesn't
send. For example, let's say a user selects a message in Outlook, copies the contents of the message, and then
pastes it in a new message. Then the user changes one of the copies by removing or adding an attachment, or
changing the subject line or the body itself. If these two messages match the query of an eDiscovery search, only
one of the messages will be exported if de-duplication is enabled when the search results are exported. So even
though the original message or the copied message was changed, neither of the revised messages were sent and
therefore the values of InternetMessageId, ConversationTopic and BodyTagInfo properties weren't updated.
But as previously explained, both messages will be listed in the export reports
Note that unique messages can also be marked as duplicates when the Copy-on-Write page protection feature is
enabled, as in the case of a mailbox being on Litigation Hold or In-Place Hold. The Copy-on-Write feature copies
the original message (and saves it in the Versions folder of the user's Recoverable Items folder) before the
revision to original item is saved. In this case, the revised copy and the original message (in the Recoverable Items
folder) might be considered as duplicate messages and therefore only one of them would be exported.

IMPORTANT
If the limitations of the de-duplication algorithm might impact the quality of your search results, then you shouldn't enable
de-duplication when you export items. If the situations described in this section are unlikely to be a factor in your search
results, and you want to reduce the number of items most likely to be duplicates, then you should consider enabling de-
duplication.

More information
The information in this article is applicable when exporting search results using one of the following
eDiscovery tools:
Content search in the Office 365 Security & Compliance Center
In-Place eDiscovery in Exchange Online
The eDiscovery Center in SharePoint Online
For more information about exporting search results, see:
Export search results from the Office 365 Security & Compliance Center
Export a Content Search report from the Office 365 Security & Compliance Center
Export In-Place eDiscovery search results to a PST file
Export content and create reports in the eDiscovery Center
Differences between estimated and actual eDiscovery
search results in Office 365
9/26/2018 • 7 minutes to read • Edit Online

This topic applies to searches that you can run using one of the following Microsoft eDiscovery tools:
Content Search in the Office 365 Security & Compliance Center
In-Place eDiscovery in the Exchange admin center (EAC )
The eDiscovery Center in SharePoint Online
When you run an eDiscovery search, the tool you're using will return an estimate of the number of items (and their
total size) that meet the search criteria. For example, when you run a search in the Security & Compliance Center,
the estimated search results are displayed in the details pane for the selected search.

This is the same estimate of total size and number of items that is displayed in the eDiscovery Export Tool when
you export results to a local computer and in the Export Summary report that's downloaded with the search
results.
Estimated results in the eDiscovery Export Tool

Estimated results in Export Summary report


However, as you'll notice in the previous screenshot of the Export Summary report, the size and number of actual
search results that are actually downloaded are different than the size and number of estimated search results.

Here are some reasons for these differences:


The way results are estimated - An estimate of the search results are just that, an estimate (and not an
actual count) of the items that meet the search query criteria. To compile the estimate of Exchange items, a
list of the message IDs that meet the search criteria is requested from the Exchange database by the
eDiscovery tool you're using. But when you export the search results, the search is re-run and the actual
messages are retrieved from the Exchange database. So these differences might result because of how the
estimated number of items and the actual number of items are determined.
Changes that happen between the time when estimating and exporting search results - When you
export search results, the search is re-started to collect that most recent items in the search index that meet
the search criteria. It's possible there are additional items were created, sent, or received that meet the
search criteria in the time between when the estimated search results were collected and when the search
results were exported. It's also possible that items that were in the search index when the search results
were estimated are no longer there because they were purged from the content location before the search
results are exported. One way to mitigate this issue is to specify a date range for an eDiscovery search.
Another way is to place a hold on content locations so that items are preserved and can't be purged.
Unindexed items - Items that are unindexed for search can cause differences between estimated and
actual search results. For example, In-Place eDiscovery in Exchange and the eDiscovery Center in
SharePoint don't include unindexed items (that don't meet the search criteria) when you run a search to
estimate the search results. But you can include unindexed items when you export the search results. If you
include unindexed items when exporting search results, there might be more items that are exported. This
will cause a difference between the estimated and exported search results.
When using the Content Search tool in the Security & Compliance Center, you have the option to include
unindexed items in the search estimate. The number of unindexed items returned by the search is listed in
the details pane together with the other estimated search results. Any unindexed items would also be
included in the total size of the estimated search results. When you export search results, you have the
option to include or not include unindexed items. How you configure these options might result in
differences between estimated and the actual search results that are downloaded.
Exporting the results of a Content Search that includes all content locations - If the search that
you're exporting results from was a search of all content locations in your organization, then only the
unindexed items from content locations that contain items that match the search criteria will be exported. In
other words, if no search results are found in a mailbox or site, then any unindexed items in that mailbox or
site won't be exported. However, unindexed items from all content locations (even those that don't contain
items that match the search query) will be included in the estimated search results.
Alternatively, if the search that you're exporting results from included specific content locations, then
unindexed items (that aren't excluded by the search criteria) from all the content locations specified in the
search will be exported. In this case, the estimated number of unindexed items and the number of
unindexed items actually exported should be the same.
The reason for not exporting unindexed items from every location in the organization is because it might
increase the likelihood of export errors and increase the time it takes to export and download the search
results.
Raw file formats versus exported file formats - For Exchange items, the estimated size of the search
results is calculated by using the raw Exchange message sizes. However, email messages are exported in a
PST file or as individual messages (which are formatted as EML files). Both of these export options use a
different file format that raw Exchange messages, which results in the total exported file size being different
than the estimated file size.
Document versions - For SharePoint documents, multiple versions of a document aren't included in the
estimated search results. But you have the option to include all document versions when you export the
search results, which will increase the actual number (and total size) of the exported documents.
De-duplication - For Exchange items, de-duplication reduces the number of items that are exported. You
have the option to de-duplicate the search results when you export them. For Exchange messages, this
means that only a single instance of a message is exported, even though that message might be found in
multiple mailboxes. The estimated search results include every instance of a message. So if you choose the
de-duplication option when exporting search results, the actual number of items that are exported might be
considerably less than the estimated number of items.
Another thing to keep in mind if you choose the de-duplication option is that all Exchange items are
exported in a single PST file and the folder structure from the source mailboxes isn't preserved. The
exported PST file just contains the email items. However, a search results report contains an entry for each
exported message that identifies the source mailbox where the message is located. This helps you identify
all mailboxes that contain a duplicate message. If you don't enable de-duplication, a separate PST file is
exported for each mailbox included in the search.

Exporting unindexed items from the eDiscovery Center in SharePoint


Online
In the eDiscovery Center in SharePoint Online, you have the option to include unindexed content (from Exchange
and SharePoint) when you export the results of an eDiscovery search. You do this by selecting the Include items
that are encrypted or have an unrecognized format option. Unindexed items (also called uncrawlable in
SharePoint) are items in Exchange and SharePoint that for some reason weren't indexed for search. Unindexed
Exchange items are listed in the Exchange Index Errors report that's included when you export search results.
Similarly, unindexed SharePoint items are listed in SharePoint Index Errors report. When you export unindexed
items, they're downloaded to a folder named Uncrawlable. Unindexed Exchange items are included in a PST file;
each unindexed document from SharePoint is downloaded too. The number of unindexed items (if there are any)
are listed in each index errors report. The number of unindexed items in the reports should match the number of
unindexed items that are downloaded.
What are some reasons if the number of exported unindexed items don't match the number of items in
the index error report? As previously explained, it's possible that items have been purged from Office 365
between the time the search estimate was run and the time the search results were exported. A similar discrepancy
can occur for unindexed items. For example, the search index might be out date when search results are exported.
This would mean that an unindexed item that was exported with the search results might not be listed in the index
errors report because the item wasn't indexed at the time the search results were exported. This would result in
more unindexed items being export than are listed in the index error report. Similarly, an unindexed item listed in
the index error report could have been purged from Office 365 before the search index was updated. This would
result in fewer unindexed items being export than are listed in the index error report.

NOTE
If you don't select the Include items that are encrypted or have an unrecognized format option when you export
search results or just download the reports, the index error reports are downloaded but they don't have any entries. This
doesn't mean there aren't any indexing errors. It just means that unindexed items weren't included in the export.
Configure permissions filtering for Content Search
8/28/2018 • 17 minutes to read • Edit Online

You can use search permissions filtering to let an eDiscovery manager search only a subset of mailboxes and sites
in your Office 365 organization. You can also use permissions filtering to let that same eDiscovery manager search
only for mailbox or site content that meets a specific search criteria. For example, you might let an eDiscovery
manager search only the mailboxes of users in a specific location or department. You do this by creating a filter
that uses a supported recipient filter to limit which mailboxes can be searched. You can also create a filter that
specifies what mailbox content can be searched. This is done by creating a filter that uses a searchable message
property. Similarly, you might let an eDiscovery manager only search specific SharePoint sites in your
organization. You do this by creating a filter that limits which site can be searched. You can also create a filter that
specifies what site content can be searched. This is done by creating a filter that uses a searchable site property.
You can also use search permissions filtering to create logical boundaries (called compliance boundaries) within an
Office 365 organization that control the user content locations (such as mailboxes, SharePoint sites, and OneDrive
accounts) that specific eDiscovery managers can search. For more information, see Set up compliance boundaries
for eDiscovery investigations in Office 365.
Search permissions filtering is supported by the Content Search feature in the Office 365 Security & Compliance
Center. These four cmdlets let you configure and manage search permisisons filters:
New -ComplianceSecurityFilter
Get-ComplianceSecurityFilter
Set-ComplianceSecurityFilter
Remove-ComplianceSecurityFilter

Before you begin


To run the compliance security filter cmdlets, you have to be a member of the Organization Management
role group in the Security & Compliance Center. For more information, see Permissions in the Office 365
Security & Compliance Center.
You have to connect Windows PowerShell to both the Security & Compliance Center and to your Exchange
Online organization to use the compliance security filter cmdlets. This is necessary because these cmdlets
require access to mailbox properties, which is why you have to connect to Exchange Online. See the steps in
the next section.
See the More information section for additional information about search permissions filters.
Search permissions filtering is applicable to inactive mailboxes, which means you can use mailbox and
mailbox content filtering to limit who can search an inactive mailbox. See the More information section for
additional information about permissions filtering and inactive mailboxes.
Search permissions filtering can't be used to limit who can search public folders in Exchange.
There is no limit to the number of search permissions filters that can be created in an organization.
However, search performance will be impacted when there are more than 100 search permissions filters. To
keep the number of search permissions filters in your organization as small as possible, create filters that
combine rules for Exchange, SharePoint, and OneDrive in a single filter whenever possible.
Connect to the Security & Compliance Center and Exchange Online in
a single remote PowerShell session
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1. For example,
you could save it to a file named ConnectEXO -CC.ps1.

$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.outlook.com/powershell-liveid -Credential $UserCredential -Authentication Basic -
AllowRedirection
Import-PSSession $Session -DisableNameChecking
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $UserCredential -
Authentication Basic -AllowRedirection
Import-PSSession $Session -AllowClobber -DisableNameChecking
$Host.UI.RawUI.WindowTitle = $UserCredential.UserName + " (Exchange Online + Compliance Center)"

2. On your local computer, open Windows PowerShell, go to the folder where the script that you created in the
previous step is located, and then run the script; for example:

.\ConnectEXO-CC.ps1

How do you know if this worked? After you run the script, cmdlets from the Security & Compliance Center and
Exchange Online are imported into your local Windows PowerShell session. If you don't receive any errors, you
connected successfully. A quick test is to run a Security & Compliance Center cmdlet—for example, Install-
UnifiedCompliancePrerequisite —and an Exchange Online cmdlet, such as Get-Mailbox.
If you receive errors, check the following requirements:
A common problem is an incorrect password. Run the two steps again and pay close attention to the user
name and password you enter in Step 1.
Verify that your account has permission to access the Security & Compliance Center. For details, see Give
users access to the Security & Compliance Center.
To help prevent denial-of-service (DoS ) attacks, you're limited to three open remote PowerShell connections
to the Security & Compliance Center.
Windows PowerShell needs to be configured to run scripts. You need to configure this setting only once on
your computer, not every time you connect. To enable Windows PowerShell to run signed scripts, run the
following command in an elevated Windows PowerShell window (a Windows PowerShell window you
opened by selecting Run as administrator).

Set-ExecutionPolicy RemoteSigned

TCP port 80 traffic needs to be open between your local computer and Office 365. It's probably open, but
it's something to consider if your organization has a restrictive Internet access policy.

New-ComplianceSecurityFilter
The New-ComplianceSecurityFilter is used to create a new search permissions filter. The following table
describes the parameters for this cmdlet. All parameters are required to create a compliance security filter.
PARAMETER DESCRIPTION

Action The Action parameter specifies that type of search action that
the filter is applied to. The possible Content Search actions are:

Export - The filter is applied when exporting search results.


Preview - The filter is applied when previewing search results.
Purge - The filter is applied when purging search results.
Search - The filter is applied when running a search.
All - The filter is applied to all search actions.

FilterName The FilterName parameter specifies the name of the


permissions filter. This name is used to identity a filter when
using the Get-ComplianceSecurityFilter, Set-
ComplianceSecurityFilter, and Remove-
ComplianceSecurityFilter cmdlets.

Filters The Filters parameter specifies the search criteria for the
compliance security filter. You can create three different kind of
filters:

Mailbox filtering - This type of filter specifies the mailboxes


the assigned users (specified by the Users parameter) can
search. The syntax for this type of filter is Mailbox_
MailboxPropertyName, where MailboxPropertyName specifies
a mailbox property used to scope the mailboxes that can be
searched. For example, the mailbox filter
"Mailbox_CustomAttribute10 -eq 'OttawaUsers'" would
allow the user assigned this filter to only search mailboxes that
have the value "OttawaUsers" in the CustomAttribute10
property.
Any supported filterable recipient property can be used for
the MailboxPropertyName property. For a list of supported
properties, see Filterable properties for the -RecipientFilter
parameter.

Mailbox content filtering - This type of filter is applied on


the content that can be searched. It specifies the mailbox
content the assigned users can search for. The syntax for this
type of filter is MailboxContent_
SearchablePropertyName:value, where
SearchablePropertyName specifies a Keyword Query
Language (KQL) property that can be specified in a Content
Search. For example, the mailbox content filter
MailboxContent_recipients:contoso.com would allow the
user assigned this filter to only search for messages sent to
recipients in the contoso.com domain.
For a list of searchable message properties, see Keyword
queries and search conditions for Content Search.

Site and site content filtering - There are two SharePoint


and OneDrive for Business site-related filters that you can use
to specify what site or site content the assigned users can
search:

- Site_ SearchableSiteProperty
- SiteContent_ SearchableSiteProperty

These two filters are interchangeable; for example


"Site_Path -like
'https://contoso.sharepoint.com/sites/doctors*'"
and
"SiteContent_Path -like
PARAMETER DESCRIPTION
'https://contoso.sharepoint.com/sites/doctors*'"
will return the same results. But to help you identify what a
filter does, you can use Site_ to specify site-related
properties (such as a site URL) and SiteContent_ to specify
content-related properties (such as document types. For
example, the filter
"Site_Path -like
'https://contoso.sharepoint.com/sites/doctors*'"
would allow the user assigned this filter to only search for
content in the https://contoso.sharepoint.com/sites/doctors
site collection. The filter
"SiteContent_FileExtension -eq 'docx'" would allow the
user assigned this filter to only search for Word documents
(Word 2007 and later).

For a list of searchable site properties, see Overview of crawled


and managed properties in SharePoint. Properties marked
with a Yes in the ** Queryable ** column can be used to
create a site or site content filter.

Important: A single search filter can only have one type of


filter; it can't contain a mailbox filter and a site filter; similarly, it
can't contain a mailbox filter and a mailbox content filter.
However, a filter can contain a more complex query of the
same type. For example,
"Mailbox_CustomAttribute10 -eq 'FTE' -and
Mailbox_MemberOfGroup -eq
'$($DG.DistinguishedName)'"

Important: You have to create a search permissions filter to


explicitly prevent users from searching content locations in a
specific Office 365 service (such as preventing a user from
searching any Exchange mailbox or any SharePoint site). In
other words, creating a search permissions filter that allows a
user to search all SharePoint sites in the organization doesn't
prevent that user from searching mailboxes. For example, to
allow SharePoint admins to only search SharePoint sites, you
have to create a create a filter that prevents them from
searching mailboxes. Similarly, to allow Exchange admins to
only search mailboxes, you have to create a create a filter that
prevents them from searching sites.
Users The Users parameter specifies the users who get this filter
applied to their Content Searches. Identify users by their alias
or primary SMTP address. You can specify multiple values
separated by commas, or you can assign the filter to all users
by using the value All.
You can also use the Users parameter to specify a Security &
Compliance Center role group. This lets you create a custom
role group and then assign that role group a search
permissions filter. For example, let's say you have a custom
role group for eDiscovery managers for the U.S. subsidiary of
a multi-national corporation. You can use the Users parameter
to specify this role group (by using the Name property of the
role group) and then use the Filter parameter to allow only
mailboxes in the U.S. to be searched.
You can't specify distribution groups with this parameter.

Examples of creating search permissions filters


Here are examples of using the New-ComplianceSecurityFilter cmdlet to create a search permissions filter.
This example allows the user annb@contoso.com to perform all Content Search actions only for mailboxes in
Canada. This filter contains the three-digit numeric country code for Canada from ISO 3166-1.
New-ComplianceSecurityFilter -FilterName CountryFilter -Users annb@contoso.com -Filters "Mailbox_CountryCode
-eq '124'" -Action All

This example allows the users donh and suzanf to search only the mailboxes that have the value 'Marketing' for
the CustomAttribute1 mailbox property.

New-ComplianceSecurityFilter -FilterName MarketingFilter -Users donh,suzanf -Filters


"Mailbox_CustomAttribute1 -eq 'Marketing'" -Action Search

This example allows members of the "US Discovery Managers" role group to perform all Content Search actions
only on mailboxes in the United States. This filter contains the three-digit numeric country code for the United
States from ISO 3166-1.

New-ComplianceSecurityFilter -FilterName USDiscoveryManagers -Users "US Discovery Managers" -Filters


"Mailbox_CountryCode -eq '840'" -Action All

This example assigns allows members of the eDiscovery Manager role group to only search the mailboxes of
members of the Ottawa Users distribution group.

$DG = Get-DistributionGroup "Ottawa Users"

New-ComplianceSecurityFilter -FilterName DGFilter -Users eDiscoveryManager -Filters "Mailbox_MemberOfGroup -


eq '$($DG.DistinguishedName)'" -Action Search

This example prevents any user from deleting content from the mailboxes of members of the Executive Team
distribution group.

$DG = Get-DistributionGroup "Executive Team"

New-ComplianceSecurityFilter -FilterName NoExecutivesPreview -Users all -Filters "Mailbox_MemberOfGroup -ne


'$($DG.DistinguishedName)'" -Action Purge

This example allows members of the OneDrive eDiscovery Managers custom role group to only search for content
in OneDrive for Business locations in the organization.

New-ComplianceSecurityFilter -FilterName OneDriveOnly -Users "OneDrive eDiscovery Managers" -Filters


"Site_Path -like 'https://contoso-my.sharepoint.com/personal*'" -Action Search

NOTE
To restrict users to searching specific sites, use the filter Site_Path , as shown in the previous example. Using Site_Site
will not work.

This example restricts the user to performing all Content Search actions only on email messages sent during the
calendar year 2015.

New-ComplianceSecurityFilter -FilterName EmailDateRestrictionFilter -Users donh@contoso.com -Filters


"MailboxContent_Received -ge '01-01-2015' -and MailboxContent_Received -le '12-31-2015'" -Action All
Similar to the previous example, this example restricts the user to performing all Content Search actions on
documents that were last changed sometime in the calendar year 2015.

New-ComplianceSecurityFilter -FilterName DocumentDateRestrictionFilter -Users donh@contoso.com -Filters


"SiteContent_LastModifiedTime -ge '01-01-2015' -and SiteContent_LastModifiedTime -le '12-31-2015'" -Action All

This example prevents members of the "OneDrive Discovery Managers" role group from performing content
search actions on any mailbox in the organization.

New-ComplianceSecurityFilter -FilterName NoEXO -Users "OneDrive Discovery Managers" -Filters "Mailbox_Alias -


notlike '*'" -Action All

Get-ComplianceSecurityFilter
The Get-ComplianceSecurityFilter is used to return a list of search permissions filters. Use the FilterName
parameter to return information for a specific search filter.

Set-ComplianceSecurityFilter
The Set-ComplianceSecurityFilter is used to modify an existing search permissions filter. The only required
parameter is FilterName.

PARAMETER DESCRIPTION

Action The Action parameter specifies that type of search action that
the filter is applied to. The possible Content Search actions are:

Export - The filter is applied when exporting search results.


Preview - The filter is applied when previewing search results.
Purge - The filter is applied when purging search results.
Search - The filter is applied when running a search.
All - The filter is applied to all search actions.

FilterName The FilterName parameter specifies the name of the


permissions filter.

Filters The Filters parameter specifies the search criteria for the
compliance security filter. You can create two different kind of
filters:

Mailbox filtering - This type of filter specifies the mailboxes


the assigned users (specified by the Users parameter) can
search. The syntax for this type of filter is Mailbox_
MailboxPropertyName, where MailboxPropertyName specifies
a mailbox property used to scope the mailboxes that can be
searched. For example, the mailbox filter
"Mailbox_CustomAttribute10 -eq 'OttawaUsers'" would
allow the user assigned this filter to only search mailboxes that
have the value "OttawaUsers" in the CustomAttribute10
property. Any supported filterable recipient property can be
used for the MailboxPropertyName property. For a list of
supported properties, see Filterable properties for the -
RecipientFilter parameter.

Mailbox content filtering- This type of filter is applied on


the content that can be searched. It specifies the mailbox
content the assigned users can search for. The syntax for this
type of filter is MailboxContent_
SearchablePropertyName:value, where
PARAMETER DESCRIPTION
SearchablePropertyName specifies a Keyword Query
Language (KQL) property that can be specified in a Content
Search. For example, the mailbox content filter
MailboxContent_recipients:contoso.com would allow the
user assigned this filter to only search for messages sent to
recipients in the contoso.com domain. For a list of searchable
message properties, see Keyword queries for Content Search.

Site and site content filtering There are two SharePoint and
OneDrive for Business site-related filters that you can use to
specify what site or site content the assigned users can search:

- Site_ SearchableSiteProperty
- SiteContent_SearchableSiteProperty

These two filters are interchangeable; for example


"Site_Path -like
'https://contoso.spoppe.com/sites/doctors*'"
and
"SiteContent_Path -like
'https://contoso.spoppe.com/sites/doctors*'"
will return the same results. But to help you identify what a
filter does, you can use Site_ to specify site-related
properties (such as a site URL) and SiteContent_ to specify
content-related properties (such as document types. For
example, the filter
"Site_Path -like
'https://contoso.spoppe.com/sites/doctors*'"
would allow the user assigned this filter to only search for
content in the https://contoso.spoppe.com/sites/doctors site
collection. The filter
"SiteContent_FileExtension -eq 'docx'" would allow the
user assigned this filter to only search for Word documents
(Word 2007 and later).

For a list of searchable site properties, see Overview of crawled


and managed properties in SharePoint. Properties marked
with a Yes in the Queryable column can be used to create a
site or site content filter.

Important: A single search filter can only have one type of


filter; it can't contain a mailbox filter and a site filter; similarly, it
can't contain a mailbox filter and a mailbox content filter.
However, a filter can contain a more complex query of the
same type. For example,
"Mailbox_CustomAttribute10 -eq 'FTE' -and
Mailbox_MemberOfGroup -eq
'$($DG.DistinguishedName)'"
PARAMETER DESCRIPTION

Users The Users parameter specifies the users who get this filter
applied to their Content Searches. Because this is a multi-
value property, specifying a user or group of users with this
parameter will overwrite the existing list of users. See the
following examples for the syntax for adding and removing
selected users.

You can also use the Users parameter to specify a Security &
Compliance Center role group. This lets you create a custom
role group and then assign that role group a search
permissions filter. For example, let's say you have a custom
role group for eDiscovery managers for the U.S. subsidiary of
a multi-national corporation. You can use the Users parameter
to specify this role group (by using the Name property of the
role group) and then use the Filter parameter to allow only
mailboxes in the U.S. to be searched.

You can't specify distribution groups with this parameter.

Examples of changing search permissions filters


These examples show how to use the Get-ComplianceSecurityFilter and Set-ComplianceSecurityFilter
cmdlets to add or remove a user to the existing list of users that the filter is assigned to. When you add or remove
users from a filter, specify the user by using their SMTP address.
This example adds a user to the filter.

$filterusers = Get-ComplianceSecurityFilter -FilterName OttawaUsersFilter

$filterusers.users.add("pilarp@contoso.com")

Set-ComplianceSecurityFilter -FilterName OttawaUsersFilter -Users $filterusers.users

This example removes a user from the filter.

$filterusers = Get-ComplianceSecurityFilter -FilterName OttawaUsersFilter

$filterusers.users.remove("annb@contoso.com")

Set-ComplianceSecurityFilter -FilterName OttawaUsersFilter -Users $filterusers.users

Remove-ComplianceSecurityFilter
The Remove-ComplianceSecurityFilter is used to delete a search filter. Use the FilterName parameter to specify
the filter you want to delete.

More information
How does search permissions filtering work? The permissions filter is added to the search query when a
Content Search is run. The permissions filter is essentially joined to the search query by the AND Boolean
operator. For example, say you have a permissions filter that allows Bob to perform all search actions on the
mailboxes of members of the Workers distribution group. Then Bob runs a Content Search on all mailboxes
in the organization with the search query sender:jerry@adatum.com . Because the permissions filter and the
search query are logically combined by an AND operator, the search will return any message sent by
jerry@adatum.com to any member of the Workers distribution group.
What happens if you have multiple search permissions filters? In a Content Search query, multiple
permissions filters are combined by OR Boolean operators. So results will be returned if any of the filters
are true. In a Content Search, all filters (combined by OR operators) are then combined with the search
query by the AND operator. Let's take the previous example, where a search filter allows Bob to only search
the mailboxes of the members of the Workers distribution group. Then we create another filter that
prevents Bob from searching Phil's mailbox ("Mailbox_Alias -ne 'Phil'"). And let's also assume that Phil is a
member of the Workers group. When Bob runs a Content Search (from the previous example) on all
mailboxes in the organization, search results will be returned for Phil's mailbox even though you applied
filter to prevent Bob from searching Phil's mailbox. This is because the first filter, which allows Bob to search
the Workers group, is true. And because Phil is a member of the Workers group, Bob can search Phil's
mailbox.
Does search permissions filtering work for inactive mailboxes? Yes, you can use mailbox and mailbox
content filters to limit who can search inactive mailboxes in your organization. Like a regular mailbox, an
inactive mailbox has to be configured with the recipient property that's used to create a permissions filter. If
necessary, you can use the Get-Mailbox -InactiveMailboxOnly command to display the properties of
inactive mailboxes. For more information, see Create and manage inactive mailboxes in Office 365.
Does search permissions filtering work for public folders? No. As previously explained, search
permissions filtering can't be used to limit who can search public folders in Exchange. For example, items in
public folder locations can't be excluded from the search results by a permissions filter.
Does allowing a user to search all content locations in a specific service also prevent them from
searching content locations in a different service? No. As previously explained, you have to create a
search permissions filter to explicitly prevent users from searching content locations in a specific Office 365
service (such as preventing a user from searching any Exchange mailbox or any SharePoint site). In other
words, creating a search permissions filter that allows a user to search all SharePoint sites in the
organization doesn't prevent that user from searching mailboxes. For example, to allow SharePoint admins
to only search SharePoint sites, you have to create a create a filter that prevents them from searching
mailboxes. Similarly, to allow Exchange admins to only search mailboxes, you have to create a create a filter
that prevents them from searching sites.
Increase the download speed when exporting
eDiscovery search results from Office 365
9/26/2018 • 3 minutes to read • Edit Online

When you use the Office 365 eDiscovery Export tool to download the results of a Content Search in the Office
365 Security & Compliance Center or download data from Office 365 Advanced eDiscovery, the tool starts a
certain number of concurrent export operations to download the data to your local computer. By default, the
number of concurrent operations is set to 8 times the number of cores in the computer you're using to download
the data. For example, if you have a dual core computer (meaning two central processing units on one chip), the
default number of concurrent export operations is 16. To increase the data transfer throughput and speed-up the
download process, you can increase the number of concurrent operations by configuring a Windows Registry
setting on the computer that you use to download the search results. To speed-up the download process, we
recommend that you start with a setting of 24 concurrent operations.
If you download search results over a low -bandwidth network, increasing this setting might have a negative
impact. Alternatively, you might be able to increase the setting to more than 24 concurrent operations in a high-
bandwidth network (the maximum number of concurrent operations is 512). After you configure this registry
setting, you might have to change it to find the optimal number of concurrent operations for your environment.

Create a registry setting to change the number of concurrent


operations when exporting data
Perform the following procedure on the computer that you'll use to download search results from the Security &
Compliance Center or data from Advanced eDiscovery.
1. Close the Office 365 eDiscovery Export tool if it's open.
2. Save the following text to a Window registry file by using a filename suffix of .reg; for example,
ConcurrentOperations.reg.

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool]
"DownloadConcurrency"="24"

As previous explained, we recommend that you start with 24 concurrent operations, and then change this
setting as appropriate.
3. In Windows Explorer, click or double-click the .reg file that you created in the previous step.
4. In the User Access Control window, click Yes to let the Registry Editor make the change.
5. When prompted to continue, click Yes.
The Registry Editor displays a message saying that the setting was successfully added to the registry.
6. You can repeat steps 2 - 5 to change the value for the DownloadConcurrency registry setting.
IMPORTANT
After you create or change the DownloadConcurrency registry setting, be sure to create a new export job or restart
an existing export job for the search results or data that you want to download. See the More information section
for more details.

More information
A new registry key is created the first time you run the .reg file that you created in this procedure. Then the
DownloadConcurrency registry setting is edited each time you change and re-run the .reg edit file.

The Office 365 eDiscovery Export tool uses the Azure AzCopy utility to download search data from the
Security & Compliance Center or from Advanced eDiscovery. Configuring the DownloadConcurrency
registry setting is similar to using the /NC parameter when running the AzCopy utility. So the registry
setting of "DownloadConcurrency=24" would have the same effect as using the parameter value of /NC:24
with the AzCopy utility.
If you stop an export download that's currently in progress and then restart it (by trying to download the
search results again), the Office 365 eDiscovery Export tool will attempt to resume the same download. So,
if you start a download, stop it, and then change the DownloadConcurrency registry setting, the download
will probably fail if you restart it (by clicking Download exported results). This is because the export tool
will attempt to resume the previous download using settings that aren't valid because you changed the
registry setting.
Therefore, after you change the DownloadConcurrency registry setting, be sure to restart the export job (by
clicking Restart export) in the Security & Compliance Center. Then you can download the exported
results. For more information about exporting search results and data, see:
Export Content Search results from the Office 365 Security & Compliance Center
Export results in Office 365 Advanced eDiscovery
Change the size of PST files when exporting
eDiscovery search results
10/12/2018 • 2 minutes to read • Edit Online

When you use the Office 365 eDiscovery Export tool to export the email results of an eDiscovery search from the
different Microsoft eDiscovery tools, the default size of a PST file that can be exported is 10 GB. If you want to
change this default size, you can edit the Windows Registry on the computer that you use to export the search
results. One reason to do this is so a PST file can fit on removable media, such a DVD, a compact disc, or a USB
drive.

NOTE
The Office 365 eDiscovery Export tool is used to export the search results when using Content Search in the Office 365
Security & Compliance Center, In-Place eDiscovery in Exchange Online, and the eDiscovery Center in SharePoint Online.

Create a registry setting to change the size of PST files when you
export eDiscovery search results
Perform the following procedure on the computer that you'll use to export the results of an eDiscovery search.
1. Close the Office 365 eDiscovery Export tool if it's open.
2. Save the following text to a Window registry file by using a filename suffix of .reg; for example,
PstExportSize.reg.

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool]
"PstSizeLimitInBytes"="1073741824"

In the example above, the PstSizeLimitInBytes value is set to 1,073,741,824 bytes or approximately 1 GB.
Here are some other sample values for the PstSizeLimitInBytes setting.

SIZE IN GB (APPROX.) SIZE IN BYTES

.7 GB (700 MB) 751619277

2 GB 2147483648

4 GB 4294967296

8 GB 8589934592

3. Change the PstSizeLimitInBytes value to the desired maximum size of a PST file when you export search
results, and then save the file.
4. In Windows Explorer, click or double-click the .reg file that you created in the previous steps.
5. In the User Access Control window, click Yes to let the Registry Editor make the change.
6. When prompted to continue, click Yes.
The Registry Editor displays a message saying that the setting was successfully added to the registry.
7. You can repeat steps 3 - 6 to change the value for the PstSizeLimitInBytes registry setting.

Frequently asked questions about changing the default size of PST files
when you export eDiscovery search results
Why is the default size 10 GB?
The default size of 10 GB was based on customer feedback; 10 GB is a good balance between the optimal amount
of content in a single PST and with a minimum chance of file corruption.
Should I increase or decrease the default size of PST files?
Customers tend to decrease the size limit so that the search results will fit on removable media that they can
physically ship other locations in their organization. We don't recommend that you increase the default size
because PST files larger than 10 GB might have corruption issues.
What computer do I have to do this on?
You need to change the registry setting on any local computer that you run the Office 365 eDiscovery Export tool
on.
After I change this setting, do I have to reboot the computer?
No, you don't have to reboot the computer. But, if the Office 365 eDiscovery Export tool is running, you'll have to
close it and the restart it after you change this setting.
Does an existing registry key get edited or does a new key get created?
A new registry key is created the first time you run the .reg file that you created in this procedure. Then the setting
is edited each time you change and re-run the .reg edit file.
Disable reports when you export Content Search
results in the Office 365 Security & Compliance
Center
9/26/2018 • 4 minutes to read • Edit Online

When you use the Office 365 eDiscovery Export tool to export the results of a Content Search in the Security &
Compliance Center, the tool automatically creates and exports two reports that contain additional information
about the exported content. These reports are the Results.csv file and the Manifest.xml file (see the Frequently
asked questions about disabling export reports section in this topic for detailed descriptions of these reports).
Because these files can be very large, you can speed up the download time and save disk space by preventing these
files from being exported. You can do this by changing the Windows Registry on the computer that you use to
export the search results. If you want to include the reports at a later time, you can edit the registry setting.

Create registry settings to disable the export reports


Perform the following procedure on the computer that you'll use to export the results a content search.
1. Close the Office 365 eDiscovery Export tool if it's open.
2. Perform one or both of the following steps, depending on which export report you want to disable.
Results.csv
Save the following text to a Windows registry file by using a filename suffix of .reg; for example,
DisableResultsCsv.reg.

Windows Registry Editor Version 5.00


reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultCsvEnabled /t
REG_SZ /d False

Manifest.xml
Save the following text to a Windows registry file by using a filename suffix of .reg; for example,
DisableManifestXml.reg.

Windows Registry Editor Version 5.00


reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultEdrmEnabled /t
REG_SZ /d False

3. In Windows Explorer, click or double-click the .reg file that you created in the previous steps.
4. In the User Access Control window, click Yes to let the Registry Editor make the change.
5. When prompted to continue, click Yes.
The Registry Editor displays a message saying that the setting was successfully added to the registry.

Edit registry settings to re-enable the export reports


If you disabled the Results.csv and Manifest.xml reports by creating the .reg files in the previous procedure, you can
edit those files to re-enable a report so that it's exported with the search results. Again, perform the following
procedure on the computer that you'll use to export the results a content search.
1. Close the Office 365 eDiscovery Export tool if it's open.
2. Edit one or both of the .reg edit files that you created in the previous procedure.
Results.csv
Open the DisableResultsCsv.reg file in Notepad, change the value False to True , and then save the
file. For example, after you edit the file, it looks like this:

Windows Registry Editor Version 5.00


reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultCsvEnabled /t
REG_SZ /d True

Manifest.xml
Open the DisableManifestXml.reg file in Notepad, change the value False to True , and then save
the file. For example, after you edit the file, it looks like this:

Windows Registry Editor Version 5.00


reg add HKLM\SOFTWARE\Microsoft\Exchange\Client\eDiscovery\ExportTool /v ResultEdrmEnabled /t
REG_SZ /d True

3. In Windows Explorer, click or double-click a .reg file that you edited in the previous step.
4. In the User Access Control window, click Yes to let the Registry Editor make the change.
5. When prompted to continue, click Yes.
The Registry Editor displays a message saying that the setting was successfully added to the registry.

Frequently asked questions about disabling export reports


What are the Results.csv and Manifest.xml reports?
The Results.csv and Manifest.xml files contain additional information about the content that was exported.
Results.csv An Excel document that contains information about each item that is download as a search
result. For email, the result log contains information about each message, including:
The location of the message in the source mailbox (including whether the message is in the primary
or archive mailbox).
The date the message was sent or received.
The Subject line from the message.
The sender and recipients of the message.
Whether the message is a duplicate message if you enabled de-duplication when exporting the
search results. Duplicate messages will have a value in the Parent ItemId column that identifies the
message as a duplicate. The value in the Parent ItemId column is the same as the value in the Item
DocumentId column of the message that was exported.
For documents from SharePoint and OneDrive for Business sites, the result log contains information
about each document, including:
The URL for the document.
The URL for the site collection where the document is located.
The date that the document was last modified.
The name of the document (which is located in the Subject column in the result log).
Manifest.xml A manifest file (in XML format) that contains information about each item included in the
search results. The information in this report is the same as the Results.csv report, but it's in the format
specified by the Electronic Discovery Reference Model (EDRM ). For more information about EDRM, go to
https://www.edrm.net.
When should I disable exporting these reports?
It depends on your specific needs. Many organizations don't require additional information about search results,
and don't need these reports.
What computer do I have to do this on?
You have to change the registry setting on any local computer that you run the Office 365 eDiscovery Export tool
on.
After I change this setting, do I have to restart the computer?
No, you don't have to restart the computer. But if the Office 365 eDiscovery Export tool is running, you have to
close it and then restart it after you change the registry setting.
Does an existing registry key get edited or does a new key get created?
A new registry key is created the first time you run the .reg file that you created in the procedure in this topic. Then
the setting is edited each time you change and re-run the .reg edit file.
Use Content Search in Office 365 for targeted
collections
10/12/2018 • 12 minutes to read • Edit Online

The Content Search feature in the Office 365 Security & Compliance Center doesn't provide a direct way in the UI
to search specific folders in Exchange mailboxes or SharePoint and OneDrive for Business sites. However, it is
possible to search specific folders (called a targeted collection) by specifying the folder ID or path in the actual
search query syntax. Using Content Search to perform a targeted collection is useful when you're confident that
items responsive to a case or privileged items are located in a specific mailbox or site folder. You can use the script
in this article to obtain the folder ID for mailbox folders or the path for folders on a SharePoint and OneDrive for
Business site. Then you can use the folder ID or path in a search query to return items located in the folder.

Before you begin


You have to be a member of the eDiscovery Manager role group in the Security & Compliance Center to
run the script in Step 1. For more information, see Assign eDiscovery permissions in the Office 365
Security & Compliance Center.
Additionally, you have to be assigned the Mail Recipients role in your Exchange Online organization. This is
required to run the Get-MailboxFolderStatistics cmdlet, which is included in the script in Step 1. By
default, the Mail Recipients role is assigned to the Organization Management and Recipient Management
role groups in Exchange Online. For more information about assigning permissions in Exchange Online,
see Manage role group members. You could also create a custom role group, assign the Mail Recipients
role to it, and then add the members who need to run the script in Step 1. For more information, see
Manage role groups.
Each time you run the script in Step 1, a new remote PowerShell session is created. So you could use up all
the remote PowerShell sessions available to you. To prevent this from happening, you can run the following
command to disconnect your active remote PowerShell sessions.

Get-PSSession | Remove-PSSession

For more information, see Connect to Exchange Online PowerShell.


The script includes minimal error handling. The primary purpose of the script is to quickly display a list of
mailbox folder IDs or site paths that can be used in the search query syntax of a Content Search to perform
a targeted collection.
The sample script provided in this topic isn't supported under any Microsoft standard support program or
service. The sample script is provided AS IS without warranty of any kind. Microsoft further disclaims all
implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a
particular purpose. The entire risk arising out of the use or performance of the sample script and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Run the script to get a list of folders for a mailbox or site
The script that you run in this first step will return a list of mailbox folders or SharePoint or OneDrive for Business
folders, and the corresponding folder ID or path for each folder. When you run this script, it will prompt you for
the following information.
Email address or site URL Type an email address of the custodian to return a list of Exchange mailbox
folders and fold IDs. Or type the URL for a SharePoint site or a OneDrive for Business site to return a list of
paths for the specified site. Here are some examples:
Exchange - stacig@contoso.onmicrosoft.com
SharePoint - https://contoso.sharepoint.com/sites/marketing
OneDrive for Business - https://contoso-
my.sharepoint.com/personal/stacig_contoso_onmicrosoft_com
Your user credentials - The script will use your credentials to connect to Exchange Online and the Security
& Compliance Center with remote PowerShell. As previously explained, you have to assigned the
appropriate permissions to successfully run this script.
To display a list of mailbox folders or site path names:
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
GetFolderSearchParameters.ps1 .

#########################################################################################################
# This PowerShell script will prompt you for: #
# * Admin credentials for a user who can run the Get-MailboxFolderStatistics cmdlet in Exchange #
# Online and who is an eDiscovery Manager in the Security &amp; Compliance Center. #
# The script will then: #
# * If an email address is supplied: list the folders for the target mailbox. #
# * If a SharePoint or OneDrive for Business site is supplied: list the folder paths for the site. #
# * In both cases, the script supplies the correct search properties (folderid: or path:) #
# appended to the folder ID or path ID to use in a Content Search. #
# Notes: #
# * For SharePoint and OneDrive for Business, the paths are searched recursively; this means the #
# the current folder and all sub-folders are searched. #
# * For Exchange, only the specified folder will be searched; this means sub-folders in the folder #
# will not be searched. To search sub-folders, you need to use the specify the folder ID for #
# each sub-folder that you want to search. #
# * For Exchange, only folders in the user's primary mailbox will be returned by the script. #
#########################################################################################################
# Collect the target email address or SharePoint Url
$addressOrSite = Read-Host "Enter an email address or a URL for a SharePoint or OneDrive for Business site"
# Authenticate with Exchange Online and the Security &amp; Compliance Center (Exchange Online Protection -
EOP)
if (!$credentials)
{
$credentials = Get-Credential
}
if ($addressOrSite.IndexOf("@") -ige 0)
{
# List the folder Ids for the target mailbox
$emailAddress = $addressOrSite
# Authenticate with Exchange Online
if (!$ExoSession)
{
$ExoSession = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.outlook.com/powershell-liveid/ -Credential $credentials -Authentication Basic -AllowRedirection
Import-PSSession $ExoSession -AllowClobber -DisableNameChecking
}
$folderQueries = @()
$folderStatistics = Get-MailboxFolderStatistics $emailAddress
foreach ($folderStatistic in $folderStatistics)
{
$folderId = $folderStatistic.FolderId;
$folderId = $folderStatistic.FolderId;
$folderPath = $folderStatistic.FolderPath;
$encoding= [System.Text.Encoding]::GetEncoding("us-ascii")
$nibbler= $encoding.GetBytes("0123456789ABCDEF");
$folderIdBytes = [Convert]::FromBase64String($folderId);
$indexIdBytes = New-Object byte[] 48;
$indexIdIdx=0;
$folderIdBytes | select -skip 23 -First 24 | %{$indexIdBytes[$indexIdIdx++]=$nibbler[$_ -shr
4];$indexIdBytes[$indexIdIdx++]=$nibbler[$_ -band 0xF]}
$folderQuery = "folderid:$($encoding.GetString($indexIdBytes))";
$folderStat = New-Object PSObject
Add-Member -InputObject $folderStat -MemberType NoteProperty -Name FolderPath -Value $folderPath
Add-Member -InputObject $folderStat -MemberType NoteProperty -Name FolderQuery -Value $folderQuery
$folderQueries += $folderStat
}
Write-Host "-----Exchange Folders-----"
$folderQueries |ft
}
elseif ($addressOrSite.IndexOf("http") -ige 0)
{
$searchName = "SPFoldersSearch"
$searchActionName = "SPFoldersSearch_Preview"
# List the folders for the SharePoint or OneDrive for Business Site
$siteUrl = $addressOrSite
# Authenticate with the Security &amp; Compliance Center
if (!$SccSession)
{
$SccSession = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $credentials -Authentication Basic
-AllowRedirection
Import-PSSession $SccSession -AllowClobber -DisableNameChecking
}
# Clean-up, if the script was aborted, the search we created might not have been deleted. Try to do so
now.
Remove-ComplianceSearch $searchName -Confirm:$false -ErrorAction 'SilentlyContinue'
# Create a Content Search against the SharePoint Site or OneDrive for Business site and only search for
folders; wait for the search to complete
$complianceSearch = New-ComplianceSearch -Name $searchName -ContentMatchQuery "contenttype:folder" -
SharePointLocation $siteUrl
Start-ComplianceSearch $searchName
do{
Write-host "Waiting for search to complete..."
Start-Sleep -s 5
$complianceSearch = Get-ComplianceSearch $searchName
}while ($complianceSearch.Status -ne 'Completed')
if ($complianceSearch.Items -gt 0)
{
# Create a Complinace Search Action and wait for it to complete. The folders will be listed in the
.Results parameter
$complianceSearchAction = New-ComplianceSearchAction -SearchName $searchName -Preview
do
{
Write-host "Waiting for search action to complete..."
Start-Sleep -s 5
$complianceSearchAction = Get-ComplianceSearchAction $searchActionName
}while ($complianceSearchAction.Status -ne 'Completed')
# Get the results and print out the folders
$results = $complianceSearchAction.Results
$matches = Select-String "Data Link:.+[,}]" -Input $results -AllMatches
foreach ($match in $matches.Matches)
{
$rawUrl = $match.Value
$rawUrl = $rawUrl -replace "Data Link: " -replace "," -replace "}"
Write-Host "path:""$rawUrl"""
}
}
else
{
Write-Host "No folders were found for $siteUrl"
}
}
Remove-ComplianceSearch $searchName -Confirm:$false -ErrorAction 'SilentlyContinue'
}
else
{
Write-Error "Couldn't recognize $addressOrSite as an email address or a site URL"
}

2. On your local computer, open Windows PowerShell and go to the folder where you saved the script.
3. Run the script; for example:

.\GetFolderSearchParameters.ps1

4. Enter the information that the script prompts you for.


The script displays a list of mailbox folders or site folder for the specified user. Let this window open so that
you can copy a folder ID or path name and paste it in to a search query in Step 2.

TIP
Instead of displaying a list of folders on the computer screen, you can re-direct the output of the script to a text file.
This file will be saved to the folder where the script is located. For example, to redirect the script output to a text file,
run the following command in Step 3: .\GetFolderSearchParameters.ps1 > StacigFolderIds.txt Then you can
copy a folder ID or path from the file to use in a search query.

Script output for mailbox folders


If you're getting mailbox folder IDs, the script connects to Exchange Online by using remote PowerShell, runs the
Get-MailboxFolderStatisics cmdlet, and then displays the list of the folders from the specified mailbox. For
every folder in the mailbox, the script displays the name of the folder in the FolderPath column and the folder ID
in the FolderQuery column. Additionally, the script adds the prefix of folderId (which is the name of the mailbox
property) to the folder ID. Because the folderid property is a searchable property, you'll use folderid:<folderid>
in a search query in Step 2 to search that folder.
Here's an example of the output returned by the script for mailbox folders.
The example in Step 2 shows the query used to search the Purges subfolder in the user's Recoverable Items folder.
Script output for site folders
If you're getting paths from SharePoint or OneDrive for Business sites, the script connects to the Security &
Compliance Center using remote PowerShell, creates a new Content Search that searches the site for folders, and
then displays a list of the folders located in the specified site. The script displays the name of each folder and adds
the prefix of path (which is the name of the site property) to the folder URL. Because the path property is a
searchable property, you'll use path:<path> in a search query in Step 2 to search that folder.
Here's an example of the output returned by the script for site folders.

Step 2: Use a folder ID or path to perform a targeted collection


After you've run the script to collect a list of folder IDs or paths for a specific user, the next step to go to the
Security & Compliance Center and create a new Content Search to search a specific folder. You'll use the
folderid:<folderid> or path:<path> property in the search query that you configure in the Content Search
keyword box (or as the value for the ContentMatchQuery parameter if you use the New-ComplianceSearch
cmdlet). You can combine the folderid or path property with other search parameters or search conditions. If
you only include the folderid or path property in the query, the search will return all items located in the
specified folder.

NOTE
Using the path property to search OneDrive locations won't return media files, such as .png, .tiff, or .wav files, in the search
results.

1. Go to https://protection.office.com.
2. Sign in to Office 365 using the account and credentials that you used to run the script in Step 1.
3. In the left pane of the Security & Compliance Center, click Search & investigation > Content search,
and then click New .
4. On the New search page, type a name for the Content Search. This name has to be unique in your
organization.
5. Under Where do you want us to look, do one of the following, based on whether your searching a
mailbox folder or a site folder:
Click Choose specific mailboxes to search and then add the same mailbox that you specified
when you ran the script in Step 1.
Or
Click Choose specific sites to search to search and then add the same site URL that you specified
when you ran the script in Step 1.
6. Click Next.
7. In the keyword box on the What do you want us to look for page, paste the folderid:<folderid> or
path:<path> value that was returned by the script in Step 1.
For example, the query in the following screenshot will search for any item in the Purges subfolder in the
user's Recoverable Items folder (the value of the folderid property for the Purges subfolder is shown in
the screenshot in Step 1):

8. Click Search to start the targeted collection search.


Examples of search queries for targeted collections
Here are some examples of using the folderid and path properties in a search query to perform a targeted
collection. Note that placeholders are used for folderid:<folderid> and path:<path> to save space.
This example searches three different mailbox folders. You could use similar query syntax to search the
hidden folders in a user's Recoverable Items folder.

folderid:<folderid> OR folderid:<folderid> OR folderid:<folderid>

This example searches a mailbox folder for items that contain an exact phrase.

folderid:<folderid> AND "Contoso financial results"

This example searches a site folder (and any subfolders) for documents that contain the letters "NDA" in the
title.

path:<path> AND filename:nda

This example searches a site folder (and any subfolder) for documents there were changed within a date
range.

path:<path> AND (lastmodifiedtime>=01/01/2017 AND lastmodifiedtime<=01/21/2017)

More information
Keep the following things in mind when using the script in this article and performing targeted collections.
The script doesn't remove any folders from the results. So some folders listed in the results might be
unsearchable (or return zero items) because they contain system-generated content.
This script only returns folder information for the user's primary mailbox. It doesn't return information
about folders in the user's archive mailbox.
When searching mailbox folders, only the specified folder (identified by its folderid property) will be
searched. Subfolders won't be searched. To search sub-folders, you need to use the folderid for the sub-
folder that you want to search.
When searching site folders, the folder (identified by its path property) and all sub-folders will be
searched.
As previously stated, you can't use path property to search for media files, such as .png, .tiff, or .wav files,
located in OneDrive locations. Use a different site property to search for media files in OneDrive folders.
Use Content Search to search the mailbox and
OneDrive for Business site for a list of users
9/26/2018 • 7 minutes to read • Edit Online

The Office 365 Security & Compliance Center provides a number of Windows PowerShell cmdlets that let you
automate time-consuming eDiscovery-related tasks. Currently, creating a Content Search in the Security &
Compliance Center to search a large number of custodian content locations takes time and preparation. Before you
create a search, you have to collect the URL for each OneDrive for Business site and then add each mailbox and O
neDrive for Business site to the search. In future releases, this will be easier to do in the Security & Compliance
Center. Until then, you can use the script in this article to automate this process. This script prompts you for the
name of your organization's MySite domain (for example, contoso in the URL https://contoso-
my.sharepoint.com), a list of user email addresses, the name of the new Content Search, and the search query to
use. The script gets the OneDrive for Business URL for each user in the list, and then it creates and starts a Content
Search that searches the mailbox and OneDrive for Business site for each user in the list, using the search query
that you provide.

Before you begin


You have to be a member of the eDiscovery Manager role group in the Security & Compliance Center and a
SharePoint Online global administrator to run the script in Step 3.
Be sure to save the list of users that you create in Step 2 and the script in Step 3 to the same folder. That will
make it easier to run the script.
The script includes minimal error handling. It's primary purpose is to quickly and easily search the mailbox
and OneDrive for Business site of each user.
The sample scripts provided in this topic aren't supported under any Microsoft standard support program
or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims
all ihttps://go.microsoft.com/fwlink/p/?LinkId=517283mplied warranties including, without limitation, any
implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the
use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft,
its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any
damages whatsoever (including, without limitation, damages for loss of business profits, business
interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to
use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such
damages.

Step 1: Install the SharePoint Online Management Shell


The first step is to install the SharePoint Online Management Shell. You don't have to use the shell in this
procedure, but you have to install it because it contains pre-requisites required by the script that you run in Step 3.
These prerequisites allow the script to communicate with SharePoint Online to get the URLs for the OneDrive for
Business sites.
Go to Set up the SharePoint Online Management Shell Windows PowerShell environment and perform Step 1
and Step 2 to install the SharePoint Online Management Shell.

Step 2: Generate a list of users


The script in Step 3 will create a Content Search to search the mailboxes and OneDrive accounts for a list of users.
You can just type the email addresses in a text file, or you can run a command in Windows PowerShell to get a list
of email addresses and save them to a file (located in same folder that you'll save the script to in Step 3).
Here's an Exchange Online PowerShell command that you can runt to get a list of email addresses for all users in
your organization and save it to a text file named Users.txt .

Get-Mailbox -ResultSize unlimited -Filter { RecipientTypeDetails -eq 'UserMailbox'} | Select-Object


PrimarySmtpAddress > Users.txt

After you run this command, be sure to open the file and remove the header that contains the property name,
PrimarySmtpAddress . The text file should just contain a list of email addresses, and nothing else. Make sure there
are no blank rows before or after the list of email addresses.

Step 3: Run the script to create and start the search


When you run the script in this step, it will prompt you for the following information. Be sure to have this
information ready before you run the script.
Your user credentials - The script will use your credentials to access SharePoint Online to get the
OneDrive for Business URLs and to connect to the Security & Compliance Center with remote PowerShell.
Name of your MySite domain - The MySite domain is the domain that contains all the OneDrive for
Business sites in your organization. For example, if the URL for your MySite domain is https://contoso-
my.sharepoint.com, then you would enter contoso when the script prompts you for the name of your
MySite domain.
Pathname of the text file from Step 2 - The pathname of the text file that you created in Step 2. If the text
file and the script are located in the same folder, then enter the name of the text file. Otherwise, enter the
complete pathname for the text file.
Name of the Content Search - The name of the Content Search that will be created by the script.
Search query - The search query that will be used with the Content Search is created and run. For more
information about search queries, see Keyword queries and search conditions for Content Search.
To run the script:
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
SearchEXOOD4B.ps1 . Save the file to the same folder where you saved the list of users in Step 2.

# This PowerShell script will prompt you for the following information:
# * Your user credentials
# * The name of your organization's MySite domain
# * The pathname for the text file that contains a list of user email addresses
# * The name of the Content Search that will be created
# * The search query string
# The script will then:
# * Find the OneDrive for Business site for each user in the text file
# * Create and start a Content Search using the above information
# Get user credentials
if (!$credentials)
{
$credentials = Get-Credential
}
# Get the user's MySite domain name. We use this to create the admin URL and root URL for OneDrive for
Business
$mySiteDomain = Read-Host "What is your organization's MySite domain? For example, 'contoso' for
'https://contoso-my.sharepoint.com'"
$AdminUrl = "https://$mySiteDomain-admin.sharepoint.com"
$AdminUrl = "https://$mySiteDomain-admin.sharepoint.com"
$mySiteUrlRoot = "https://$mySiteDomain-my.sharepoint.com"
# Get other required information
$inputfile = read-host "Enter the file name of the text file that contains the email addresses for the users
you want to search"
$searchName = Read-Host "Enter the name for the new search"
$searchQuery = Read-Host "Enter the search query you want to use"
$emailAddresses = Get-Content $inputfile | where {$_ -ne ""} | foreach{ $_.Trim() }
# Connect to Office 365
if (!$s -or !$a)
{
$s = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
"https://ps.compliance.protection.outlook.com/powershell-liveid" -Credential $credentials -Authentication
Basic -AllowRedirection -SessionOption (New-PSSessionOption -SkipCACheck -SkipCNCheck -SkipRevocationCheck)
$a = Import-PSSession $s -AllowClobber
if (!$s)
{
Write-Error "Could not create PowerShell session."
return;
}
}
# Load the SharePoint assemblies from the SharePoint Online Management Shell
# To install, go to http://go.microsoft.com/fwlink/p/?LinkId=255251
if (!$SharePointClient -or !$SPRuntime -or !$SPUserProfile)
{
$SharePointClient = [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client")
$SPRuntime = [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client.Runtime")
$SPUserProfile =
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client.UserProfiles")
if (!$SharePointClient)
{
Write-Error "SharePoint Online Management Shell isn't installed, please install from:
http://go.microsoft.com/fwlink/p/?LinkId=255251 and then run this script again"
return;
}
}
if (!$spCreds)
{
$spCreds = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($credentials.UserName,
$credentials.Password)
}
# Add the path of the User Profile Service to the SPO admin URL, then create a new webservice proxy to access
it
$proxyaddr = "$AdminUrl/_vti_bin/UserProfileService.asmx?wsdl"
$UserProfileService= New-WebServiceProxy -Uri $proxyaddr -UseDefaultCredential False
$UserProfileService.Credentials = $credentials
# Take care of auth cookies
$strAuthCookie = $spCreds.GetAuthenticationCookie($AdminUrl)
$uri = New-Object System.Uri($AdminUrl)
$container = New-Object System.Net.CookieContainer
$container.SetCookies($uri, $strAuthCookie)
$UserProfileService.CookieContainer = $container
Write-Host "Getting each user's OneDrive for Business URL"
$urls = @()
foreach($emailAddress in $emailAddresses)
{
try
{
$prop = $UserProfileService.GetUserProfileByName("i:0#.f|membership|$emailAddress") | Where-Object {
$_.Name -eq "PersonalSpace" }
$url = $prop.values[0].value
$furl = $mySiteUrlRoot + $url
$urls += $furl
Write-Host "-$emailAddress => $furl"
}
catch
{
Write-Warning "Could not locate OneDrive for $emailAddress"
}
}
}
Write-Host "Creating and starting the search"
$search = New-ComplianceSearch -Name $searchName -ExchangeLocation $emailAddresses -SharePointLocation $urls -
ContentMatchQuery $searchQuery
# Finally, start the search and then display the status
if($search)
{
Start-ComplianceSearch $search.Name
Get-ComplianceSearch $search.Name
}

2. Open Windows PowerShell and go to the folder where you saved the script and the list of users from Step
2.
3. Start the script; for example:

.\SearchEXOOD4B.ps1

4. When prompted for your credentials, enter your email address and password, and then click OK.
5. Enter following information when prompted by the script. Type each piece of information and then press
Enter.
The name of your MySite domain.
The pathname of the text file that contains the list of users.
A name for the Content Search.
The search query (leave this blank to return all items in the content locations).
The script gets the URLs for each OneDrive for Business site and then creates and starts the search. You can
either run the Get-ComplianceSearch cmdlet in Security & Compliance Center PowerShell to display the
search statistics and results, or you can go to the Content search page in the Security & Compliance
Center to view information about the search.
Create, report on, and delete multiple Content
Searches
9/26/2018 • 12 minutes to read • Edit Online

Quickly creating and reporting discovery searches is often an important step in eDiscovery and investigations
when you're trying to learn about the underlying data, and the richness and quality of your searches. To help you
do this, the Security & Compliance Center offers a set of Windows PowerShell cmdlets to automate time-
consuming Content Search tasks. These scripts provide a quick and easy way to create a number of searches, and
then run reports of the estimated search results that can help you determine the quantity of data in question. You
can also use the scripts to create different versions of searches to compare the results each one produces. These
scripts can help you to quickly and efficiently identify and cull your data.

Before you begin


You have to be a member of the eDiscovery Manager role group in the Security & Compliance Center to
run the scripts that are described in this topic.
To collect a list of the URLs for the OneDrive for Business sites in your organization that you can add to the
CSV file in Step 1, see Create a list of all OneDrive locations in your organization.
Be sure to save all the files that you create in this topic to the same folder. That will make it easier to run the
scripts.
The scripts include minimal error handling. Their primary purpose is to quickly create, report on, and delete
multiple Content Searches.
The sample scripts provided in this topic aren't supported under any Microsoft standard support program
or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims
all implied warranties including, without limitation, any implied warranties of merchantability or of fitness
for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Create a CSV file that contains information about the searches
you want to run
The comma separated value (CSV ) file that you create in this step contains a row for each user that want to search.
You can search the user's Exchange Online mailbox (which includes the archive mailbox, if it's enabled) and their
OneDrive for Business site. Or you can search just the mailbox or the OneDrive for Business site. You can also
search any site in your SharePoint Online organization. The script that you run in Step 3 will create a separate
search for each row in the CSV file.
1. Copy and paste the following text into a .txt file using NotePad. Save this file to a folder on your local
computer. You'll save the other scripts to this folder as well.
ExchangeLocation,SharePointLocation,ContentMatchQuery,StartDate,EndDate
sarad@contoso.onmicrosoft.com,https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft_com,
(lawsuit OR legal),1/1/2000,12/31/2005
sarad@contoso.onmicrosoft.com,https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft_com,
(lawsuit OR legal),1/1/2006,12/31/2010
sarad@contoso.onmicrosoft.com,https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft_com,
(lawsuit OR legal),1/1/2011,3/21/2016
,https://contoso.sharepoint.com/sites/contoso,,,3/21/2016
,https://contoso-my.sharepoint.com/personal/davidl_contoso_onmicrosoft_com,,1/1/2015,
,https://contoso-my.sharepoint.com/personal/janets_contoso_onmicrosoft_com,,1/1/2015,

The first row, or header row, of the file lists the parameters that will be used by New-ComplianceSearch
cmdlet (in the script in Step 3) to create a new Content Searches. Each parameter name is separated by a
comma. Make sure there aren't any spaces in the header row. Each row under the header row represents the
parameter values for each search. Be sure to replace the placeholder data in the CSV file with your actual
data.
2. Open the .txt file in Excel, and then use the information in the following table to edit the file with information
for each search.

PARAMETER DESCRIPTION

ExchangeLocation The SMTP address of the user's mailbox.

SharePointLocation The URL for the user's OneDrive for Business site or the
URL for any site in your organization. For the URL for
OneDrive for Business sites, use this format:
https://<your organization>-
my.sharepoint.com/personal/<user alias>_<your
organization>_onmicrosoft_com
. For example,
https://contoso-
my.sharepoint.com/personal/sarad_contoso_onmicrosoft_com
.

ContentMatchQuery The search query for the search. For more information
about creating a search query, see Keyword queries and
search conditions for Content Search.

StartDate For email, the date on or after a message was received by


a recipient or sent by the sender. For documents on
SharePoint or OneDrive for Business sites, the date on or
after a document was last modified.

EndDate For email, the date on or before a message was sent by a


sent by the user. For documents on SharePoint or
OneDrive for Business sites, the date on or before a
document was last modified.

3. Save the Excel file as a CSV file to a folder on your local computer. The script that you create in Step 3 will
use the information in this CSV file to create the searches.

Step 2: Connect to Security & Compliance Center PowerShell


The next step is to connect Windows PowerShell to the Security & Compliance Center for your organization.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
ConnectSCC.ps1 . Save the file to the same folder that you saved the CSV file to in Step 1.
# Get login credentials
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $UserCredential -
Authentication Basic -AllowRedirection
Import-PSSession $Session -AllowClobber -DisableNameChecking
$Host.UI.RawUI.WindowTitle = $UserCredential.UserName + " (Office 365 Security &amp; Compliance Center)"

2. On your local computer, open Windows PowerShell, go to the folder where the script that you created in the
previous step is located, and then run the script; for example:

.\ConnectSCC.ps1

Step 3: Run the script to create and start the searches


The script in this step will create a separate Content Search for each row in the CSV file that you created in Step 1.
When you run this script, you'll be prompted for two values:
Search Group ID - This name provides an easy way to organize the searches that are created from the
CSV file. Each search that's created is named with the Search Group ID, and then a number is appended to
the search name. For example, if you enter ContosoCase for the Search Group ID, then the searches are
named ContosoCase_1, ContosoCase_2, ContosoCase_3, and so on. Note that the name you type is case
sensitive. When you use the Search Group ID in Step 4 and Step 5, you have to use the same case as you
did when you created it.
CSV file - The name of the CSV file that you created in Step 1. Be sure to include the use the full filename,
include the .csv file extension; for example, ContosoCase.csv .

To run the script:


1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
CreateSearches.ps1 . Save the file to the same folder where you saved the other files.

# Get the Search Group ID and the location of the CSV input file
$searchGroup = Read-Host 'Search Group ID'
$csvFile = Read-Host 'Source CSV file'

# Do a quick check to make sure our group name will not collide with other searches
$searchCounter = 1
import-csv $csvFile |
ForEach-Object{

$searchName = $searchGroup +'_' + $searchCounter


$search = Get-ComplianceSearch $searchName -EA SilentlyContinue
if ($search)
{
Write-Error "The Search Group ID conflicts with existing searches. Please choose a search group name
and restart the script."
return
}
$searchCounter++
}

$searchCounter = 1
import-csv $csvFile |
ForEach-Object{

# Create the query


$query = $_.ContentMatchQuery
if(($_.StartDate -or $_.EndDate))
{
# Add the appropriate date restrictions. NOTE: Using the Date condition property here because it
works across Exchange, SharePoint, and OneDrive for Business.
# For Exchange, the Date condition property maps to the Sent and Received dates; for SharePoint and
OneDrive for Business, it maps to Created and Modified dates.
if($query)
{
$query += " AND"
}
$query += " ("
if($_.StartDate)
{
$query += "Date >= " + $_.StartDate
}
if($_.EndDate)
{
if($_.StartDate)
{
$query += " AND "
}
$query += "Date <= " + $_.EndDate
}
$query += ")"
}

# -ExchangeLocation can't be set to an empty string, set to null if there's no location.


$exchangeLocation = $null
if ( $_.ExchangeLocation)
{
$exchangeLocation = $_.ExchangeLocation
}

# Create and run the search


$searchName = $searchGroup +'_' + $searchCounter
Write-Host "Creating and running search: " $searchName -NoNewline
$search = New-ComplianceSearch -Name $searchName -ExchangeLocation $exchangeLocation -SharePointLocation
$_.SharePointLocation -ContentMatchQuery $query

# Start and wait for each search to complete


Start-ComplianceSearch $search.Name
while ((Get-ComplianceSearch $search.Name).Status -ne "Completed")
{
Write-Host " ." -NoNewline
Start-Sleep -s 3
}
Write-Host ""

$searchCounter++
}

2. In Windows PowerShell, go to the folder where you saved the script in the previous step, and then run the
script; for example:

.\CreateSearches.ps1

3. At the Search Group ID prompt, type a search group name, and then press Enter; for example,
ContosoCase . Remember that this name is case sensitive, so you'll have to type it the same way in the
subsequent steps.
4. At the Source CSV file prompt, type the name of the CSV file, including the .csv file extension; for example,
ContosoCase.csv .

5. Press Enter to continue running the script.


The script displays the progress of creating and running the searches. When the script is complete, it returns
to the prompt.

Step 4: Run the script to report the search estimates


After you create the searches, the next step is to run a script that displays a simple report of the number of search
hits for each search that was created in Step 3. The report also includes the size of results for each search, and the
total number of hits and total size of all searches. When you run the reporting script, you'll be prompted for the
Search Group ID, and a CSV filename if you want to save the report to a CSV file.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
SearchReport.ps1 . Save the file to the same folder where you saved the other files.
$searchGroup = Read-Host 'Search Group ID'
$outputFile = Read-Host 'Enter a file name or file path to save the report to a .csv file. Leave blank to only
display the report'
$searches = Get-ComplianceSearch | ?{$_.Name -clike $searchGroup + "_*"}
$allSearchStats = @()
foreach ($partialObj in $searches)
{
$search = Get-ComplianceSearch $partialObj.Name
$sizeMB = [System.Math]::Round($search.Size / 1MB, 2)
$searchStatus = $search.Status
if($search.Errors)
{
$searchStatus = "Failed"
}elseif($search.NumFailedSources -gt 0)
{
$searchStatus = "Failed Sources"
}
$searchStats = New-Object PSObject
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name Name -Value $search.Name
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name ContentMatchQuery -Value
$search.ContentMatchQuery
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name Status -Value $searchStatus
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name Items -Value $search.Items
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name "Size" -Value $search.Size
Add-Member -InputObject $searchStats -MemberType NoteProperty -Name "Size(MB)" -Value $sizeMB
$allSearchStats += $searchStats
}
# Calculate the totals
$allItems = ($allSearchStats | Measure-Object Items -Sum).Sum
# Convert the total size to MB and round to the nearst 100th
$allSize = ($allSearchStats | Measure-Object 'Size' -Sum).Sum
$allSizeMB = [System.Math]::Round($allSize / 1MB, 2)
# Get the total successful searches and total of all searches
$allSuccessCount = ($allSearchStats |?{$_.Status -eq "Completed"}).Count
$allCount = $allSearchStats.Count
$allStatus = [string]$allSuccessCount + " of " + [string]$allCount
# Totals Row
$totalSearchStats = New-Object PSObject
Add-Member -InputObject $totalSearchStats -MemberType NoteProperty -Name Name -Value "Total"
Add-Member -InputObject $totalSearchStats -MemberType NoteProperty -Name Status -Value $allStatus
Add-Member -InputObject $totalSearchStats -MemberType NoteProperty -Name Items -Value $allItems
Add-Member -InputObject $totalSearchStats -MemberType NoteProperty -Name "Size(MB)" -Value $allSizeMB
$allSearchStats += $totalSearchStats
# Just get the columns we're interested in showing
$allSearchStatsPrime = $allSearchStats | Select-Object Name, Status, Items, "Size(MB)", ContentMatchQuery
# Print the results to the screen
$allSearchStatsPrime |ft -AutoSize -Wrap
# Save the results to a CSV file
if ($outputFile)
{
$allSearchStatsPrime | Export-Csv -Path $outputFile -NoTypeInformation
}

2. In Windows PowerShell, go to the folder where you saved the script in the previous step, and then run the
script; for example:

.\SearchReport.ps1

3. At the Search Group ID prompt, type a search group name, and then press Enter; for example
ContosoCase . Remember that this name is case sensitive, so you'll have to type it the same way you did
when you ran the script in Step 3.
4. At the File path to save the report to a CSV file (leave blank to just display the report) prompt, type
a file name of complete filename path (including the .csv file extension) if you want to save the report to a
CSV file. name of the CSV file, including the .csv file extension. For example, you could type
ContosoCaseReport.csv to save it to the current directory or you could type
C:\Users\admin\OneDrive for Business\ContosoCase\ContosoCaseReport.csv to save it to a different folder. You
can also leave the prompt blank to display the report but not save it to a file.
5. Press Enter.
The script displays the progress of creating and running the searches. When the script is complete, the
report is displayed.

NOTE
If the same mailbox or site is specified as a content location in more than one search in a search group, the total results
estimate in the report (for both the number of items and the total size) might include results for the same items. That's
because the same email message or document will be counted more than once if it matches the query for different searches
in the search group.

Step 5: Run the script to delete the searches


Because you might be creating a lot of searches, this last script just makes it easy to quickly delete the searches you
created in Step 3. Like the other scripts, this one also prompts you for the Search Group ID. All searches with the
Search Group ID in the search name will be deleted when you run this script.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
DeleteSearches.ps1 . Save the file to the same folder where you saved the other files.

# Delete all searches in a search group


$searchGroup = Read-Host 'Search Group ID'
Get-ComplianceSearch |
ForEach-Object{
# If the name matches the search group name pattern (case sensitive), delete the search
if ($_.Name -cmatch $searchGroup + "_\d+")
{
Write-Host "Deleting search: " $_.Name
Remove-ComplianceSearch $_.Name -Confirm:$false
}
}

2. In Windows PowerShell, go to the folder where you saved the script in the previous step, and then run the
script; for example:

.\DeleteSearches.ps1

3. At the Search Group ID prompt, type a search group name for the searches that you want to delete, and
then press Enter; for example, ContosoCase . Remember that this name is case sensitive, so you'll have to
type it the same way you did when you ran the script in Step 3.
The script displays the name of each search that's deleted.
Clone a Content Search in the Office 365 Security &
Compliance Center
9/26/2018 • 5 minutes to read • Edit Online

Creating a Content Search in Office 365 Security & Compliance Center that searches a lot of mailboxes or
SharePoint and OneDrive for Business sites can take awhile. Specifying the sites to search can also be prone to
errors if you mistype a URL. To avoid these issues, you can use the Windows PowerShell script in this article to
quickly clone an existing Content Search. When a you clone a search, a new search (with a different name) is
created that contains the same properties (such as the content locations and the search query) as the original
search. Then you can edit the new search (by changing the keyword query or the date range) and run it.
Why clone Content Searches?
To compare the results of different keyword search queries run on the same content locations.
To save you from having to re-enter a large number of content locations when you create a new search.
To decrease the size of the search results; for example, if you have a search that returns too many results to
export, you can clone the search and then add a search condition based on a date range to reduce the
number of search results.

Before you begin


You have to be a member of the eDiscovery Manager role group in the Security & Compliance Center to
run the script described in this topic.
The script includes minimal error handling. The primary purpose of the script is to quickly clone a content
search.
The script creates a new Content Search, but doesn't start it.
This script takes into account whether the Content Search that you're cloning is associated with an
eDiscovery case. If the search is associated with a case, the new search will also be associated with the same
case. If the existing search isn't associated with a case, the new search will be listed on the Content search
page in the Security & Compliance Center.
The sample script provided in this topic isn't supported under any Microsoft standard support program or
service. The sample script is provided AS IS without warranty of any kind. Microsoft further disclaims all
implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a
particular purpose. The entire risk arising out of the use or performance of the sample script and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Run the script to clone a search


The script in this step will create a new Content Search by cloning an existing one. When you run this script, you'll
be prompted for the following information:
Your user credentials - The script will use your credentials to connect to the Security & Compliance Center
for your Office 365 organization with Windows PowerShell. As previously stated, you have to be a member
of the eDiscovery Manager role group in the Security & Compliance Center to run the script.
The name of the existing search - This is the Content Search that you want to clone.
The name of the new search that will be created - If you leave this value blank, the script will create a
name for the new search that is based on the name of the search that you're cloning.
To clone a search:
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
CloneSearch.ps1 .
# This PowerShell script clones an existing Content Search in the Office 365 Security &amp; Compliance Center
# Get login credentials from the user
if(!$UserCredential)
{
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $UserCredential -Authentication
Basic -AllowRedirection
if (!$Session)
{
Write-Error "Couldn't create a remote PowerShell session."
return
}
Import-PSSession $Session -AllowClobber -DisableNameChecking
$Host.UI.RawUI.WindowTitle = $UserCredential.UserName + " (Office 365 Security &amp; Compliance Center)"
}
# Ask for the name of the search you want to clone
$searchName = Read-Host 'Enter the name of the search that you want to clone'
# Ask for the name of the new search
$newSearchName = Read-Host 'Enter a name for the new search [leave blank to automatically generate a name]'
$originalSearch = Get-ComplianceSearch $searchName -EA SilentlyContinue
# Make sure we have a valid search before continuing
if(!$originalSearch)
{
Write-Error "Couldn't find search: $searchName"
return
}
$searchNameCounter = 1
# Find a suitable name for the new search
while(!$newSearchName)
{
$newSearchName = $originalSearch.Name + "_" + $searchNameCounter
$tempSearch = Get-ComplianceSearch $newSearchName -EA SilentlyContinue
if ($tempSearch)
{
$newSearchName = $null
$searchNameCounter++
}
}
$caseName
# Determine if the search is part of a case; if so get the case name
if ($originalSearch.CaseId)
{
$searchCase = Get-ComplianceCase $originalSearch.CaseId
$caseName = $searchCase.Name
}
# Need to cast this value as a Boolean the old fashion way
$allowNotFoundExchangeLocationsEnabled = $false
if ($originalSearch.AllowNotFoundExchangeLocationsEnabled)
{
$allowNotFoundExchangeLocationsEnabled = $true
}
$newSearch = New-ComplianceSearch -Name $newSearchName -AllowNotFoundExchangeLocationsEnabled
$allowNotFoundExchangeLocationsEnabled -Case $caseName -ContentMatchQuery $originalSearch.ContentMatchQuery -
Description $originalSearch.Description -ExchangeLocation $originalSearch.ExchangeLocation -
ExchangeLocationExclusion $originalSearch.ExchangeLocationExclusion -Language $originalSearch.Language -
SharePointLocation $originalSearch.SharePointLocation -SharePointLocationExclusion
$originalSearch.SharePointLocationExclusion -PublicFolderLocation $originalSearch.PublicFolderLocation
if ($newSearch)
{
Write-Host $newSearch.Name "was successfully created" -ForegroundColor Yellow
}

2. Open Windows PowerShell and go to the folder where you saved the script.
3. Run the script; for example:
.\CloneSearch.ps1

4. When prompted for your credentials, enter your email address and password, and then click OK.
5. Enter following information when prompted by the script. Type each piece of information and then press
Enter.
The name of the existing search.
The name of the new search.
The script creates the new Content Search, but doesn't start it. This gives you a chance to edit and run the
search in the next step. You can view the properties of the new search by running the Get-
ComplianceSearch cmdlet or by going to the Content search or eDiscovery page in the Security &
Compliance Center, depending on whether or not the new search is associated with a case.

Step 2: Edit and run the cloned search in the Security & Compliance
Center
After the you've run the script to clone an existing Content Search, the next step is to go to the Security &
Compliance Center to edit and run the new search. As previously stated, you can edit a search by changing the
keyword search query and adding or removing search conditions. For more information, see:
Content Search in Office 365
Keyword queries and search conditions for Content Search
eDiscovery cases in the Office 365 Security & Compliance Center
Manage legal investigations in Office 365
10/23/2018 • 6 minutes to read • Edit Online

Organizations have many reasons to respond to a legal case involving certain executives or other employees in
your organization. This might involve quickly finding and retaining for further investigation specific information in
email, documents, instant messaging conversations, and other content locations used by people in their day-to-day
work tasks. You can perform these and many other similar activities by using the eDiscovery case tools in the Office
365 Security & Compliance Center.
Manage legal investigations with eDiscovery cases
Analyze case data using Office 365 Advanced eDiscovery
Want to know how Microsoft manages its eDiscovery investigations? Here's a technical white paper you can
download that explains how we use the same Office 365 search and investigation tools to manage our internal
eDiscovery workflow.

Manage legal investigations with eDiscovery cases


eDiscovery cases let you control who can create, access, and manage eDiscovery cases in your organization. Use
cases to add members and control what types of actions they can perform, place a hold on content locations
relevant to a legal case, and use the Content Search tool to search the locations on hold for content that might be
responsive to your case. Then you can also export and download those results for further investigation by external
reviewers. If your Office 365 organization has an E5 subscription, you can also prepare search results for analysis
in Advanced eDiscovery.
Manage your eDiscovery workflow by creating and using eDiscovery cases for every legal investigation
your organization has to undertake
Assign eDiscovery permissions to control who can create and manage eDiscovery cases in your
organization
Set up compliance boundaries to control the user content locations that eDiscovery managers can search
Search for content in your organization
Prepare case content for Advanced eDiscovery so you can perform analysis using Advanced eDiscovery's
powerful analytic tools, such as optical character recognition, email threading, and predictive coding
Use scripts for advanced scenarios
Like the previous section that listed scripts for content search scenarios, we've also created some Security &
Compliance Center PowerShell scripts to help you manage eDiscovery cases.
Create a eDiscovery hold report that contains information about all holds associated with eDiscovery cases
in your organization
Add mailboxes and OneDrive locations for a list of users to an eDiscovery hold

Analyze case data using Office 365 Advanced eDiscovery


Office 365 Advanced eDiscovery builds on the content search and eDiscovery capabilities described in the previous
sections. After you create an eDiscovery case, place custodian locations on hold, and collect data that might be
responsive to the case, you can then further analyze the data by using the text analytics, machine learning, and the
predictive coding capabilities of Advanced eDiscovery. This can help your organization quickly process thousands
of email messages, documents, and other kinds of data to find those items that are most likely relevant to a specific
case. And, we've unified case management and Advanced eDiscovery so that you can seamlessly manage the same
case within the Security & Compliance Center.

NOTE
To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned an Office 365 E5
license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an Advanced eDiscovery standalone license.
Administrators and compliance officers who are assigned to cases and use Advanced eDiscovery to analyze data don't need
an E5 license.

Get started
The quickest way to get started with Advanced eDiscovery is to create a case and prepare search results in Security
& Compliance Center, load those results in Advanced eDiscovery, and then run Express analysis to analyze that
case data and then export the results for external review.
Get a quick overview of the Advanced eDiscovery workflow
Set up users and cases for Advanced eDiscovery by creating a case, assigning eDiscovery permissions, and
adding case members, all by using the Security & Compliance Center
Prepare and load search data in to the case in Advanced eDiscovery
Load non-Office 365 data in to a case to analyze it in Advanced eDiscovery
Use Express analysis to quickly analyze the data in a case and then easily export the results
Analyze data
After search data is loaded into the case in Advanced eDiscovery, you'll use the Analyze module to start analyzing
it. The first part of the analysis process consists of organizing files into groups of unique files, duplicates, and near-
duplicates (also know as document similarity). Then you'll organize the data again into hierarchically structured
groups of email threads and themes and, optionally, set ignore text filters to exclude certain text from analysis. Then
you'll run the analysis and view the results.
Learn about document similarity to prepare you for analyzing data in Advanced eDiscovery
Set up the options for near-duplicates, themes, and email threading and then run the Analyze module
Set up Ignore Text filters to exclude text and text strings from being analyzed; these filters will also ignore
text when you run Relevance analysis
View the results of the analysis process
Configure advanced settings for the analysis process
Set up Relevance training
Predictive coding (called Relevance) in Advanced eDiscovery lets you train the system on what you're looking for
by letting you to make decisions (about whether something is relevant or not) on a small set of documents.
Learn about setting up Relevance training , tagging files that are relevant to a case, and defining case issues
Define case issues and assign each issue to a user who will train the files
Add imported files to current or new load that will be added to the Relevance training; a load is a new batch
of files that are added to a case and then used for Relevance training
Define highlighted keywords that can be added to the Relevance training; this helps you better identify files
that are relevant to a case
Run the Relevance module
After set up training, you're ready to run the Relevance module and assess the effectiveness of the training settings
This results in a relevance ranking that helps you decide if you need to perform additional training or if you're
ready to start tagging files as relevant to your case.
Learn about the Relevance process and the iterative process of assessment, tagging, tracking, and re-training
based on sample set of files
Learn about assessment , where a expert familiar with the case reviews a set of case files and determines the
effectiveness of the Relevance training
Assess case files to calculate the effectiveness (called richness ) of training settings, and then tag files as
relevant or not relevant to your case; this helps you determine if the current training is sufficient or if you
should adjust the training settings.
Perform the relevance training after assessment is complete, and then once again tag files as relevant or not
relevant to the issues you've defined for the case
Track the Relevance analysis process to determine if Relevance training has achieved your assessment target
(known as a stable training status ) or whether more training is needed; you can also view the Relevance
results for each case issue
Make decisions based on Relevance analysis to determine the size of the resulting set of case files that can
be exported for review
Test the quality of the Relevance analysis to validate the culling decisions made during the Relevance
process
Export results
The final step in analyzing case data in Advanced eDiscovery is to export results of the analysis for external review.
Learn about exporting case data
Export case data
View batch history and export past results
Export report fields
Other Advanced eDiscovery tools
Advanced eDiscovery provides additional tools and capabilities beyond analyzing case data, relevance analysis, and
exporting data.
Run Advanced eDiscovery reports
Define case and tenant settings
Advanced eDiscovery utilities
eDiscovery cases in the Office 365 Security &
Compliance Center
10/29/2018 • 41 minutes to read • Edit Online

You can use eDiscovery cases in the Office 365 Security & Compliance Center to control who can create, access,
and manage eDiscovery cases in your organization. If your organization has an Office 365 E5 subscription, you can
also use eDiscovery cases to analyze search results by using Office 365 Advanced eDiscovery.
An eDiscovery case allows you to add members to a case, control what types of actions that specific case members
can perform, place a hold on content locations relevant to a legal case, and associate multiple Content Searches
with a single case. You can also export the results of any Content Search that is associated with a case or prepare
search results for analysis in Advanced eDiscovery. eDiscovery cases are a good way to limit who has access to
Content Searches and search results for a specific legal case in your organization.
Use the following workflow to set up and use eDiscovery cases in the Security & Compliance Center and Advanced
eDiscovery.
Step 1: Assign eDiscovery permissions to potential case members
Step 2: Create a new case
Step 3: Add members to a case
Step 4: Place content locations on hold
Step 5: Create and run a Content Search associated with a case
Step 6: Export the results of a Content Search associated with a case
Step 7: Prepare search results for Advanced eDiscovery
Step 8: Go to the case in Advanced eDiscovery
(Optional) Step 9: Close a case
(Optional) Step 10: Re-open a closed case
More information

Step 1: Assign eDiscovery permissions to potential case members


The first step is to assign the appropriate eDiscovery-related permissions to people so you can add them to an
eDiscovery case in Step 2. You have to be a member of the Organization Management role group (or be assigned
the Role Management role) in the Office 365 Security & Compliance Center to assign eDiscovery permissions. The
following list describes the eDiscovery-related role groups in the Security & Compliance Center.
Reviewer - This role group has the most restrictive eDiscovery-related permissions. The primary purpose of
this role group is to allow members to view and access case data in Office 365 Advanced eDiscovery.
Members of this group can only see and open the list of the cases on the eDiscovery page in the Security &
Compliance Center that they are members of. After the user accesses a case in the Security & Compliance
Center, they can click Switch to Advanced eDiscovery to access and analyze the case data in Advanced
eDiscovery. They can't create cases, add members to a case, create holds, create searches, preview search
results, export search results, or prepare results for Advanced eDiscovery.
eDiscovery Manager - Members of this role group can create and manage eDiscovery cases. They can add
and remove members, place content locations on hold, create and edit Content Searches associated with a
case, export the results of a Content Search, and prepare search results for analysis in Advanced eDiscovery.
There are two sub-groups in this role group. The difference between these subgroups is based on scope.
eDiscovery Manager - Can view and manage the eDiscovery cases they create or are a member of.
If another eDiscovery Manager creates a case but doesn't add a second eDiscovery Manager as a
member of that case, the second eDiscovery Manager won't be able to view or open the case on the
eDiscovery page in the Security & Compliance Center. eDiscovery Managers can also access their
cases in Advanced eDiscovery to perform analysis tasks.
eDiscovery Administrator - Can perform all case management tasks that an eDiscovery Manager
can do. Additionally, an eDiscovery Administrator can:
View all cases that are listed on the eDiscovery page.
Manage any case in the organization after they add themself as a member of the case.
Access case data in Advanced eDiscovery for any case in the organization.
See the More information section for reasons why you may want an eDiscovery Administrator in
your organization.

IMPORTANT
If a person isn't a member of one of these eDiscovery-related role groups, or isn't a member of a role group that's assigned
the Reviewer role, you can't add them as a member of an eDiscovery case.

For more information about eDiscovery permissions, see Assign eDiscovery permissions in the Office 365 Security
& Compliance Center.
To assign eDiscovery permissions:
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the Security & Compliance Center, click Permissions, and then do one of the following based on the
eDiscovery permissions that you want to assign.
To assign Reviewer permissions, select the Reviewer role group, and then next to Members, click
Edit. Click Choose members, click Edit, click Add, select the user that you want to add to the
Reviewer role group, and then click Add.
To assign eDiscovery Manager permissions, select the eDiscovery Manager role group, and then
next to eDiscovery Manager, click Edit. Click Choose eDiscovery Manager, click Edit, click **
Add **, select the user that you want to add as an eDiscovery Manager, and then click Add.
To assign eDiscovery Administrator permissions, select the eDiscovery Manager role group, and
then next to eDiscovery Administrator, click Edit. Click Choose eDiscovery Administrator, click
Edit, click Add, select the user that you want to add as an eDiscovery Administrator, and then click
Add.
4. After you've added all the users, click Done, click Save to save the changes to the role group, and then click
Close.

Step 2: Create a new case


The next step is to create a new eDiscovery case. You must be a member of the eDiscovery Managers role group to
create eDiscovery cases. As previously explained, after you create a new case in the Security & Compliance Center,
you (and other case members) will be able to access that same case in Advanced eDiscovery if you're organization
has an Office 365 E5 subscription.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the Security & Compliance Center, click Search & investigation > eDiscovery, and then click Create
a case.
4. On the New Case page, give the case a name, type an optional description, and then click Save. Note that
the case name must be unique in your organization.

The new case is displayed in the list of cases on the eDiscovery page. Note that you can hover the cursor
over a case name to display information about the case, including the status of the case ( Active or Closed),
the description of the case (that was created in the previous step), and when the case was changed last and
who changed it.

TIP
After you create a new case, you can rename it anytime. Just click the name of the case on the eDiscovery page. On
the Manage this case flyout page, change the name displayed in the box under Name, and then save the change.

Step 3: Add members to a case


After you create a new case, the next step is to add members to the case. As previous explained, only users who are
members of the Reviewer or eDiscovery Manager role groups can be added as members of the case. Note that the
eDiscovery Manager who created the case is automatically added as a member.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to add members to.
The Manage this case flyout page is displayed.
3. Under Manage members, click Add to add members to the case.
You can also choose to add a role group to the case. Under Manage role groups, click Add.

NOTE
Role groups control who can assign members to an eDiscovery case. That means you can only assign the role groups
that you are a member of to a case.

4. In the list of people or role groups that can be added as members of the case, click the check box next to the
names of the people or role groups that you want to add.
TIP
If you have a large list of people who can added as members, use the Search box to search for a specific person in the
list.

5. After you've selected the people or role groups to add as members of the group, click Add.
In Manage this case, click Save to save the new list of case members.
6. Click Save to save the new list of case members.

Step 4: Place content locations on hold


You can use an eDiscovery case to create holds to preserve content that might be relevant to the case. You can place
a hold on the mailboxes and OneDrive for Business sites of people who are custodians in the case. You can also
place a hold on the group mailbox, SharePoint site, and OneDrive for Business site for an Office 365 Group.
Similarly, you can place a hold on the mailbox and site that are associated with Microsoft Teams. When you place
content locations on hold, content is held until you remove the hold from the content location or until you delete
the hold.
When you create a hold, you have the following options to scope the content that is held in the specified content
locations:
You create an infinite hold where all content is placed on hold. Alternatively, you can create a query-based
hold where only content that matches a search query is placed on hold.
You can specify a date range to hold only the content that was sent, received, or created within that date
range. Alternatively, you can hold all content regardless of when it was sent, received, or created.

NOTE
You can have a maximum of 10,000 hold policies across all eDiscovery cases in your organization.

To create a hold for an eDiscovery case:


1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to create the holds in.
3. On the Home page for the case, click the Hold tab.

4. On the Hold page, click Create.


5. On the Name your hold page, give the hold a name. The name of the hold must be unique in your
organization.
6. (Optional) In the Description box, add a description of the hold.
7. Click Next.
8. Choose the content locations that you want to place on hold. You can place mailboxes, sites, and public
folders on hold.

a. Exchange email - Click Choose users, groups, or teams and then click Choose users, groups, or
teams again. to specify mailboxes to place on hold. Use the search box to find user mailboxes and
distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also place
a hold on the associated mailbox for an Office 365 Group or a Microsoft Team. Select the user, group, team
check box, click Choose, and then click Done.

NOTE
When you click Choose users, groups, or teams to specify mailboxes to place on hold, the mailbox picker that's
displayed is empty. This is by design to enhance performance. To add people to this list, type a name (a minimum of 3
characters) in the search box.

b. SharePoint Sites - Click Choose sites and then click Choose sites again to specify SharePoint and
OneDrive for Business sites to place on hold. Type the URL for each site that you want to place on hold. You
can also add the URL for the SharePoint site for an Office 365 Group or a Microsoft Team. Click Choose,
and then click Done.
See the More information section for tips on putting Office 365 Groups and Microsoft Teams on hold.

NOTE
In the rare case that a person's user principal name (UPN) is changed, the URL for their OneDrive account will also be
changed to incorporate the new UPN. If this happens, you'll have to modify the hold by adding the user's new
OneDrive URL and removing the old one.

c. Exchange public folders - Move the toggle switch to the All position to put all public folders in
your Exchange Online organization on hold. Note that you can't choose specific public folders to put on hold.
Leave the toggle switch set to None if you don't want to put a hold on public folders.
9. When you're done adding content locations to the hold, click Next.
10. To create a query-based hold with conditions, complete the following. Otherwise, just click Next

a. In the box under Keywords, type a search query in the box so that only the content that meets the search
criteria is placed on hold. You can specify keywords, message properties, or document properties, such as file
names. You can also use more complex queries that use a Boolean operator, such as AND, OR, or NOT. If
you leave the keyword box empty, then all content located in the specified content locations will be placed on
hold.
b. Click Add conditions to add one or more conditions to narrow the search query for the hold. Each
condition adds a clause to the KQL search query that is created and run when you create the hold. For
example you can specify a date range so that email or site documents that were created within the date
ranged are placed on hold. A condition is logically connected to the keyword query (specified in the keyword
box) by the AND operator. That means that items have to satisfy both the keyword query and the condition
to be placed on hold.
For more information about creating a search query and using conditions, see Keyword queries and search
conditions for Content Search.
11. After configuring a query-based hold, click Next.
12. Review your settings, and then click Create this hold.
Hold statistics
After a while, information about the new hold is displayed in the details pane on the Holds page for the selected
hold. This information includes the number of mailboxes and sites on hold and statistics about the content that was
placed on hold, such as the total number and size of items placed on hold and the last time the hold statistics were
calculated. These hold statistics help you identify how much content that's related to the eDiscovery case is being
held.
Keep the following things in mind about hold statistics:
The total number of items on hold indicates the number of items from all content sources that are placed on
hold. If you've created a query-based hold, this statistic indicates the number of items that match the query.
The number of items on hold also includes unindexed items found in the content locations. Note that if you
create a query-based hold, all unindexed items in the content locations are placed on hold. This includes
unindexed items that don't match the search criteria of a query-based hold and unindexed items that might
fall outside of a date range condition. This is different than what happens when you run a Content Search, in
which unindexed items that don't match the search query or are excluded by a date range condition aren't
included in the search results. For more information about unindexed items, see Partially indexed items in
Content Search in Office 365.
You can get the latest hold statistics by clicking Update statistics to re-run a search estimate that calculates
the current number of items on hold. If necessary, click Refresh in the toolbar to update the hold statistics
in the details pane.
It's normal for the number of items on hold to increase over time because users whose mailbox or site is on
hold are typically sending or receiving new email message and creating new SharePoint and OneDrive for
Business documents.

NOTE
If a SharePoint site or OneDrive account is moved to a different region in a multi-geo environment, the statistics for that site
won't be included in the hold statistics. However, the content in the site will still be on hold. Also, if a site is moved to a
different region the URL that's displayed in the hold will not be updated. You'll have to edit the hold and update the URL.

Step 5: Create and run a Content Search associated with a case


After an eDiscovery case is created and any custodians related to the case are placed on hold, you can create and
run one or more Content Searches that are associated with the case. Content Searches associated with a case aren't
listed on the Search page in the Security & Compliance Center. This means that Content Searches associated with
a case can only be accessed by case members who are also members of the eDiscovery Manager role group.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to create a Content Search in.
3. On the Home page for the case, click the Search tab.

4. On the Search page, click New search.


5. On the New search page, you can add keywords and conditions to create the search query.

6. You can specify keywords, message properties, such as sent and received dates, or document properties,
such as file names or the date that a document was last changed. You can use more complex queries that use
a Boolean operator, such as AND, OR, NOT, NEAR, or ONEAR. You can also search for sensitive
information (such as social security numbers) in documents, or search for documents that have been shared
externally. If you leave the keyword box empty, all content located in the specified content locations will be
included in the search results.
7. You can click the Show keyword list check box and the type a keyword in each row. If you do this, the
keywords on each row are connected by the OR operator in the search query that's created.
Why use the keyword list? You can get statistics that show how many items match each keyword. This can
help you quickly identify which keywords are the most (and least) effective. You can also use a keyword
phrase (surrounded by parentheses) in a row. For more information about search statistics, see View
keyword statistics for Content Search results.
For more information about using the keywords list, see Building a search query.
8. Under Conditions, add conditions to a search query to narrow a search and return a more refined set of
results. Each condition adds a clause to the KQL search query that is created and run when you start the
search. A condition is logically connected to the keyword query (specified in the keyword box) by the AND
operator. That means that items have to satisfy both the keyword query and the condition to be included in
the results. This is how conditions help to narrow your results.
For more information about creating a search query and using conditions, see Keyword queries for Content
Search.
9. Under Locations: locations on hold, choose the content locations that you want to search. You can search
mailboxes, sites, and public folders in the same search.

All locations - Select this option to search all content locations in your organization. When you select this
option, you can choose to search all Exchange mailboxes (which includes the mailboxes for all Office 365
Groups and Microsoft Teams), all SharePoint and OneDrive for Business sites (which includes the sites for all
Office 365 Groups and Microsoft Teams), and all public folders.
All locations on hold - Select this option to search all the content locations that have been placed on hold
in the case. If the case contains multiple holds, the content locations from all holds will be searched when
you select this option. Additionally, if a content location was placed on a query-based hold, only the items
that are on hold will be searched when you run the content search that you're creating in this step. For
example, if a user was placed on query-based case hold that preserves items that were sent or created before
a specific date, only those items would be searched by using the search criteria of the content search. This is
accomplished by connecting the case hold query and the content search query by an AND operator. See the
More information section at the end of this article for more details about searching case content.
Specific locations - Select this option to select the mailboxes and sites that you want to search. When you
select this option and click Modify, a list of locations appears. You can choose to search any or all users,
groups, teams, or site locations.

You can also choose to search all public folders in your organization, but if you select this option and search
any content location that's on hold, any query from a query-based case hold won't be applied to the search
query. In other words, all content in a location is searched, not just the content that is preserved by a query-
based case hold.
You can remove the pre-populated case content locations or add new ones. If you choose this option, you
also have flexibility to search all content locations for a specific service (such as searching all Exchange
mailboxes) or you can search specific content locations for a service. You can also choose whether or not to
search the public folders in your organization.
Keep these things in mind when adding content locations to search:
When you click Choose users, groups, or teams to specify mailboxes to search, the mailbox picker that's
displayed is empty. This is by design to enhance performance. To add recipients to this list, click Choose
users, groups, or teams, type a name (a minimum of 3 characters) in the search box, select the check box
next to the name, and then click Choose.
You can add inactive mailboxes, Office 365 Groups, Microsoft Teams, and distribution groups to the list of
mailboxes to search. Dynamic distribution groups aren't supported. If you add Office 365 Groups or
Microsoft Teams, the group or team mailbox is searched; the mailboxes of the group members aren't
searched.
To add sites click Choose sites, click Choose sites again, and then type the URL for each site that you want
to search. You can also add the URL for the SharePoint site for Office 365 Groups and Microsoft Teams.
7. After you select the content locations to search, click Done and then click Save.
8. On the New search page, click Save and then type a name for the search. Content Searches associated with
a case must have names that are unique within your Office 365 organization.
9. Click Save & run to save the search settings.
10. Enter a unique name for the search, and click Save to start the search.
The search begins. After a while, an estimate of the search results is displayed in the details pane. The
estimate includes the total size and number of items that matched the search criteria. The search estimate
also includes the number of unindexed items in the content locations that were searched. The number of
unindexed items that don't meet the search criteria will be included in the search statistics displayed in the
details pane. If an unindexed item matches the search query (because other message or document
properties meet the search criteria), it won't be included in the estimated number of unindexed items. If an
unindexed item is excluded by the search criteria, it also won't be included in the estimate of unindexed
items.
After the search is completed, you can preview the search results. If necessary, click Refresh to update the
information in the details pane.

Step 6: Export the results of a Content Search associated with a case


After a search is successfully run, you can export the search results. When you export search results, mailbox items
are downloaded in PST files or as individual messages. When you export content from SharePoint and OneDrive
for Business sites, copies of native Office documents and other documents are exported. A manifest file (in XML
format) that contains information about every search result is also exported.
You can export the results of a Export the results of a single search associated with a case or you can export the
results of Export the results of multiple searches associated with a case.
Export the results of a single search associated with a case
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to export search from.
3. On the Home page for the case, click Search.
4. In the list of searches for the case, click the search that you want to export search results from, click More,
and then select Export results from the drop-down list.
The Export results page is displayed.
The workflow to export the results from a Content Search associated with a case is that same as exporting
the search results for a search on the Content search page. For step-by-step instructions, see Export
Content Search results from the Office 365 Security & Compliance Center.

NOTE
When you export search results, you have the option to enable de-duplication so that only one copy of an email
message is exported even though multiple instances of the same message might have been found in the mailboxes
that were searched. For more information about de-duplication and how duplicate items are identified, see De-
duplication in eDiscovery search results.

5. Click the Export tab to display the list of export jobs that exist for that case.
You might have to click Refresh to update the list of export jobs so that it shows the export job that you
just created. Note that export jobs have the same name as the corresponding Content Search with _Export
appended to the end of search name.
6. Click the export job that you just created to display status information in the details pane. This information
includes the percentage of items that have been transferred to an Azure storage area in the Microsoft cloud.
After all items have been transferred, click Download results to download the search results to your local
computer. For more information, see Step 2 in Export Content Search results from the Office 365 Security &
Compliance Center
Export the results of multiple searches associated with a case
As an alternative to exporting the results of a single Content Search associated with a case, you can export the
results of multiple searches from the same case in a single export. Exporting the results of multiple searches is
faster and easier than exporting the results one search at a time.

NOTE
You can't export the results of multiple searches if one of those searches was configured to search all case content. only
export the results of multiple searches for searches that are associated with an eDiscovery case. You can't export the results of
multiple searches listed on the Content search page in the Security & Compliance Center.

1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to export search results from.
3. On the Home page for the case, click Search.
4. In the list of searches for the case, select two or more searches that you want to export search results from.

NOTE
To select multiple searches, press Ctrl as you click each search. Or you can select multiple adjacent searches by clicking
the first search, holding down the Shift key, and then clicking the last search.

5. After you select the searches, the Bulk actions page appears.
6. Click Export results.
7. On the Export results page, give the export a unique name, select output options, and choose how your
content will be exported. Click Export.
The workflow to export the results from multiple content searches associated with a case is the same as
exporting the search results for a single search. For step-by-step instructions, see Export Content Search
results from the Office 365 Security & Compliance Center.

NOTE
When you export search results from multiple searches associated with a case, you also have the option to enable de-
duplication so that only one copy of an email message is exported even though multiple instances of the same
message might have been found in the mailboxes that were searched in one or more of the searches. For more
information about de-duplication and how duplicate items are identified, see De-duplication in eDiscovery search
results.

8. After you start the export, click the Export tab to display the list of export jobs for that case.

You might have to click Refresh to update the list of export jobs to display the export job that you just
created. Note that the searches that were included in the export job are listed in the Searches column.
9. Click the export job that you just created to display status information in the details pane. This information
includes the percentage of items that have been transferred to an Azure storage area in the Microsoft cloud.
10. After all items have been transferred, click Download results to download the search results to your local
computer. For more information, see Step 2 in Export search results from the Office 365 Security &
Compliance Center
More information about exporting the results of multiple searches
When you export the results of multiple searches, the search queries from all the searches are combined by
using OR operators, and then the combined search is started. The estimated results of the combined search
are displayed in the details pane of the selected export job. The search results are then transferred to the
Azure storage area in the Microsoft cloud. The status of the transfer is also displayed in the details pane. As
previously stated, after all the search results have been transferred, you can download them to your local
computer.
The maximum number of keywords from the search queries for all searches that you want to export is 500.
(this is the same limit for a single Content Search). That's because the export job combines all the search
queries by using the OR operator. If you exceed this limit, an error will be returned. In this case, you'll have to
export the results from fewer searches or simplify the search queries of the searches that you want to export.
The search results that are exported are organized by the content source the item was found in. That means
a content source in the export results might have items returned by different searches. For example, if you
chose to export email messages in one PST file for each mailbox, the PST file might have results from
multiple searches.
If the same email item or document from the same content location is returned by more than one of the
searches that you export, only one copy of the item will be exported.
You can't edit an export for multiple searches after you create it. For example, you can't add or remove
searches from the export. You'll have to create a new export job to change which search results are exported.
After a export job is created, you only can download the results to a computer, restart the export, or delete
the export job.
If you restart the export, any changes to the queries of the searches that make up the export job won't affect
the search results that will be retrieved. When you restart an export, the same combined search query job
that was run when the export job was created will be run again.
If you restart an export from the Exports page in an eDiscovery case, the search results that are transferred
to the Azure storage area will overwrite the previous results; the previous results there were transferred
won't be available to be downloaded.
Preparing the results of multiple searches for analysis in Advanced eDiscovery isn't available. You can only
prepare the results of a single search for analysis in Advanced eDiscovery.

Step 7: Prepare search results for Advanced eDiscovery


If your organization has an Office 365 E5 subscription, you can prepare the results of Content Searches associated
with a case for analysis in Advanced eDiscovery. After you prepare search results, you can go to Advanced
eDiscovery (see Step 8: Go to the case in Advanced eDiscovery) and process the search result data for further
analysis in Advanced eDiscovery.
When you prepare search results for Advanced eDiscovery, optical character recognition (OCR ) functionality
automatically extracts text from images. OCR is supported for loose files, email attachments, and embedded
images. This allows you to apply the text analytic capabilities of Advanced eDiscovery (near-duplicates, email
threading, themes, and predictive coding) to any text in image files.

NOTE
To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned an Office 365 E5
license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an Advanced eDiscovery standalone license.
Administrators and compliance officers who are assigned to cases and use Advanced eDiscovery to analyze data don't need
an E5 license.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to prepare search results for analysis in Advanced eDiscovery.
3. On the Home page for the case, click Search, and then select the search.
4. In the details pane, click More, and then click Prepare for Advanced eDiscovery.

5. On the Prepare for Advanced eDiscovery page, choose to prepare one of the following:
All items, excluding those with unrecognized format, are encrypted, or weren't indexed for other
reasons.
All items, including those that have unrecognized format, are encrypted, or weren't indexed for other
reasons.
Only items that have an unrecognizable format, are encrypted, or weren't indexed for other reasons.
6. (Optional) Click the Include versions for SharePoint files check box.
7. Click Prepare.
The search results are prepared for analysis with Advanced eDiscovery.
8. Click Close to close the details pane.

Step 8: Go to the case in Advanced eDiscovery


After you create a case in the Security & Compliance Center, you can go to the same case in Advanced eDiscovery.
To go to a case in Advanced eDiscovery:
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to go to in Advanced eDiscovery.
3. On the Home page for the case, click Switch to Advanced eDiscovery.

The Connecting to Advanced eDiscovery progress bar is displayed. When you're connected to Advanced
eDiscovery, a list of containers is displayed on the page.

These containers represent the search results that you prepared for analysis in Advanced eDiscovery in Step
7. Note that the name of the container has the same name as Content Search in the case in the Security &
Compliance Center. The containers in the list are the ones that you prepared. If a different user prepared
search results for Advanced eDiscovery, the corresponding containers won't be included in the list.
4. To load the search result data from a container to the case in Advanced eDiscovery, select a container and
click Process.
For information about how to process containers, see Run the Process module and load data in Office 365
Advanced eDiscovery.

TIP
Click Switch to eDiscovery to go back to the same case in the Security & Compliance Center.

(Optional) Step 9: Close a case


When the legal case or investigation supported by an eDiscovery case is completed, you can close the case. Here's
what happens when you close a case:
If the case contains any content locations on hold, those holds will be turned off. This might result in content
being permanently deleted or purged, either by the user or by an automated process, such as a deletion
policy.
Closing a case only turns off the holds that are associated with that case. If other holds are place on a content
location (such as a Litigation Hold. a Preservation Policy, or a hold from a different eDiscovery case) those
holds will still be maintained.
The case is still listed on the eDiscovery page in the Security & Compliance Center. The details, holds,
searches, and members of a closed case are retained.
You can edit a case after it's closed. For example, you can add or removing members, create searches, export
search results, and prepare search result for analysis in Advanced eDiscovery. The primary difference
between active and closed cases is that holds are turned off when a case is closed.
To close a case:
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to close.
The Manage this case flyout page is displayed.
3. Under Manage case status, click Close case.
A warning is displayed saying that the holds associated with the case will be turned off.
4. Click Yes to close the case.
The status on the Manage this case flyout page is changed from Active to Closing.
5. Close the Manage this case page.
6. On the eDiscovery page, click Refresh to update the status of the closed case. It might take up to 60
minutes for the closing process to complete.
When the process is complete, the status of the case is changed to Closed on the eDiscovery page. Click
the name of the case again to display the Manage this case flyout page, which contains information about
when the case was closed and who closed it.

(Optional) Step 10: Re-open a closed case


When you reopen a case, any holds that were in place when the case was closed won't be automatically reinstated.
After the case is reopened, you'll have to go to the Hold page and turn on the previous holds. To turn a hold on,
select it and click Turn it on in the details pane.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to reopen.
The Manage this case flyout page is displayed.
3. Under Manage case status, click Reopen case.
A warning is displayed saying that the holds that were associated with the case when it was closed won't be
turned on automatically.
4. Click Yes to reopen the case.
The status on the Manage this case flyout page is changed from Closed to Active.
5. Close the Manage this case page.
6. On the eDiscovery page, click Refresh to update the status of the reopened case. It might take up to 60
minutes for the reopening process to complete.
When the process is complete, the status of the case is changed to Active on the eDiscovery page.

More information
Are there any limits for eDiscovery cases or holds associated with an eDiscovery case? The
following table lists the limits for eDiscovery cases and case holds.

DESCRIPTION OF LIMIT LIMIT

Maximum number of cases for an organization No limit

Maximum number of case holds for an organization 10,000

Maximum number of mailboxes in a single case hold 1,000

Maximum number of SharePoint and OneDrive for 100


Business sites in a single case hold

What about cases that were created on the case management page in Advanced eDiscovery? You
can access a list of older Advanced eDiscovery cases by clicking the link at the bottom on the eDiscovery
page in the Security & Compliance Center. However, to do any work in an older case, you have to contact
Office 365 Support and request that the case be moved to a new eDiscovery case in the Security &
Compliance Center.
Why create an eDiscovery Administrator? As previously explained, an eDiscovery Administrator is
member of the eDiscovery Manager role group who can view and access all eDiscovery cases in your
organization. This ability to access all the eDiscovery cases has two important purposes:
If a person who is the only member of an eDiscovery case leaves your organization, no one (including
members of the Organization Management role group or another member of the eDiscovery
Manager role group) can access that eDiscovery case because they aren't a member of a case. In this
situation, there would be no way to access the data in the case. But because an eDiscovery
Administrator can access all eDiscovery cases in the organization, they can view the case in the
Security & Compliance Center and add themselves or another eDiscovery manager as a member of
the case.
Because an eDiscovery Administrator can view and access all eDiscovery cases, they can audit and
oversee all cases and associated Content Searches. This can help to prevent any misuse of Content
Searches or eDiscovery cases. And because eDiscovery Administrators can access potentially
sensitive information in the results of a Content Search, you should limit the number of people who
are eDiscovery Administrators.
Finally, as previous explained, eDiscovery Administrators in the Security & Compliance Center are
automatically added as administrators in Advanced eDiscovery. That means a person who is an
eDiscovery Administrator can perform administrative tasks in Advanced eDiscovery, such as setting
up users, creating cases, and adding data to cases.
What are the licensing requirements to place content locations on hold? In general, organizations
require an Office 365 E3 subscription or higher to place content locations on hold. To place mailboxes on
hold, an Exchange Online Plan 2 license is required.
What else should you know about searching all case content in Step 5? As previously explained, you
can search the content locations that have been placed on hold in the case. When you do this, only the
content that matches the hold criteria is search. If there is no hold criteria, all content is searched. If contents
are on a query-based hold, only the content that matches both hold criteria (from the hold placed in Step 4)
and the search criteria (from the search in Step 5) is returned with the search results.
Here are some other things to keep in mind when searching all case content:
If a content location is part of multiple holds within the same case, the hold queries are combined by
an OR operator when you search that content location using the all case content option. Similarly, if a
content location is part of two different holds, where one is query-based and the other is an infinite
hold (where all content is placed on hold), then all content will be search because of the infinite hold.
If a content search is for a case and you've configured it to search all case content and then you
change a hold (by adding or removing a content location or changing the hold query), the search
configuration is updated with those changes. However, you have to re-run the search after the hold is
changed to update the search results.
If multiple case holds are placed on a content location in an eDiscovery case and you select to search
all case content, the maximum number of keywords for that search query is 500. That's because the
content search combines all the query-based holds by using the OR operator. If there are more than
500 keywords in the combined hold queries and the content search query, then all content in the
mailbox is searched, not just that content that matches the any of query-based case holds.
If a case hold has a status of Turning on, you can still search the case content locations while the hold
is being turned on.
As previously stated, if a search is configured to search all case content, then you can't include that
search if you want to export the results of multiple searches. If a search is configured to search all case
content, then you'll have to export the results of that single search.
If a mailbox, SharePoint site, or OneDrive account that is on hold is moved to a different region in
a multi-geo environment, will the hold still apply? In all cases, the content in a mailbox, site, or
OneDrive account will still be retained. However, the hold statistics will no longer include items from a
content location that's been moved to a different region. To include hold statistics for a content location that's
been moved, you'll have to edit the hold and update the URL (or SMTP address of a mailbox) so that the
content location is once again included in the hold statistics.
What about placing a hold on Office 365 Groups and Microsoft Teams? Microsoft Teams are built on
Office 365 Groups. Therefore, placing them on hold in an eDiscovery case is very similar. Keep the following
things in mind when placing Office 365 Groups and Microsoft Teams on hold.
To place content located in Office 365 Groups and Microsoft Teams on hold, you have to specify the
mailbox and SharePoint site that associated with a group or team.
Run the Get-UnifiedGroup cmdlet in Exchange Online to view properties for an Office 365 Group
or Microsoft Team. This is a good way to get the URL for the site that's associated with an Office 365
Group or a Microsoft Team. For example, the following command displays selected properties for an
Office 365 Group named Senior Leadership Team:

Get-UnifiedGroup "Senior Leadership Team" | FL


DisplayName,Alias,PrimarySmtpAddress,SharePointSiteUrl

DisplayName : Senior Leadership Team


Alias : seniorleadershipteam
PrimarySmtpAddress : seniorleadershipteam@contoso.onmicrosoft.com
SharePointSiteUrl : https://contoso.sharepoint.com/sites/seniorleadershipteam

NOTE
To run the Get-UnifiedGroup cmdlet, you have to be assigned the View-Only Recipients role in Exchange
Online or be a member of a role group that's assigned the View-Only Recipients role.

When a user's mailbox is searched, any Office 365 Group or Microsoft Team that the user is a
member of won't be searched. Similarly, when you place an Office 365 Group or Microsoft Team
hold, only the group mailbox and group site are placed on hold; the mailboxes and OneDrive for
Business sites of group members aren't placed on hold unless you explicitly add them to the hold.
Therefore, if you the need to place an Office 365 Group or Microsoft Team on hold for a legal reasons,
consider adding the mailboxes and OneDrive for Business sites for group and team members on the
same hold.
To get a list of the members of a Office 365 Group or Microsoft Team, you can view the properties on
the Home > Groups page in the Office 365 admin center. Alternatively, you can run the following
command in Exchange Online PowerShell:

Get-UnifiedGroupLinks <group or team name> -LinkType Members | FL DisplayName,PrimarySmtpAddress

NOTE
To run the Get-UnifiedGroupLinks cmdlet, you have to be assigned the View-Only Recipients role in
Exchange Online or be a member of a role group that's assigned the View-Only Recipients role.

Conversations that are part of a Microsoft Teams channel are stored in the mailbox that's associated
with the Microsoft Team. Similarly, files that team members share in a channel are stored on the
team's SharePoint site. Therefore, you have to place the Microsoft Team mailbox and SharePoint site
on hold to retain conversations and files in a channel.
Alternatively, conversations that are part of the Chat list in Microsoft Teams are stored in the mailbox
of the user's who participate in the chat. And files that a user shares in Chat conversations are stored
in the OneDrive for Business site of the user who shares the file. Therefore, you have to place the
individual user mailboxes and OneDrive for Business sites on hold to retain conversations and files in
the Chat list. That's why it's a good idea to place a hold on the mailboxes of members of a Microsoft
Team in addition to placing the team mailbox (and site) on hold.

IMPORTANT
Users who participate in conversations that are part of the Chat list in Microsoft Teams must have an
Exchange Online (cloud-based) mailbox in order to retain chat conversations when the mailbox is placed on an
eDiscovery hold. That's because conversations that are part of the Chat list are stored in the cloud-based
mailboxes of the chat participants. If a chat participant doesn't have an Exchange Online mailbox, you won't be
able to retain chat conversations. For example, in an Exchange hybrid deployment, users with an on-premises
mailbox might be able to participate in conversations that are part of the Chat list in Microsoft Teams.
However in this case, content from these conversation can't be retained because the users don't have cloud-
based mailboxes.

Every Microsoft Team or team channel contains a Wiki for note-taking and collaboration. The Wiki
content is automatically saved to a file with a .mht format. This file is stored in the Teams Wiki Data
document library on the team's SharePoint site. You can place the content in the Wiki on hold by
placing the team's SharePoint site on hold.

NOTE
The capability to retain Wiki content for a Microsoft Team or team channel (when you place the team's
SharePoint site on hold) was released on June 22, 2017. If a team site is on hold, the Wiki content will be
retained starting on that date. However, if a team site is on hold and the Wiki content was deleted before June
22, 2017, the Wiki content was not retained.
How do I find the URL for OneDrive for Business sites? To collect a list of the URLs for the OneDrive
for Business sites in your organization so you can add them to a hold or search associated with an
eDiscovery case, see Create a list of all OneDrive locations in your organization. This script in this article
creates a text file that contains a list of all OneDrive sites. To run this script, you'll have to install and use the
SharePoint Online Management Shell. Be sure to append the URL for your organization's MySite domain to
each OneDrive site that you want to search. This is the domain that contains all your OneDrive; for example,
https://contoso-my.sharepoint.com . Here's an example of a URL for a user's OneDrive site:
https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft.com .
Assign eDiscovery permissions in the Office 365
Security & Compliance Center
10/29/2018 • 9 minutes to read • Edit Online

If you want people to use any of the eDiscovery-related tools in the Office 365 Security & Compliance Center,
you have to assign them the appropriate permissions. The easiest way to do this is to add the person the
appropriate role group on the Permissions page in the Office 365 Security & Compliance Center. This topic
describes the permissions required to perform eDiscovery-related tasks using the Security & Compliance
Center.
The primary eDiscovery-related role group in Security & Compliance Center is called eDiscovery Manager.
There are two subgroups within this role group.
eDiscovery Managers - An eDiscovery Manager can use the Content Search tool in the Security &
Compliance Center to search content locations in the organization, and perform various search-related
actions such as preview and export search results. Members can also create and manage eDiscovery
cases, add and remove members to a case, create case holds, and run Content Searches associated with a
case, and access case data in Office 365 Advanced eDiscovery. An eDiscovery Managers can only access
and manage the cases they create. They can't access or manage cases created by other eDiscovery
Managers.
eDiscovery Administrators - An eDiscovery Administrator is a member of the eDiscovery Manager
role group, and can perform the same Content Search and case management-related tasks that an
eDiscovery Manager can perform. Additionally, an eDiscovery Administrator can:
Access all cases that are listed on the eDiscovery cases page in the Security & Compliance
Center.
Access case data in Advanced eDiscovery for any case in the organization.
Manage any eDiscovery case after they add themself as a member of the case.
See the More information section for reasons why you might want eDiscovery Administrators in your
organization.

NOTE
To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned an Office 365
E5 license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an Advanced eDiscovery standalone
license. Administrators and compliance officers who are assigned to cases and use Advanced eDiscovery to analyze data
don't need an E5 license.

Before you begin


You have to be a member of the Organization Management role group (or be assigned the Role
Management role) to assign eDiscovery permissions in the Security & Compliance Center.
You can use the Add-RoleGroupMember cmdlet in Security & Compliance Center PowerShell to add a
mail-enabled security group as a member of the eDiscovery Managers subgroup in the eDiscovery
Manager role group. However, you can't add a mail-enabled security group to the eDiscovery
Administrators subgroup. See the More information section for more details.
Assign eDiscovery permissions in the Security & Compliance Center
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Permissions, and then click the checkbox next
to eDiscovery Manager.
4. On the eDiscovery Manager flyout page, do one of the following based on the eDiscovery permissions
that you want to assign.
To make a user an eDiscovery Manager Next to eDiscovery Manager, click Edit. Under Selected
eDiscovery Managers, click Edit, and then click Add. Select the user (or users) you want to add as an
eDiscovery manager, and then click Add. When you're finished adding users, click Done. Then, on the
Editing Choose eDiscovery Manager flyout page, click Save to save the changes to the eDiscovery
Manager membership.
To make a user an eDiscovery Administrator Next to eDiscovery Administrator, click Edit. Under
Selected eDiscovery Administrators, click Edit, and then click Add. Select the user (or users) you
want to add as an eDiscovery Administrator, and then click Add. When you're finished adding users, click
Done. Then, on the Editing Choose eDiscovery Administrator flyout page, click Save to save the
changes to the eDiscovery Administrator membership.

NOTE
You can also use the Add-eDiscoveryCaseAdmin cmdlet to make a user an eDiscovery Administrator. However, the
user must be assigned the Case Management role before you can use this cmdlet to make them an eDiscovery
Administrator. For more information, see Add-eDiscoveryCaseAdmin.

On the Permissions page in the Security & Compliance Center, you can also assign users eDiscovery-related
permissions, by adding them to the Compliance Administrator, Organization Management, and Reviewer role
groups. For a description of the eDiscovery-related RBAC roles assigned to each of these role groups, see the
next section RBAC roles related to eDiscovery.

RBAC roles related to eDiscovery


The following table describes the eDiscovery-related RBAC roles in the Security & Compliance Center, and
indicates the built-in role groups that each role is assigned to by default.
EDISCOVERY
COMPLIANCE MANAGER & ORGANIZATION
ROLE ADMINISTRATOR ADMINISTRATOR MANAGEMENT REVIEWER

Case Management
Lets users create,
edit, delete, and
control access to
eDiscovery cases in
the Security &
Compliance Center.
For more
information, see
Manage eDiscovery
cases in the Office
365 Security &
Compliance Center.
As previously
explained, a user
must be assigned the
Case Management
role before you can
use the Add-
eDiscoveryCaseAd
min cmdlet to make
them an eDiscovery
Administrator.

Compliance Search
Lets users run the
Content Search tool
in the Security &
Compliance Center
to search mailboxes
and public folders,
SharePoint Online
sites, OneDrive for
Business sites, Skype
for Business
conversations, Office
365 Groups, and
Microsoft Teams. This
role allows a user to
get an estimate of
the search results
and create export
reports, but
additional roles are
needed to initiate
content search
actions such as
previewing,
exporting, or deleting
search results.

Note that users


assigned the
Compliance Search
role but don't have
the Preview role can
preview the results of
a search in which the
preview action has
been initiated by a
user that's assigned
EDISCOVERY
the Preview role. The COMPLIANCE MANAGER & ORGANIZATION
user
ROLE without the ADMINISTRATOR ADMINISTRATOR MANAGEMENT REVIEWER
Preview role can
preview results for up
to 2 weeks after the
initial preview action
was created.

Similarly, users
assigned the
Compliance Search
role but don't have
the Export role can
download the results
of a search in which
the export action has
initiated by a user
that's assigned the
Export role. The user
without the Export
role can download
the results of a
search for up to 2
weeks after the initial
export action was
created. After that
they won’t be able to
download the results
unless someone with
the Export role
restarts the export.

For more
information, see
Content Search in
Office 365.

Export
Lets users export the
results of a Content
Search to a local
computer. It also lets
them prepare search
results for analysis in
Advanced
eDiscovery.
For more information
about exporting
search results, see
Export search results
from the Office 365
Security &
Compliance Center.
EDISCOVERY
COMPLIANCE MANAGER & ORGANIZATION
ROLE ADMINISTRATOR ADMINISTRATOR MANAGEMENT REVIEWER

Hold
Lets users place
content in mailboxes,
public folders, sites,
Skype for Business
conversations, and
Office 365 groups on
hold. When content
is on hold, content
owners will still be
able to modify or
delete the original
content, but the
content will be
preserved until the
hold is removed or
until the hold
duration expires.
For more information
about holds, see:

• Manage eDiscovery
cases in the Office
365 Security &
Compliance Center
• Overview of
retention policies

Preview
Lets users view a list
of items that were
returned from a
Content Search.
They'll also be able to
open and view each
item from the list to
view its contents.
EDISCOVERY
COMPLIANCE MANAGER & ORGANIZATION
ROLE ADMINISTRATOR ADMINISTRATOR MANAGEMENT REVIEWER

Review
Lets users access
case data in Office
365 Advanced
eDiscovery. The
primary purpose of
this role is to give
users access to
Advanced
eDiscovery. Users
who are assigned this
role can see and
open the list of cases
on the eDiscovery
page in the Security
& Compliance Center
that they are
members of. After
the user accesses a
case in the Security &
Compliance Center,
they can click Switch
to Advanced
eDiscovery to
access and analyze
the case data in
Advanced
eDiscovery. This role
doesn't allow the
user to preview the
results of a content
search that's
associated with the
case or to perform
other content search
or case management
tasks.

RMS Decrypt
Lets users decrypt
RMS-encrypted email
messages when
exporting search
results or preparing
search results for
analysis in Advanced
eDiscovery. For more
information about
decrypting search
results during export,
see Export search
results from the
Office 365 Security &
Compliance Center.
EDISCOVERY
COMPLIANCE MANAGER & ORGANIZATION
ROLE ADMINISTRATOR ADMINISTRATOR MANAGEMENT REVIEWER

Search And Purge


Lets users perform
bulk removal of data
matching the criteria
of a content search.
For more
information, see
Search for and delete
email messages in
your Office 365
organization.

More information
Why create an eDiscovery Administrator? As previously explained, an eDiscovery Administrator is
member of the eDiscovery Manager role group who can view and access all eDiscovery cases in your
organization. This ability to access all the eDiscovery cases has two important purposes:
If a person who is the only member of an eDiscovery case leaves your organization, no one
(including members of the Organization Management role group or another member of the
eDiscovery Manager role group) can access that eDiscovery case because they aren't a member of
a case. In this situation, there would be no way to access the data in the case. But because an
eDiscovery Administrator can access all eDiscovery cases in the organization, they can view the
case in the Security & Compliance Center and add themselves or another eDiscovery manager as
a member of the case.
Because an eDiscovery Administrator can view and access all eDiscovery cases, they can audit and
oversee all cases and associated compliance searches. This can help to prevent any misuse of
compliance searches or eDiscovery cases. And because eDiscovery Administrators can access
potentially sensitive information in the results of a compliance search, you should limit the number
of people who are eDiscovery Administrators.
Also, eDiscovery Administrators in the Security & Compliance Center are automatically added as
administrators in Advanced eDiscovery. That means a person must be an eDiscovery
Administrator to perform administrative tasks in Advanced eDiscovery, such as setting up users,
creating cases, and importing data in to a case.
Can I add a group as a member of the eDiscovery Manager role group in the Security &
Compliance Center? As previously explained, you can add a mail-enabled security group as a member
of the eDiscovery Managers subgroup in the eDiscovery Manager role group by using the Add-
RoleGroupMember cmdlet in Security & Compliance Center PowerShell. For example, you can run the
following command to add a mail-enabled security group to the eDiscovery Manager role group.

Add-RoleGroupMember "eDiscovery Manager" -Member <name of security group>

Note that an Exchange distribution group or an Office 365 group aren't supported. You must use a mail-
enabled security group, which you can create in Exchange Online PowerShell by using the
New-DistributionGroup -Type Security command. You can also create a mail-enabled security group (and
add members) in the Exchange admin center or in the Office 365 admin center. Note that it might take up
to 60 minutes after you create it for a new mail-enabled security to be available to add to the eDiscovery
Managers role group.
Also as previously stated, you can't make a mail-enabled security group an eDiscovery Administrator by
using the Add-eDiscoveryCaseAdmin cmdlet in Security & Compliance Center PowerShell. You can
only add individual users as eDiscovery Administrators.
Note that you also can't add a mail-enabled security group as a member of a case.
Set up compliance boundaries for eDiscovery
investigations in Office 365
11/13/2018 • 14 minutes to read • Edit Online

Compliance boundaries create logical boundaries within an Office 365 organization that control the user content
locations (such as mailboxes, SharePoint sites, and OneDrive accounts) that eDiscovery managers can search.
Additionally, compliance boundaries control who can access eDiscovery cases used to manage the legal, human
resources, or other investigations within your organization. The need for compliance boundaries is often necessary
for multi-nations corporations that have to respect geographical boarders and regulations, and for governments,
which are often divided into different agencies. In Office 365, compliance boundaries help you meet these
requirements when performing content searches and managing investigations with eDiscovery cases.
We'll use the example in the following illustration to explain how compliance boundaries work.

In this example, Contoso LTD is an Office 365 organization that consists of two subsidiaries, Fourth Coffee and
Coho Winery. The business requires that eDiscovery mangers and investigators can only search the Exchange
mailboxes, OneDrive accounts, and SharePoint sites in their agency. Additionally, eDiscovery managers and
investigators can only see eDiscovery cases in the in their agency, and they can only access the cases that they're a
member of. Here's how compliance boundaries meet these requirements.
The search permissions filtering functionality in Content Search controls the content locations that
eDiscovery managers and investigators can search. This means eDiscovery managers and investigators in
the Fourth Coffee agency can only search content locations in the Fourth Coffee subsidiary. The same
restriction applies to the Coho Winery subsidiary.
Role groups control who can see the eDiscovery cases in the Office 365 Security & Compliance Center.
This means that eDiscovery managers and investigators can only see the eDiscovery cases in their agency.
Role groups also control who can assign members to an eDiscovery case. This means eDiscovery managers
and investigators can only assign members to cases that they themselves are a member of.
Here's the process for setting up compliance boundaries:
Step 1: Identify a user attribute to define your agencies
Step 2: File a request with Microsoft Support to synchronize the user attribute to OneDrive accounts
Step 3: Create a role group for each agency
Step 4: Create a search permissions filter to enforce the compliance boundary
Step 5: Create an eDiscovery case for an intra-agency investigations

Step 1: Identify a user attribute to define your agencies


The first step is to choose an Azure Active Directory attribute to use that will define your agencies. This attribute
will be used to create the search permissions filter that limits an eDiscovery manager to search only the content
locations of users who are assigned a specific value for this attribute. For example, let's say Contoso decides to use
the Department attribute. The value for this attribute for users in the Fourth Coffee subsidiary would be
FourthCoffee and the value for users in Coho Winery subsidiary would be CohoWinery . In Step 4, you'll use this
attribute:value pair (for example, Department:FourthCoffee ) to limit the user content locations that eDiscovery
managers can search.
Here's a list of Azure Active Directory user attributes that you can use for compliance boundaries:
Company
CountryCode
CustomAttribute1 - CustomAttribute15
Department
Office
Although more user attributes are available, particularly for Exchange mailboxes, the attributes listed above are
the only ones currently supported by OneDrive.

Step 2: File a request with Microsoft Support to synchronize the user


attribute to OneDrive accounts
The next step is to file a request with Microsoft Support to synchronize the Azure Active Directory attribute that
you chose in Step 1 to all OneDrive accounts in your organization. After this synchronization occurs, the attribute
(and its value) that you chose in Step 1 will be mapped to a hidden managed property in SharePoint named
ComplianceAttribute . You'll use this attribute to create the search permissions filter for OneDrive in Step 4.

Include the following information when you submit the request to Microsoft support:
The default domain name of your Office 365 organization
The name of the Azure Active Directory attribute (from Step 1)
The following title or description of the purpose of the support request: "Enable OneDrive for Business
Synchronization with Azure Active Directory for Compliance Security Filters". This will help route the
request to the Office 365 eDiscovery engineering team who will implement the request.
After the engineering change is made and the attribute is synchronized to OneDrive, Microsoft Support will send
you the build number that the change was made in and an estimated deployment date. Note that the deployment
process usually takes 4-6 weeks after you submit the support request.
Important: You can complete Step 3 through Step 5 before the change is deployed. But running content searches
won't return documents from OneDrive sites specified in the search permissions filter until after the change is
deployed.

Step 3: Create a role group for each agency


The next step is to create the role groups in the Office 365 Security & Compliance Center that will align with your
agencies. We recommend that you create a new role group by copying the built-in eDiscovery Managers group,
adding the appropriate members, and removing roles that may not be applicable to your needs. For more
information about eDiscovery-related roles, see Assign eDiscovery permissions in the Office 365 Security &
Compliance Center.
To create the role groups, go to the Permissions page in the Security & Compliance Center and create a role
group for each team in each agency that will use compliance boundaries and eDiscovery cases to manage
investigations.
Using the Contoso compliance boundaries scenario, four role groups need to be created and the appropriate
members added to each one.
Fourth Coffee eDiscovery Managers
Fourth Coffee Investigators
Coho Winery eDiscovery Managers
Coho Winery Investigators

Step 4: Create a search permissions filter to enforce the compliance


boundary
After you've created role groups for each agency, the next step is to create the search permissions filters that
associate each role group to its specific agency and defines the compliance boundary itself. You need to create one
search permissions filter for each agency. For more information about creating security permissions filters, see
Configure permissions filtering for Content Search.
Here's the syntax that's used to create a search permissions filter used for compliance boundaries.

New-ComplianceSecurityFilter -FilterName <name of filter> -Users <role groups> -Filters "Mailbox_<Compliance


attribute from Step 1> -eq '<AttributeVale> '", "Site_ComplianceAttribute -eq <AttributeValue>' -or
Site_Path -like <SharePointURL> *'" -Action <Action >

Here's a description of each parameter in the command:


FilterName - Specifies the name of the filter. Use a name that describes or identifies the agency that filter
will be used in.
Users - Specifies the users or groups who get this filter applied to the Content Search actions they
perform. For compliance boundaries, this parameter specifies the role groups (that you created in Step 3) in
the agency that you're creating the filter for. Note this is a multi-value parameter so you can include one or
more role groups, separated by commas.
Filters - Specifies the search criteria for the filter. For the compliance boundaries, you will define the
following filters. Each one applies to a user content location.
Mailbox - Specifies the mailboxes that the role groups defined in the Users parameter can search. For
compliance boundaries, ComplianceAttribute is the same attribute that you identified in Step 1 and
AttributeValue specifies the agency. This filter allow members of the role group to only search the
mailboxes in a specific agency; for example, "Mailbox_Department -eq 'FourthCoffee'" .
Site - Specifies the OneDrive accounts that the role groups defined in the Users parameter can search.
For the OneDrive filter, use the actual string ComplianceAttribute ; this will map to the same attribute that
you identified in Step 1 and that's synchronized to OneDrive accounts as a result of the support request
that you submitted in Step 2; AttributeValue specifies the agency. This filter allow members of the role
group to only search the OneDrive accounts in a specific agency; for example,
"Site_ComplianceAttribute -eq 'FourthCoffee'" .

Site_Path- Specifies the SharePoint sites that the role groups defined in the Users parameter can search.
The SharePointURL specifies the sites in the agency that members of the role group can search; for
example, Site_Path -like 'https://contoso.sharepoint.com/sites/FourthCoffee*'"
Action - Specifies the type of Compliance Search action that the filter is applied to. For example,
-Action Search would only apply the filter when members of the role groups defined in the Users
parameter runs a content search. In this case, the filter wouldn't be applied when exporting search results.
For compliance boundaries, use -Action All so the filter applies to all search actions.
For a list of the Content Search actions, see the "New -ComplianceSecurityFilter" section in Configure
permissions filtering for Content Search.
Here are examples of the two search permissions filters that would be created to support the Contoso compliance
boundaries scenario.
Fourth Coffee

New-ComplianceSecurityFilter -FilterName "Fourth Coffee Security Filter" -Users "Fourth Coffee eDiscovery
Managers", "Fourth Coffee Investigators" -Filters "Mailbox_Department -eq 'FourthCoffee'",
"Site_ComplianceAttribute -eq 'FourthCoffee' -or Site_Path -like
'https://contoso.sharepoint.com/sites/FourthCoffee*'" -Action ALL

Coho Winery

New-ComplianceSecurityFilter -FilterName "Coho Winery Security Filter" -Users "Coho Winery eDiscovery
Managers", "Coho Winery Investigators" -Filters "Mailbox_Department -eq 'CohoWinery'",
"Site_ComplianceAttribute -eq 'CohoWinery' -or Site_Path -like
'https://contoso.sharepoint.com/sites/CohoWinery*'" -Action ALL

Step 5: Create an eDiscovery case for an intra-agency investigations


The final step is to create a new eDiscovery case in the Security & Compliance Center and then add the role group
—that you created in Step 3—as a member of the case. This results in two important characteristics of using
compliance boundaries:
Only members of the role group added to the case will be able to see and access the case in the Security &
Compliance Center. For example, if the Fourth Coffee Investigators role group is the only member of a
case, then members of the Fourth Coffee eDiscovery Managers role group (or members of any other role
group) won't be able to see or access the case.
When a member of the role group assigned to a case runs a search associated with the case, they will only
be able to search the content locations within their agency (which is defined by the search permissions filter
that you created in Step 4.)
To create a new case and assign members:
1. Go to the eDiscovery page in the Security & Compliance Center and create a new case.
2. In the list of eDiscovery cases, click the name of the case you just created.
3. In the Manage this case flyout page, under Mange role groups, click Add.

4. In the list of role groups, select one of the role groups that you created in Step 3, and click Add.
5. Click Save on the Manage this case flyout to save the change.

Compliance boundary limitations


Keep the following limitations in mind when managing eDiscovery cases and investigations that use of compliance
boundaries.
When creating and running a Content Search, you can select content locations that are outside of your
agency. However, because of the search permissions filter, content from those locations won't be included in
the search results.
Compliance boundaries don't apply to holds in eDiscovery cases. That means an eDiscovery manager in
one agency can place a user in a different agency on hold. However, the compliance boundary will be
enforced if the eDiscovery manager searches the content locations of the user who was placed on hold.
That means the eDiscovery manager won't be able search the user's content locations, even though they
were able to place the user on hold.
Additionally, hold statistics will only apply to content locations in the agency.
Search permissions filters aren't applied to Exchange public folders.

Searching and exporting content in Multi-Geo environments


Search permissions filters also let you control where content is routed for export and which datacenter can be
searched when searching SharePoint sites and OneDrive accounts in a SharePoint Multi-Geo environment:
Export search results from a specific data center. This means that you can specify the data center location
that search results will be exported from.
Route searches of SharePoint sites and OneDrive accounts to a satellite data center. This means you can
specify the data center location where searches will be run.
Use the Region parameter for New-ComplianceSecurityFilter or Set-ComplianceSecurityFilter cmdlets to
create or change which datacenter the export will be routed through.

PARAMETER VALUE DATA CENTER LOCATION

NAM North American (actual data centers are in the US)

EUR Europe

APC Asia Pacific

CAN Canada

Similarly, you can use the following values for the Region parameter values to control which data center that
Content Searches will run in when searching SharePoint and OneDrive locations. Note that the following table
also shows which data center exports will be routed through.

PARAMETER VALUE DATA CENTER ROUTING LOCATIONS FOR EXPORT

NAM US

EUR Europe

APC Asia Pacific

CAN US

AUS Asia Pacific

KOR The organization's default data center

GBR Europe

JPN Asia Pacific

IND Asia Pacific

LAM US

Note: If you don't specify the Region parameter for a search permissions filter, the organizations default
SharePoint region will be searched, then search results are exported to the closest data center.
Here are examples of using the -Region parameter when creating search permission filters for compliance
boundaries. This assumes that the Fourth Coffee subsidiary is located in North America and that Coho Winery is
in Europe.
New-ComplianceSecurityFilter -FilterName "Fourth Coffee Security Filter" -Users "Fourth Coffee eDiscovery
Managers", "Fourth Coffee Investigators" -Filters "Mailbox_Department -eq 'FourthCoffee'", "Site_Department -
eq 'FourthCoffee' -or Site_Path -like 'https://contoso.sharepoint.com/sites/FourthCoffee*'" -Action ALL -
Region NAM

New-ComplianceSecurityFilter -FilterName "Coho Winery Security Filter" -Users "Coho Winery eDiscovery
Managers", "Coho Winery Investigators" -Filters "Mailbox_Department -eq 'CohoWinery'", "Site_Department -eq
'CohoWinery' -or Site_Path -like 'https://contoso.sharepoint.com/sites/CohoWinery*'" -Action ALL -Region EUR

Keep the following things in mind when searching and exporting content in multi-geo environments.
The Region parameter doesn't control searches of Exchange mailboxes; all data centers will be searched
when you search mailboxes. To limit the scope of which Exchange mailboxes can be searched, use the
Filters parameter when creating or changing a search permissions filter.
If it's necessary for an eDiscovery Manager to search across multiple SharePoint regions, you'll need to
create a different user account for that eDiscovery manager that can be used in the search permissions filter
to specify the alternate region where the SharePoint sites or OneDrive accounts are located.
When searching for content in SharePoint and OneDrive, the Region parameter directs searches to either
the main or satellite location where the eDiscovery manager will conduct eDiscovery investigations. If an
eDiscovery manager searches SharePoint and OneDrive sites outside of the region that's specified in the
search permissions filter, no search results will be returned.
When exporting search results, content from all content locations (including Exchange, Skype for Business,
SharePoint, OneDrive and other Office 365 services that you can search by using the Content Search tool)
will be uploaded to the Azure storage location in the data center that's specified by the Region parameter.
This helps organizations stay within compliance by not allowing content to be exported across controlled
borders. If no region is specified in the search permissions filter, content is uploaded to the organization's
default region.
You can edit an existing search permissions filter to add or change the region by running the following
command:

Set-ComplianceSecurityFilter -FilterName <Filter name> -Region <Region>

Frequently asked questions


Who can create and manage search permissions filters (using New-ComplianceSecurityFilter and Set-
ComplianceSecurityFilter cmdlets )?
To create, view and modify search permissions filters, you have to be a member of the Organization Management
role group in the Security & Compliance Center.
If an eDiscovery manager is assigned to more than one role group that spans multiple agencies, how do
they search for content in one agency or the other?
The eDiscovery manager can add parameters to their search query that will restrict the search to a specific agency.
For example, if an organization has specified the CustomAttribute10 property to differentiate agencies, they can
append the following to their search query to search mailboxes and OneDrive accounts in a specific agency:
CustomAttribute10:<value> AND Site_ComplianceAttribute:<value> .

What happens if the value of the attribute that's used as the compliance attribute in a search
permissions filter is changed?
It takes up to 3 days for a search permissions filter to enforce the compliance boundary if the value of the attribute
that's used in the filter is changed. For example, in the Contoso scenario let's say that a user in the Fourth Coffee
agency is transferred to the Coho Winery agency. As a result, the value of the Department attribute on the user
object is changed from FourthCoffee to CohoWinery . In this situation, Fourth Coffee eDiscovery and investors
will get search results for that user for up 3 days after the attribute is changed. Similarly, it will take up to 3 days
before Coho Winery eDiscovery managers and investigators will get search results for the user.
Can an eDiscovery manager see content from two separate compliance boundaries?
Yes. This can be done by adding the user to role groups that have visibility to both agencies.
Do search permissions filters work for eDiscovery case holds, Office 365 retention policies, or DLP?
No, not at this time
If I specify a region to control where content is exported, but I don't have a SharePoint organization in
that region, can I still search SharePoint?
If the region specified in the search permissions filter doesn't exist in your organization, the default region will be
searched.
What is the maximum number of search permissions filters that can be created in an organization?
There is no limit to the number of search permissions filters that can be created in an organization. However,
search performance will be impacted when there are more than 100 search permissions filters. To keep the
number of search permissions filters in your organization as small as possible, create filters that combine rules for
Exchange, SharePoint, and OneDrive into a single search permissions filter whenever possible.
eDiscovery solution series: Data spillage scenario -
Search and purge
10/16/2018 • 14 minutes to read • Edit Online

What is data spillage and why should you care? Data spillage is when a confidential document is released into
an untrusted environment. When a data spillage incident is detected, it's important to quickly assess the size and
locations of the spillage, examine user activities around it, and then permanently purge the spilled data from the
system.

Data spillage scenario


You’re a lead information security officer at Contoso. You are informed of a data spillage situation where an
employee unknowingly shared a highly confidential document with multiple people through email. You want to
quickly assess who received this document internally and externally. Once identified, you would like to share case
findings with other investigators to review, and then permanently remove the data from Office 365. After the
investigation is complete, you want to generate a report with the evidence of permanent removal and other case
details for any future reference.
Scope of this article
This document provides a list of instructions on how to permanently remove a message from Office 365 so that it's
not accessible or recoverable. To delete a message and make it recoverable until the deleted item retention period
expires, see Search for and delete email messages in your Office 365 organization.

Workflow for managing data spillage incidents


Here's a how to manage a data spillage incident:

(Optional) Step 1: Manage who can access the case and set compliance boundaries
Step 2: Create an eDiscovery case
Step 3: Search for the spilled data
Step 4: Review and validate case findings
Step 5: Use message trace log to check how spilled data was shared
Step 6: Prepare the mailboxes
Step 7: Permanently delete the spilled data
Step 8: Verify, provide a proof of deletion, and audit

Things to know before you start


When a mailbox is on hold, a deleted message remains in the Recoverable Items folder until the retention
period expires or the hold is released. Step 6 describes how to remove hold from the mailboxes. Check with
your records management or legal departments before removing the hold. Your organization might have a
policy that defines whether a mailbox on hold or a data spillage incident takes priority.
To control which user mailboxes an data spillage investigator can search and manage who can access the
case, you can set up compliance boundaries and create a custom role group, which is described in Step 1. To
do this, you have to be a member of the Organization Management role group or be assigned the role
management role. If you or in administrator in your organization has already set compliance boundaries,
you can skip Step 1.
To create a case, you must be a member of the eDiscovery Manager role group or be a member of a custom
role group that's assigned the Case Management role. If you're not a member, ask an Office 365
administrator to add you to the eDiscovery manager role group.
To delete data that's spilled into your organization, you need to use the Search-Mailbox -DeleteContent
command in Exchange Online PowerShell. Additionally, to use the DeleteContent parameter, you also have
to be a member of a role group in Exchange Online that's assigned the Mailbox Import Export role. See the
"Add a role to a role group" section in Manage role groups.
To search the Office 365 audit log eDiscovery activities in Step 8, auditing must be turned on for your
organization. You can search for activities that were performed within the last 90 days. To learn more about
how to enable and use auditing, see the Auditing the data spillage investigation process section in Step 8.

(Optional) Step 1: Manage who can access the case and set compliance
boundaries
Depending on your organizational practice, you need to control who can access the eDiscovery case used to
investigate a data spillage incident and set up compliance boundaries. The easiest way to do this is to add
investigators as members of an existing role group in the Office 365 Security & Compliance Center and then add
the role group as a member of the eDiscovery case. For information about the built-in eDiscovery role groups and
how to add members to an eDiscovery case, see Assign eDiscovery permissions in the Office 365 Security &
Compliance Center.
You can also create a new role group that aligns with your organizational needs. For example, you might want a
group of data spillage investigators in the organization to access and collaborate on all data spillage cases. You can
do this by creating a "Data Spillage Investigator" role group, assigning the appropriate roles (Export, RMS Decrypt,
Review, Preview, Compliance Search, and Case Management), adding the data spillage investigators to the role
group, and then adding the role group as a member of the data spillage eDiscovery case. See Set up compliance
boundaries for eDiscovery investigations in Office 365 for detailed instructions on how to do this.

Step 2: Create an eDiscovery case


An eDiscovery case provides an effective way to manage your data spillage investigation. You can add members to
the role group that you created in Step 1, add the role group as a member of new a eDiscovery case, perform
iterative searches to find the spilled data, export a report to share, track the status of the case, and then refer back
to the details of the case if needed. Consider establishing a naming convention for eDiscovery cases used for data
spillage incidents, and provide as much information as you can in the case name and description so you can locate
and refer to in the future if necessary.
To create a new case, you can use eDiscovery in the Security & Compliance Center. See "Create a new case" in
eDiscovery Cases in the Office 365 Security & Compliance Center.

Step 3: Search for the spilled data


Now that you've created a case and managed access, you can use the case to iteratively search to find the spilled
data and identify the mailboxes that contain the spilled data. You will use the same search query that you used to
find the email messages to delete those same messages in Step 7.
To create a content searches associated with an eDiscovery case, see "Create and run a Content Search associated
with a case" in eDiscovery Cases in the Office 365 Security & Compliance Center.
Important: The keywords that you use in the search query may contain the actual spilled data that you're
searching for. For example, if you searching for documents containing a social security number and you use the it
as search keyword, you must delete the query afterwards to avoid further spillage. See Deleting the search query
in Step 8.

Step 4: Review and validate case findings


After you create a content search, you need to review and validate that the search results and verify that they
consist only of the email messages that must be deleted. In a content search, you can preview a random sampling
of 1,000 email messages without exporting the search results to avoid further data spillage. You can read more
about the preview limitations at Limits for Content Search in the Office 365 Security & Compliance Center.
If you have more than 1,000 mailboxes or more than 100 email messages per mailbox to review, you can divide the
initial search into multiple searches by using additional keywords or conditions such as date range or
sender/recipient and review the results of each search individually. Make sure to note down all search queries to
use when you delete messages in Step 7.
If a custodian or end user is assigned an Office 36 E5 license, you can examine up to 10,000 search results at once
using Office 365 Advanced eDiscovery. If there are more than 10,000 email messages to review, you can divide the
search query by date range and review each result individually as search results are sorted by date. In Advanced
eDiscovery, you can tag search results using the Label as feature in the preview panel and filter the search result
by the tag you labeled. This is helpful when you collaborate with a secondary reviewer. By using additional analytics
tools in Advanced eDiscovery, such as optical character recognition, email threading, and predictive coding, you can
quickly process and review thousands of messages and tag them for further review. See Quick setup for Office 365
Advanced eDiscovery.
When you find an email message that contains spilled data, check the recipients of the message to determine if it
was shared externally. To further trace an message, you can collect sender information and date range so you can
use the message trace logs, which is described in Step 5.
Afer you verified the search results, you may want to share your findings with others for a secondary review.
People who you assigned to the case in Step 1 can review the case content in both eDiscovery and Advanced
eDiscovery and approve case findings. You can also generate a report without exporting the actual content. You can
also use this same report as a proof of deletion, which is described in Step 8.
To generate a statistical report:
1. Go to the Search page in the eDiscovery case, and click the search that you want to generate a report for.
2. On the flyout page, click More > Export report.
The Export report page is displayed.
3. Select All items, including ones that have unrecognized format, are encrypted, or weren’t indexed
for other reasons and then click Generate report.
4. In the eDiscovery case, click Export to display the list of export jobs. You may have to click Refresh to
update the list to display the export job you just created.
5. Click the export job, and then click Download report on the flyout page.

The Export Summary report contains the number of locations found with results and the size of the search
results. You can use this to compare with the report generated after deletion and provide as a proof of deletion. The
Results report contains a more detailed summary of the search results, including the subject, sender, recipients, if
the email was read, dates, and size of each message. If any of the details in this report contains that actual spilled
data, be sure to permanently delete the Results.csv file when the investigation is complete.
For more information about exporting reports, see Export a Content Search report.

Step 5: Use message trace log to check how spilled data was shared
To further investigate if email with spilled data was shared, you can optionally query the message trace logs with
the sender information and the date range information that you gathered in Step 4. Note that the retention period
for message trace is 30 days for real time data and 90 days for historical data.
You can use Message trace in the Security & Compliance Center or use the corresponding cmdlets in Exchange
Online PowerShell. It's important to note that message tracing doesn't offer full guarantees on the completeness of
data returned. For more information about using Message trace, see:
Message trace in the Office 365 Security & Compliance Center
New Message Trace in Office 365 Security & Compliance Center

Step 6: Prepare the mailboxes


After you review and validate that the search results contains only the messages that must be deleted, you need to
collect a list of the email addresses of the impacted mailboxes to use in Step 7 when you run the Search-Mailbox
-DeleteContent command. You may also have to prepare the mailboxes before you can permanently delete email
messages depending on whether single item recovery is enabled on the mailboxes that contain the spilled data or if
any of those mailboxes are on hold.
Get a list of addresses of mailboxes with spilled data
There are two ways to collect a list of email addresses of mailboxes with spilled data.
Option 1: Get a list of addresses of mailboxes with spilled data
1. Open the eDiscovery case, go to the Search page and select the appropriate content search.
2. On the flyout page, click View results.
3. In the Individual results drop down list, click Search statistics.
4. In the Type drop down list, click Top locations.

A list of mailboxes that contain search results is displayed. The number of items in each mailbox that match
the search query is also displayed.
5. Copy the information in the list and save it to a file or click Download to download the information to a
CSV file.
Option 2: Get mailbox locations from the export report
Open the Export Summary report that you downloaded in Step 4. In the first column in the report, the email
address of each mailbox is listed under Locations.
Prepare the mailboxes so you can delete the spilled data
If single item recovery is enabled or if a mailbox is placed on hold, a permanently deleted (purged) message will be
retained in Recoverable Items folder. So before you can purge spilled data, you need to check the existing mailbox
configurations and disable single item recovery and remove any hold or Office 365 retention policy. Keep in mind
that you can prepare one mailbox at a time, and then run the same command on different mailboxes or create a
PowerShell script to prepare multiple mailboxes at the same time.
See "Step 1: Collect information about the mailbox" in Delete items in the Recoverable Items folder of cloud-
based mailboxes on hold for instructions about how to check if single item recovery is enabled or if the
mailbox is placed on hold or it's assigned to a retention policy.
See "Step 2: Prepare the mailbox" in Delete items in the Recoverable Items folder of cloud-based mailboxes
on hold for instructions about disabling single item recovery.
See "Step 3: Remove all holds from the mailbox" in Delete items in the Recoverable Items folder of cloud-
based mailboxes on hold for instructions about how to remove a hold or retention policy from a mailbox.
See "Step 4: Remove the delay hold from the mailbox" in Delete items in the Recoverable Items folder of
cloud-based mailboxes on hold for instructions about removing the delay hold that is placed on the mailbox
after any type of hold is removed.
Important: Check with your records management or legal departments before removing a hold or retention
policy. Your organization may have a policy that defines whether a mailbox on hold or a data spillage incident takes
priority.
Be sure to revert the mailbox to previous configurations after you verify that the spilled data has been permanently
deleted. See the details in Step 7.

Step 7: Permanently delete the spilled data


Using the mailbox locations that you collected and prepared in Step 6 and the search query that was created and
refined in Step 3 to find email messages that contain the spilled data, you can now permanently delete the spilled
data. As previously explained, you have to be assigned the Mailbox Import Export role in Exchange Online to delete
messages using the following procedure.
1. Connect to Exchange Online PowerShell.
2. Run the following command:

Search-Mailbox -Identity <mailbox identity> -SearchDumpster -DeleteContent $true -SearchQuery <search


query>

3. Re-run the previous command for each mailbox that contains the spilled data, by replacing the value for the
Identity parameter; for example:

Search-Mailbox -Identity sarad@contoso.onmicrosoft.com -SearchQuery <search query> -DeleteContent

Search-Mailbox -Identity janets@contoso.onmicrosoft.com -SearchQuery <search query> -DeleteContent


Search-Mailbox -Identity pilarp@contoso.onmicrosoft.com -SearchQuery <search query> -DeleteContent

As previously stated, you can also create a powershell script and run it against a list of mailboxes so that the script
deletes the spilled data in each mailbox.

Step 8: Verify, provide a proof of deletion, and audit


The final step in the workflow to manage a data spillage incident is to verify that the spilled data was permanently
removed from the mailbox by going to the eDiscovery case and re-running the same search query that was used to
delete that data to confirm that no results are returned. After you confirm the spilled data has been permanently
removed, you can export a report and include it (along with the original report) as a proof of deletion. Then you can
close the case, which will allow you to re-open it if you have refer to it in the future. Additionally, you can also
revert mailboxes to their previous state, delete the search query used to find the spilled data, and search for
auditing records of tasks performed when managing the data spillage incident.
Reverting the mailboxes to their previous state
If you changed any mailbox configuration in Step 6 to prepare the mailboxes before the spilled data was deleted,
you will need to revert them to their previous state. See "Step 6: Revert the mailbox to its previous state" in Delete
items in the Recoverable Items folder of cloud-based mailboxes on hold.
Deleting the search query
If the keywords in the search query that you created and used in Step 3 contains some of all of the actual spilled
data, you should delete the search query to prevent further data spillage.
1. In the Security & Compliance Center, open the eDiscovery case, go to the Search page, and select the
appropriate content search.
2. On the flyout page, click Delete.

Auditing the data spillage investigation process


You can search the Office 365 audit log for the eDiscovery activities that were performed during the investigation.
You can also search the audit log to return the audit records that were created when you ran the Search-Mailbox -
DeleteContent command to delete the spilled data. For more information, see:
Search the audit log in the Office 365 Security & Compliance Center
Search for eDiscovery activities in the Office 365 audit log
See the "Audited activities - Exchange admin audit log " section in Search the audit log in the Office 365
Security & Compliance Center for guidance about how to search for audit records related to running
cmdlets in Exchange Online.
Prepare search results for Office 365 Advanced
eDiscovery
9/26/2018 • 6 minutes to read • Edit Online

After a search that's associated with an eDiscovery case in the Office 365 Security & Compliance Center is
successfully run, you can prepare the search results for further analysis with Office 365 Advanced eDiscovery,
which lets you analyze large, unstructured data sets and reduce the amount of data that's relevant to a legal case.
Advanced eDiscovery features include:
Optical character recognition - When you prepare search results for Advanced eDiscovery, optical
character recognition (OCR ) functionality automatically extracts text from images, and includes this with the
search results that are loaded in to Advanced eDiscovery for analysis. OCR is supported for loose files,
email attachments, and embedded images. This allows you to apply the text analytic capabilities of
Advanced eDiscovery (near-duplicates, email threading, themes, and predictive coding) to the text content in
image files.
Near-duplicate detection - Lets you structure your data review more efficiently, so one person reviews a
group of similar documents. This helps prevent multiple reviewers from having to view different versions of
the same document.
Email threading - Helps you identify the unique messages in an email thread so you can focus on only the
new information in each message. In an email thread, the second message contains the first message.
Likewise, later messages contain all the previous messages. Email threading removes the need to review
every message in its entirety in an email thread.
Themes - Help you get valuable insight about your data beyond just keyword search statistics. Themes help
investigations by grouping related documents so you can look at the documents in context. When using
themes, you can view the related themes for a set of documents, determine any overlap, and then identify
cross-sections of related data.
Predictive coding - Lets you train the system on what you're looking for, by allowing you to make
decisions (about whether something is relevant or not) on a small set of documents. Advanced eDiscovery
then applies that learning (based on your guidance) when analyzing all of the documents in the data set.
Based on that learning, Advanced eDiscovery provides a relevance ranking so you can decide which
documents to review based on what document are the most likely to be relevant to the case.
Exporting data for review applications - You can export data from Advanced eDiscovery and Office 365
after you've completed your analysis and reduced the data set. The export package includes a CSV file that
contains the properties from the exported content and analytics metadata. This export package can then be
imported to an eDiscovery review application.

Before you begin


To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned
an Office 365 E5 license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an
Advanced eDiscovery standalone license. Administrators and compliance officers who are assigned to cases
and use Advanced eDiscovery to analyze data don't need an E5 license.
You have to be an eDiscovery Manager or an eDiscovery Administrator in the Office 365 Security &
Compliance Center to prepare search results for Advanced eDiscovery. An eDiscovery Manager is a
member of the eDiscovery Manager role group. An eDiscovery Administrator is also member of the
eDiscovery Manager role group, but has been assigned additional eDiscovery privileges. For instructions
about assigning eDiscovery Administrator permissions, see Step 1 in eDiscovery cases in the Office 365
Security & Compliance Center.

Step 1: Prepare search results for Advanced eDiscovery


You can prepare the results of a search that's associated with an eDiscovery case. When you prepare search results
for Advanced eDiscovery, the data is uploaded and temporarily stored in a unique Windows Azure storage area in
the Microsoft cloud. It's at this point that the OCR functionality extracts text from images in the search results. In
Step 2, this text and the other search results data is loaded in to the case in Advanced eDiscovery.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to prepare search results for analysis in Advanced eDiscovery.
3. On the Home page for the case, click Search, and then select the search.
4. In the details pane, under Analyze results with Advanced eDiscovery, click Prepare results for
analysis.

NOTE
If the search results are older than 7 days, you will be prompted to update the search results.

5. On the Prepare results for analysis page, do the following:


Choose to prepare indexed items, indexed and unindexed items, or only unindexed items for analysis
in Advanced eDiscovery.
Choose whether to include all versions of documents found on SharePoint that met the search
criteria. This option appears only if the content sources for the search includes sites.
Specify whether you want a notification message sent (or copied) to a person when the preparation
process is completed and the data is ready to be processed in Advanced eDiscovery.
6. Click Prepare.
The search results are prepared for analysis with Advanced eDiscovery.
7. In the details pane, click Check preparation status to display information about the preparation process.
When the preparation process is finished, you can go to the case in Advanced eDiscovery to process the
data for analysis.

Step 2: Add the search results data to the case in Advanced eDiscovery
When the preparation is finished, the next step is to go to Advanced eDiscovery and load the search results data
(which have been uploaded to an Azure storage area in the Microsoft cloud ) to the case in Advanced eDiscovery.
As previously explained, to access Advanced eDiscovery you have to be an eDiscovery Administrator in the
Security & Compliance Center or an administrator in Advanced eDiscovery.

NOTE
The time it takes for the data from the Security & Compliance Center to be available to add to a case in Advanced eDiscovery
varies, depending on the size of the results from the eDiscovery search.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to load data in to in Advanced eDiscovery.
3. On the Home page for the case, click Advanced eDiscovery.

The Connecting to Advanced eDiscovery progress bar is displayed. When you're connected to
Advanced eDiscovery, a list of containers is displayed on the setup page for the case.

These containers represent the search results that you prepared for analysis in Advanced eDiscovery in Step
1. Note that the name of the container has the same name as the search in the case in the Security &
Compliance Center. The containers in the list are the ones that you prepared. If a different user prepared
search results for Advanced eDiscovery, the corresponding containers won't be included in the list.
4. To load the search result data from a container in to the case in Advanced eDiscovery, select a container and
then click Process.

Next steps
After the results of an eDiscovery search are added to a case, the next step is to use the Advanced eDiscovery tools
to analyze the data and identify the content that's responsive to a specific legal case. For information about using
Advanced eDiscovery, see Office 365 Advanced eDiscovery.

More information
Any RMS -encrypted email messages that are included in the search results will be decrypted when you prepare
them for analysis in Advanced eDiscovery. This decryption capability is enabled by default for members of the
eDiscovery Manager role group. This is because the RMS Decrypt management role is assigned to this role group.
Keep the following things in mind about decrypting email messages:
Currently, this decryption capability doesn't include encrypted content from SharePoint and OneDrive for
Business sites. Only RMS -encrypted email messages will be decrypted when you export them.
If an RMS -encrypted email message has an attachment (such as a document or another email message)
that's also encrypted, only the top-level email message will be decrypted.
If you need to prevent someone from decrypting RMS -encrypted messages when preparing search results
for analysis in Advanced eDiscovery, you'll have to create a custom role group (by copying the built-in
eDiscovery Manager role group) and then remove the RMS Decrypt management role from the custom
role group. Then add the person who you don't want to decrypt messages as a member of the custom role
group.
Assign eDiscovery permissions to OneDrive for
Business sites
9/26/2018 • 9 minutes to read • Edit Online

You can use the eDiscovery Center in SharePoint Online to search all OneDrive for Business sites in your
organization for certain keywords, sensitive information, and other search criteria. Each user in your organization is
the owner of their OneDrive for Business site, which is located in the site collection named https://domain-
my.sharepoint.com. By default, an Office 365 global administrator or compliance manager can't use the eDiscovery
Center in SharePoint Online to search any OneDrive for Business sites. To search a OneDrive for Business site,
administrators or compliance managers must be a site collection administrator for that OneDrive for Business site.
This article guides you through the steps to make an administrator or compliance manager a site collection
administrator for every OneDrive for Business site in your organization.
See the More information section for tips about using the script in this article, including revising the script in Step 3
to remove a user as a site collection administrator from OneDrive for Business sites.

Before you begin


Install the SharePoint Online Management Shell. For information, see Set up the SharePoint Online
Management Shell Windows PowerShell environment.
Run the script in Step 3 each time you want to assign a user as a site collection administrator to any
OneDrive for Business sites in your organization.

IMPORTANT
An administrator or compliance manager who is a site collection administrator for OneDrive for Business sites can
open users' OneDrive for Business document libraries and perform the same tasks as the owner. It's important to
control and monitor who has been assigned eDiscovery permissions to OneDrive for Business sites in your
organization.

The sample script provided in this article isn't supported under any Microsoft standard support program or
service. The sample script is provided AS IS without warranty of any kind. Microsoft further disclaims all
implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a
particular purpose. The entire risk arising out of the use or performance of the sample script and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the script be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample script or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Collect a list of all OneDrive for Business sites


The first step is to create a list of all OneDrive for Business sites in your organization. For instructions, see Create a
list of all OneDrive locations in your organization. This script in this article creates a text file that contains a list of all
OneDrive sites. The script that you run in Step 3 assigns a specified user as a site collection administrator to each
OneDrive for Business site listed in the text file that's created in this step. The following text provides an example of
how the list of sites in this file should be formatted. You can remove sites from this file if necessary.
/personal/annb_contoso_onmicrosoft_com/
/personal/carolt_contoso_onmicrosoft_com/
/personal/esterv_contoso_onmicrosoft_com/
/personal/hollyh_contoso_onmicrosoft_com/
/personal/jeffl_contoso_onmicrosoft_com/
/personal/joeh_contoso_onmicrosoft_com/
/personal/kaia_contoso_onmicrosoft_com/

Step 2: Connect SharePoint Online Management Shell to your


organization
1. On your local computer, open the SharePoint Online Management Shell, and run the following command:

$credentials = Get-Credential

2. In the Windows PowerShell Credential Request dialog box, type the user name and password for your
Office 365 global administrator account, and then click OK.
3. Run the following command to connect the Shell to your SharePoint Online organization:

Connect-SPOService -Url https://<your organization name>-admin.sharepoint.com -credential $credentials

4. To verify that you are connected to your SharePoint Online organization, run the following command to get
a list of all the sites in your organization:

Get-SPOSite

Step 3: Assign a user as a site collection administrator to OneDrive for


Business sites
The next step is to run a script that assigns a specified user as a site collection administrator in every OneDrive for
Business site in your organization. This script uses the list of OneDrive for Business sites that you created in Step 1.
As previously stated, you have to run this script each time that you want to assign a user as a site collection
administrator to OneDrive for Business sites.
1. Save the following text to a text file. For example, you could save it to a file named OD4BAssignSCA.txt.

# Start logging, so if this script fails, you can look at the last successful change,
# remove any OneDrive for Business paths that worked it from the input file, and then rerun the script.

Start-Transcript

# URL for your organization's SPO admin service

$AdminURI = "https://<your organization name>-admin.sharepoint.com"

# User account for an Office 365 global admin in your organization

$AdminAccount = "<global admin account>"

# Compliance manager to be made site collection admin on each MySite

$eDiscoveryUser = "<eDiscovery user account>"

# URL for your tenant's MySite domain


$MySitePrefix = "https://<your organization name>-my.sharepoint.com"

# Where should we read the list of MySites?


# This file should contain partial MySite paths formatted as follows, one per line; for example
# /personal/junminh_contoso_onmicrosoft_com/

$MySiteListFile = 'C:\Users\<youralias>\Desktop\ListOfMysites.txt'

# Begin by connecting to the service


Connect-SPOService -Url $AdminURI -Credential $AdminAccount

# Make a reader for our list of MySites

$reader = [System.IO.File]::OpenText($MySiteListFile)

try {
for(;;) {

# Read a line
$line = $reader.ReadLine()
# Stop if it doesn't exist
if ($line -eq $null) { break }

# Turn the line into a complete SharePoint site path by merging $MySitePrefix
# Formatted like this: "https://contoso-my.sharepoint.com"
# ...with each partial MySite path in the file, formatted like this:
# "/personal/junminh_contoso_onmicrosoft_com/"

$fullsitepath = "$MySitePrefix$line"

Write-Host "Operating on $fullsitepath "

# We need to remove the last "/" to work around an issue.


# "/personal/junminh_contoso_onmicrosoft_com/"
# becomes "/personal/junminh_contoso_onmicrosoft_com"

$fullsitepath = $fullsitepath.trimend("/")

# Make the specified eDiscovery user a site collection admin on the OneDrive for Business site
Write-Host "Making $eDiscoveryUser a Site Collection Admin"
Set-SPOUser -Site $fullsitepath -LoginName $eDiscoveryUser -IsSiteCollectionAdmin $true
}
}
finally {
$reader.Close()
}
Write-Host "Done!"
Stop-Transcript
Write-Host "Log written."

2. Edit the following variables in the beginning of the script file, and use information that's specific to your
organization. The following examples assume that the domain name of your organization is
contoso.onmicrosoft.com. Be sure to surround the values for the variables with double-quotation marks (" ").
$AdminURI - This specifies the URI for your SharePoint Online admin service, for example,
"https://contoso-admin.sharepoint.com" .

$AdminAccount - This specifies a global administrator account in your Office 365 organization, for
example, "admin@contoso.onmicrosoft.com" .
$eDiscoveryUser - This specifies the user account of an administrator or compliance manager who
will be assigned as a site collection administrator for every OneDrive for Business site in your
organization, for example, "annb@contoso.onmicrosoft.com" .
NOTE
Change the user account specified by the $eDiscoveryUser variable and re-run the script to assign a
different user as a site collection administrator to the OneDrive for Business sites that are specified by the
$MySiteListFile variable.

$MySitePrefixThis specifies the URL for your organization's MySite domain. This is the domain that
contains all the OneDrive for Business sites in your organization, for example,
"https://contoso-my.sharepoint.com" .

$MySiteListFileThis specifies the full path of the text file that you created in Step 1. This file contains
a list of OneDrive for Business sites in your organization, for example,
'C:\Users\<youralias>\Desktop\ListOfMysites.txt' . Be sure to surround the value for this variable
with single-quotation marks (' '). Note that you should specify the location that you saved the text file
to in Step 1.
3. Save the text file as a PowerShell script file by changing the file name suffix to .ps1. For example, save the
file OD4BAssignSCA.txt as OD4BAssignSCA.ps1.
4. In SharePoint Online Management Shell, go to the folder that contains the PowerShell script that you
created in the previous step, and then run the script, for example:

.\OD4BAssignSCA.ps1

You will be prompted to enter the password for the administrator account that you specified in the script. If
the script runs successfully, the message
"Making _\<user specified by $eDiscoveryUser\>_ a Site Collection Admin" is displayed for each OneDrive
for Business site that's listed in the input file specified by $MySiteListFile.

More information
The script that you ran in Step 3 uses the Set-SPOUser cmdlet to assign the specified user as a site
collection administrator to every OneDrive for Business that's listed in the file specified by the
$MySiteListFile variable. If you have a very large organization with thousands of users, consider doing the
following to make it easier to manage assigning eDiscovery permissions.
Edit the file that you created in Step 1 that contains the list of OneDrive for Business sites so that it
includes only the sites for users are that are involved in active legal cases.
Assign permissions to no more than 2,500 OneDrive for Business sites per day. For example, let's say
you have 10,000 OneDrive for Business sites in your organization. You could create the list in Step 1
to collect all the sites. Then you could use that file to create four files that each contain 2,500 users.
On the first day, you would run the script in Step 3 to assign permissions to the first 2,500 OneDrive
for Business sites. On the second day, you would run the script for the next 2,500 OneDrive for
Business sites, and so on.
Keep a record of the OneDrive for Business sites that were assigned eDiscovery permissions and the user
who is assigned as the site collection administrator. For example, after you assign permissions, you can save
the text file that contains the list of OneDrive for Business sites and add a line to it that identifies the user
who is assigned as the site collection administrator.
Users can view the list of site collection administators for their OneDrive for Business site. Because users are
site collection administrator for their own OneDrive for Business site, they can remove site collection
administrators. Consider doing the following to mitigate the chance of users removing the user who is
assigned eDiscovery permissions to OneDrive for Business sites.
Communicate to users that for eDiscovery and compliance purposes, a compliance officer has been
assigned as a site collection administrator to OneDrive for Business sites in your organization.
Re-run the script in Step 3, if necessary, to re-assign a user as the site collection administrator for
OneDrive for Business sites.
You can also use the script that you ran in Step 3 to remove a user as the site collection administrator from
OneDrive for Business sites. To remove a user as a site collection administrator, you have to change the
following command (near the end of the script) from:

Set-SPOUser -Site $fullsitepath -LoginName $eDiscoveryUser -IsSiteCollectionAdmin $true

to:

Set-SPOUser -Site $fullsitepath -LoginName $eDiscoveryUser -IsSiteCollectionAdmin $false

You can also change the following line in the script from:

"Making $eDiscoveryUser a Site Collection Admin"

to:

"Removing $eDiscoveryUser as a Site Collection Admin"

After you make these changes, save the script with a different name, such as OD4BRemoveSCA.ps1, and
then use it to remove a user as a site collection administrator from a group of OneDrive for Business sites.
Use a script to add users to a hold in an eDiscovery
case in the Office 365 Security & Compliance Center
9/26/2018 • 12 minutes to read • Edit Online

The Office 365 Security & Compliance Center provides lots of Windows PowerShell cmdlets that let you automate
time-consuming tasks related to creating and managing eDiscovery cases. Currently, using the eDiscovery case
tool in the Security & Compliance Center to place a large number of custodian content locations on hold takes
time and preparation. For example, before you create a hold, you have to collect the URL for each OneDrive for
Business site that you want to place on hold. Then for each user you want to place on hold, you have to add their
mailbox and their OneDrive for Business site to the hold. In future releases of the Security & Compliance Center,
this will get easier to do. Until then, you can use the script in this article to automate this process.
The script prompts you for the name of your organization's MySite domain (for example, contoso in the URL
https://contoso-my.sharepoint.com), the name of an existing eDiscovery case, the name of the new hold that
associated with the case, a list of email addresses of the users you want to put on hold, and a search query to use if
you want to create a query-based hold. The script then gets the URL for the OneDrive for Business site for each
user in the list, creates the new hold, and then adds the mailbox and OneDrive for Business site for each user in the
list to the hold. The script also generates log files that contain information about the new hold.
Here are the steps to make this happen:
Step 1: Install the SharePoint Online Management Shell
Step 2: Generate a list of users
Step 3: Run the script to create a hold and add users

Before you begin


You have to be a member of the eDiscovery Manager role group in the Security & Compliance Center and a
SharePoint Online global administrator to run the script in Step 3. For more information, see Assign
eDiscovery permissions in the Office 365 Security & Compliance Center.
A maximum of 1,000 mailboxes and 100 sites can be added to a hold that's associated with an eDiscovery
case in the Security & Compliance Center. Assuming that every user that you want to place on hold has a
OneDrive for Business site, you can add a maximum of 100 users to a hold using the script in this article.
Be sure to save the list of users that you create in Step 2 and the script in Step 3 to the same folder. That will
make it easier to run the script.
The script adds the list of users to a new hold that is associated with an existing case. Be sure the case that
you want to associate the hold with is created before you run the script.
The script includes minimal error handling. Its primary purpose is to quickly and easily place the mailbox
and OneDrive for Business site of each user on hold.
The sample scripts provided in this topic aren't supported under any Microsoft standard support program
or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims
all implied warranties including, without limitation, any implied warranties of merchantability or of fitness
for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Install the SharePoint Online Management Shell


The first step is to install the SharePoint Online Management Shell if it's not already installed on your local
computer. You don't have to use the shell in this procedure, but you have to install it because it contains pre-
requisites required by the script that you run in Step 3. These prerequisites allow the script to communicate with
SharePoint Online to get the URLs for the OneDrive for Business sites.
Go to Set up the SharePoint Online Management Shell Windows PowerShell environment and perform Step 1
and Step 2 to install the SharePoint Online Management Shell on your local computer.

Step 2: Generate a list of users


The script in Step 3 will create a hold that's associated with an eDiscovery case, and the add the mailboxes and
OneDrive for Business sites of a list of users to the hold. You can just type the email addresses in a text file, or you
can run a command in Windows PowerShell to get a list of email addresses and save them to a file (located in
same folder that you'll save the script to in Step 3).
Here's a PowerShell command (that you run by using remote PowerShell connected to your Exchange Online
organization) to get a list of email addresses for all users in your organization and save it to a text file named
HoldUsers.txt.

Get-Mailbox -ResultSize unlimited -Filter { RecipientTypeDetails -eq 'UserMailbox'} | Select-Object


PrimarySmtpAddress > HoldUsers.txt

After you run this command, open the text file and remove the header that contains the property name,
PrimarySmtpAddress . Then remove all email addresses except the ones for the users that you want to add to the
hold that you'll create in Step 3. Make sure there are no blank rows before or after the list of email addresses.

Step 3: Run the script to create a hold and add users


When you run the script in this step, it will prompt you for the following information. Be sure to have this
information ready before you run the script.
Your user credentials - The script will use your credentials to connect to the Security & Compliance Center
with remote PowerShell. It will also use these credentials to access SharePoint Online to get the OneDrive
for Business URLs for the list of users.
Name of your MySite domain - The MySite domain is the domain that contains all the OneDrive for
Business sites in your organization. For example, if the URL for your MySite domain is https://contoso-
my.sharepoint.com, then you would enter contoso when the script prompts you for the name of your
MySite domain.
Name of the case - The name of an existing case. The script will create a new hold that is associated with
this case.
Name of the hold - The name of the hold the script will create and associate with the specified case.
Search query for a query-based hold - You can create a query-based hold so that only the content that
meets the specified search criteria is placed on hold. To place all content on hold, just press Enter when
you're prompted for a search query.
Whether or not to turn the hold on - You can have the script turn the hold on after it's created or you can
have the script create the hold without enabling it. If you don't have the script turn on the hold, you can turn
it on later in the Security & Compliance Center or by running the following PowerShell commands:

Set-CaseHoldPolicy -Identity <name of the hold> -Enabled $true

Set-CaseHoldRule -Identity <name of the hold> -Disabled $false

Name of the text file with the list of users - The name of the text file from Step 2 that contains the list of
users to add to the hold. If this file is located in the same folder as the script, just type the name of the file
(for example, HoldUsers.txt). If the text file is in another folder, type the full pathname of the file.

After you've collected the information that the script will prompt you for, the final step is to run the script to create
the new hold and add users to it.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
AddUsersToHold.ps1 .

#script begin
" "
write-host "***********************************************"
write-host " Office 365 Security &amp; Compliance Center " -foregroundColor yellow -backgroundcolor
darkgreen
write-host " eDiscovery cases - Add users to a hold " -foregroundColor yellow -backgroundcolor darkgreen
write-host "***********************************************"
" "
# Get user credentials &amp; Connect to Office 365 SCC, SPO
$credentials = Get-Credential -Message "Specify your credentials to connect to the Office 365 Security &amp;
Compliance Center and SharePoint Online"
$s = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
"https://ps.compliance.protection.outlook.com/powershell-liveid" -Credential $credentials -Authentication
Basic -AllowRedirection -SessionOption (New-PSSessionOption -SkipCACheck -SkipCNCheck -SkipRevocationCheck)
$a = Import-PSSession $s -AllowClobber
if (!$s)
{
Write-Error "Couldn't create PowerShell session."
return;
}
# Load the SharePoint assemblies from the SharePoint Online Management Shell
# To install, go to http://go.microsoft.com/fwlink/p/?LinkId=255251
if (!$SharePointClient -or !$SPRuntime -or !$SPUserProfile)
{
$SharePointClient = [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client")
$SPRuntime = [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client.Runtime")
$SPUserProfile =
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint.Client.UserProfiles")
if (!$SharePointClient)
{
Write-Error "The SharePoint Online Management Shell isn't installed. Please install it from:
http://go.microsoft.com/fwlink/p/?LinkId=255251 and then re-run this script."
return;
}
}
if (!$spCreds)
{
$spCreds = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($credentials.UserName,
$credentials.Password)
}
# Get the user's MySite domain name. We use this to create the admin URL and root URL for OneDrive for
Business
""
$mySiteDomain = Read-Host "Enter the name of your organization's MySite domain. For example, 'contoso' for
'https://contoso-my.sharepoint.com'"
""
""
# Get other required information
do{
$casename = Read-Host "Enter the name of the case"
$caseexists = (get-compliancecase -identity "$casename" -erroraction SilentlyContinue).isvalid
if($caseexists -ne 'True')
{""
write-host "A case named '$casename' doesn't exist. Please specify the name of an existing case, or create a
new case and then re-run the script." -foregroundColor Yellow
""}
}While($caseexists -ne 'True')
""
do{
$holdName = Read-Host "Enter the name of the new hold"
$holdexists=(get-caseholdpolicy -identity "$holdname" -case "$casename" -erroraction SilentlyContinue).isvalid
if($holdexists -eq 'True')
{""
write-host "A hold named '$holdname' already exists. Please specify a new hold name." -foregroundColor Yellow
""}
}While($holdexists -eq 'True')
""
$holdQuery = Read-Host "Enter a search query to create a query-based hold, or press Enter to hold all content"
""
$holdstatus = read-host "Do you want the hold enabled after it's created? (Yes/No)"
do{
""
$inputfile = read-host "Enter the name of the text file that contains the email addresses of the users to add
to the hold"
""
$fileexists = test-path -path $inputfile
if($fileexists -ne 'True'){write-host "$inputfile doesn't exist. Please enter a valid file name." -
foregroundcolor Yellow}
}while($fileexists -ne 'True')
#Import the list of addresses from the txt file. Trim any excess spaces and make sure all addresses
#in the list are unique.
[array]$emailAddresses = Get-Content $inputfile -ErrorAction SilentlyContinue | where {$_.trim() -ne ""} |
foreach{ $_.Trim() }
[int]$dupl = $emailAddresses.count
[array]$emailAddresses = $emailAddresses | select-object -unique
$dupl -= $emailAddresses.count
#Validate email addresses so the hold creation does not run in to an error.
if($emailaddresses.count -gt 0){
write-host ($emailAddresses).count "addresses were found in the text file. There were $dupl duplicate entries
in the file." -foregroundColor Yellow
""
Write-host "Validating the email addresses. Please wait..." -foregroundColor Yellow
""
$finallist =@()
foreach($emailAddress in $emailAddresses)
{
if((get-recipient $emailaddress -erroraction SilentlyContinue).isvalid -eq 'True')
{$finallist += $emailaddress}
else {"Unable to find the user $emailaddress"
[array]$excludedlist += $emailaddress}
}
""
#find user's OneDrive Site URL using email address
Write-Host "Getting the URL for each user's OneDrive for Business site." -foregroundColor Yellow
""
$AdminUrl = "https://$mySiteDomain-admin.sharepoint.com"
$mySiteUrlRoot = "https://$mySiteDomain-my.sharepoint.com"
# Add the path of the User Profile Service to the SPO admin URL, then create a new webservice proxy to access
it
$proxyaddr = "$AdminUrl/_vti_bin/UserProfileService.asmx?wsdl"
$UserProfileService= New-WebServiceProxy -Uri $proxyaddr -UseDefaultCredential False
$UserProfileService.Credentials = $credentials
# Take care of auth cookies
$strAuthCookie = $spCreds.GetAuthenticationCookie($AdminUrl)
$uri = New-Object System.Uri($AdminUrl)
$container = New-Object System.Net.CookieContainer
$container = New-Object System.Net.CookieContainer
$container.SetCookies($uri, $strAuthCookie)
$UserProfileService.CookieContainer = $container
$urls = @()
foreach($emailAddress in $emailAddresses)
{
try{
$prop = $UserProfileService.GetUserProfileByName("i:0#.f|membership|$emailAddress") | Where-Object {
$_.Name -eq "PersonalSpace" }
$url = $prop.values[0].value
if($url -ne $null){
$furl = $mySiteUrlRoot + $url
$urls += $furl
Write-Host "- $emailAddress => $furl"
[array]$ODadded += $furl}
else{
Write-Warning "Couldn't locate OneDrive for $emailAddress"
[array]$ODExluded += $emailAddress
}}
catch {
Write-Warning "Could not locate OneDrive for $emailAddress"
[array]$ODExluded += $emailAddress
Continue }
}
if(($finallist.count -gt 0) -or ($urls.count -gt 0)){
""
Write-Host "Creating the hold named $holdname. Please wait..." -foregroundColor Yellow
if(($holdstatus -eq "Y") -or ($holdstatus -eq "y") -or ($holdstatus -eq "yes") -or ($holdstatus -eq "YES")){
New-CaseHoldPolicy -Name "$holdName" -Case "$casename" -ExchangeLocation $finallist -SharePointLocation $urls
-Enabled $True | out-null
New-CaseHoldRule -Name "$holdName" -Policy "$holdname" -ContentMatchQuery $holdQuery | out-null
}
else{
New-CaseHoldPolicy -Name "$holdName" -Case "$casename" -ExchangeLocation $finallist -SharePointLocation $urls
-Enabled $false | out-null
New-CaseHoldRule -Name "$holdName" -Policy "$holdname" -ContentMatchQuery $holdQuery -disabled $true | out-
null
}
""
}
else {"No valid locations were identified. Therefore, the hold wasn't created."}
#write log files (if needed)
$newhold=Get-CaseHoldPolicy -Identity "$holdname" -Case "$casename" -erroraction SilentlyContinue
$newholdrule=Get-CaseHoldRule -Identity "$holdName" -erroraction SilentlyContinue
if(($ODAdded.count -gt 0) -or ($ODExluded.count -gt 0) -or ($finallist.count -gt 0) -or ($excludedlist.count -
gt 0) -or ($newhold.isvalid -eq 'True') -or ($newholdrule.isvalid -eq 'True'))
{
Write-Host "Generating output files..." -foregroundColor Yellow
if($ODAdded.count -gt 0){
"OneDrive Locations" | add-content .\LocationsOnHold.txt
"==================" | add-content .\LocationsOnHold.txt
$newhold.SharePointLocation.name | add-content .\LocationsOnHold.txt}
if($ODExluded.count -gt 0){
"Users without OneDrive locations" | add-content .\LocationsNotOnHold.txt
"================================" | add-content .\LocationsNotOnHold.txt
$ODExluded | add-content .\LocationsNotOnHold.txt}
if($finallist.count -gt 0){
" " | add-content .\LocationsOnHold.txt
"Exchange Locations" | add-content .\LocationsOnHold.txt
"==================" | add-content .\LocationsOnHold.txt
$newhold.ExchangeLocation.name | add-content .\LocationsOnHold.txt}
if($excludedlist.count -gt 0){
" "| add-content .\LocationsNotOnHold.txt
"Mailboxes not added to the hold" | add-content .\LocationsNotOnHold.txt
"===============================" | add-content .\LocationsNotOnHold.txt
$excludedlist | add-content .\LocationsNotOnHold.txt}
$FormatEnumerationLimit=-1
if($newhold.isvalid -eq 'True'){$newhold|fl >.\GetCaseHoldPolicy.txt}
if($newholdrule.isvalid -eq 'True'){$newholdrule|Fl >.\GetCaseHoldRule.txt}
}
}
else {"The hold wasn't created because no valid entries were found in the text file."}
""
Write-host "Script complete!" -foregroundColor Yellow
""
#script end

2. On your local computer, open Windows PowerShell and go to the folder where you saved the script.
3. Run the script; for example:

.\AddUsersToHold.ps1

4. Enter the information that the script prompts you for.


The script connects to Security & Compliance Center PowerShell, and then creates the new hold in the
eDiscovery case and adds the mailboxes and OneDrive for Business for the users in the list. You can go to
the case on the eDiscovery page in the Security & Compliance Center to view the new hold.
After the script is finished running, it creates the following log files, and saves them to the folder where the script is
located.
LocationsOnHold.txt - Contains a list of mailboxes and OneDrive for Business sites that the script
successfully placed on hold.
LocationsNotOnHold.txt - Contains a list of mailboxes and OneDrive for Business sites that the script did
not place on hold. If a user has a mailbox, but not a OneDrive for Business site, the user would be included
in the list of OneDrive for Business sites that weren't placed on hold.
GetCaseHoldPolicy.txt - Contains the output of the Get-CaseHoldPolicy cmdlet for the new hold, which
the script ran after creating the new hold. The information returned by this cmdlet includes a list of users
whose mailboxes and OneDrive for Business sites were placed on hold and whether the hold is enabled or
disabled.
GetCaseHoldRule.txt - Contains the output of the Get-CaseHoldRule cmdlet for the new hold, which the
script ran after creating the new hold. The information returned by this cmdlet includes the search query if
you used the script to create a query-based hold.
Create a report on holds in eDiscovery cases in Office
365
9/26/2018 • 6 minutes to read • Edit Online

The script in this article lets eDiscovery administrators and eDiscovery managers generate a report that contains
information about all holds that are associated with eDiscovery cases in the Office 365 Security & Compliance
Center. The report contains information such as the name of the case a hold is associated with, the content
locations that are placed on hold, and whether the hold is query-based. If there are cases that don't have any holds,
the script will create an additional report with a list of cases without holds.
See the More information section for a detailed description of the information included in the report.

Before you begin


To generate a report on all eDiscovery cases in your organization, you have to be an eDiscovery
Administrator in your organization. If you are an eDiscovery Manager, the report will only include
information about the cases that you can access. For more information about eDiscovery permissions, see
Assign eDiscovery permissions in the Office 365 Security & Compliance Center.
The script in this article has minimal error handling. The primary purpose is to quickly create report about
the holds that are associated with the eDiscovery cases in your organization.
The sample scripts provided in this topic aren't supported under any Microsoft standard support program
or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims
all implied warranties including, without limitation, any implied warranties of merchantability or of fitness
for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and
documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the
creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or other
pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if
Microsoft has been advised of the possibility of such damages.

Step 1: Connect to the Security & Compliance Center using Remote


PowerShell
The first step is to connect Windows PowerShell to the Security & Compliance Center for your organization.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
ConnectSCC.ps1 .

# Get login credentials


$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://ps.compliance.protection.outlook.com/powershell-liveid -Credential $UserCredential -
Authentication Basic -AllowRedirection
Import-PSSession $Session -AllowClobber -DisableNameChecking
$Host.UI.RawUI.WindowTitle = $UserCredential.UserName + " (Office 365 Security &amp; Compliance Center)"

2. On your local computer, open Windows PowerShell and go to the folder where you saved the script.
3. Run the script; for example:

.\ConnectSCC.ps1

4. When prompted for your credentials, enter your email address and password, and then click OK.

Step 2: Run the script to report on holds associated with eDiscovery


cases
After you've connected to the Security & Compliance Center with remote PowerShell, the next step is to create and
run the script that collects information about the eDiscovery cases in your organization.
1. Save the following text to a Windows PowerShell script file by using a filename suffix of .ps1; for example,
CaseHoldsReport.ps1.

#script begin
" "
write-host "***********************************************"
write-host " Office 365 Security & Compliance Center " -foregroundColor yellow -backgroundcolor darkgreen
write-host " eDiscovery cases - Holds report " -foregroundColor yellow -backgroundcolor
darkgreen
write-host "***********************************************"
" "
#prompt users to specify a path to store the output files
$time=get-date
$Path = Read-Host 'Enter a file path to save the report to a .csv file'
$outputpath=$Path+'\'+'CaseHoldsReport'+' '+$time.day+'-'+$time.month+'-'+$time.year+'
'+$time.hour+'.'+$time.minute+'.csv'
$noholdsfilepath=$Path+'\'+'CaseswithNoHolds'+' '+$time.day+'-'+$time.month+'-'+$time.year+'
'+$time.hour+'.'+$time.minute+'.csv'
#add case details to the csv file
function add-tocasereport{
Param([string]$casename,
[String]$casestatus,
[datetime]$casecreatedtime,
[string]$casemembers,
[datetime]$caseClosedDateTime,
[string]$caseclosedby,
[string]$holdname,
[String]$Holdenabled,
[string]$holdcreatedby,
[string]$holdlastmodifiedby,
[string]$ExchangeLocation,
[string]$sharePointlocation,
[string]$ContentMatchQuery,
[datetime]$holdcreatedtime,
[datetime]$holdchangedtime
)
$addRow = New-Object PSObject
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case name" -Value $casename
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case status" -Value $casestatus
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case members" -Value $casemembers
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case created time" -Value $casecreatedtime
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case closed time" -Value $caseClosedDateTime
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Case closed by" -Value $caseclosedby
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold name" -Value $holdname
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold enabled" -Value $Holdenabled
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold created by" -Value $holdcreatedby
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold last changed by" -Value
$holdlastmodifiedby
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Exchange locations" -Value $ExchangeLocation
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "SharePoint locations" -Value
$sharePointlocation
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold query" -Value $ContentMatchQuery
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold query" -Value $ContentMatchQuery
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold created time (UTC)" -Value
$holdcreatedtime
Add-Member -InputObject $addRow -MemberType NoteProperty -Name "Hold changed time (UTC)" -Value
$holdchangedtime
$allholdreport = $addRow | Select-Object "Case name","Case status","Hold name","Hold enabled","Case members",
"Case created time","Case closed time","Case closed by","Exchange locations","SharePoint locations","Hold
query","Hold created by","Hold created time (UTC)","Hold last changed by","Hold changed time (UTC)"
$allholdreport | export-csv -path $outputPath -notypeinfo -append -Encoding ascii
}
#get information on the cases and pass values to the case report function
" "
write-host "Gathering a list of cases and holds..."
" "
$edc =Get-ComplianceCase -ErrorAction SilentlyContinue
foreach($cc in $edc)
{
write-host "Working on case :" $cc.name
if($cc.status -eq 'Closed')
{
$cmembers = ((Get-ComplianceCaseMember -Case $cc.name).windowsLiveID)-join ';'
add-tocasereport -casename $cc.name -casestatus $cc.Status -caseclosedby $cc.closedby -caseClosedDateTime
$cc.ClosedDateTime -casemembers $cmembers
}
else{
$cmembers = ((Get-ComplianceCaseMember -Case $cc.name).windowsLiveID)-join ';'
$policies = Get-CaseHoldPolicy -Case $cc.Name | %{ Get-CaseHoldPolicy $_.Name -Case $_.CaseId -
DistributionDetail}
if ($policies -ne $NULL)
{
foreach ($policy in $policies)
{
$rule=Get-CaseHoldRule -Policy $policy.name
add-tocasereport -casename $cc.name -casemembers $cmembers -casestatus $cc.Status -casecreatedtime
$cc.CreatedDateTime -holdname $policy.name -holdenabled $policy.enabled -holdcreatedby $policy.CreatedBy -
holdlastmodifiedby $policy.LastModifiedBy -ExchangeLocation (($policy.exchangelocation.name)-join ';') -
SharePointLocation (($policy.sharePointlocation.name)-join ';') -ContentMatchQuery $rule.ContentMatchQuery -
holdcreatedtime $policy.WhenCreatedUTC -holdchangedtime $policy.WhenChangedUTC
}
}
else{
write-host "No hold policies found in case:" $cc.name -foregroundColor 'Yellow'
" "
[string]$cc.name | out-file -filepath $noholdsfilepath -append
}
}
}

" "
Write-host "Script complete! Report files saved to this folder: '$Path'"
" "
#script end

2. In the Windows PowerShell session that opened in Step 1, go to the folder where you saved the script.
3. Run the script; for example:

.\CaseHoldsReport.ps1

The script will prompt for a target folder to save the report to.
4. Type the full path name of the folder to save the report to, and then press Enter.
TIP
To save the report in the same folder that the script is located in, type a period (".") when prompted for a target
folder. To save the report in a subfolder in the folder where the script is located, just type the name of the subfolder.

The script starts to collect information about all the eDiscovery cases in your organization. Don't access the
report file while the script is running. After the script is complete, a confirmation message is displayed in the
Windows PowerShell session. After this message is displayed, you can access the report in the folder that
you specified in Step 4. The file name for the report is CaseHoldsReport<DateTimeStamp>.csv .
Addtionally, the script also creates a report with a list of cases that don't have any holds. The file name for
this report is CaseswithNoHolds<DateTimeStamp>.csv .
Here's an example of running the CaseHoldsReport.ps1 script.

More information
The case holds report that's created when you run the script in this article contains the following information about
each hold. As previously explained, you have to be an eDiscovery Administrator to return information for all holds
in your organization. For more information about case holds, see eDiscovery cases in the Office 365 Security &
Compliance Center.
The name of the hold and the name of the eDiscovery case that the hold is associated with.
Whether or not the eDiscovery case is active or closed.
Whether or not the hold is enabled or disabled.
The members of the eDiscovery case that the hold is associated with. Case members can view or manage a
case, depending on the eDiscovery permissions they've been assigned.
The time and date the case was created.
If a case is closed, the person who closed it and the time and date it was closed.
The Exchange mailboxes and SharePoint sites locations that are on hold.
If the hold is query-based, the query syntax.
The time and date the hold was created and the person who created it.
The time and date the hold was last changed and the person who changed it.
eDiscovery cases in the Office 365 Security &
Compliance Center
10/29/2018 • 41 minutes to read • Edit Online

You can use eDiscovery cases in the Office 365 Security & Compliance Center to control who can create, access,
and manage eDiscovery cases in your organization. If your organization has an Office 365 E5 subscription, you
can also use eDiscovery cases to analyze search results by using Office 365 Advanced eDiscovery.
An eDiscovery case allows you to add members to a case, control what types of actions that specific case
members can perform, place a hold on content locations relevant to a legal case, and associate multiple Content
Searches with a single case. You can also export the results of any Content Search that is associated with a case or
prepare search results for analysis in Advanced eDiscovery. eDiscovery cases are a good way to limit who has
access to Content Searches and search results for a specific legal case in your organization.
Use the following workflow to set up and use eDiscovery cases in the Security & Compliance Center and
Advanced eDiscovery.
Step 1: Assign eDiscovery permissions to potential case members
Step 2: Create a new case
Step 3: Add members to a case
Step 4: Place content locations on hold
Step 5: Create and run a Content Search associated with a case
Step 6: Export the results of a Content Search associated with a case
Step 7: Prepare search results for Advanced eDiscovery
Step 8: Go to the case in Advanced eDiscovery
(Optional) Step 9: Close a case
(Optional) Step 10: Re-open a closed case
More information

Step 1: Assign eDiscovery permissions to potential case members


The first step is to assign the appropriate eDiscovery-related permissions to people so you can add them to an
eDiscovery case in Step 2. You have to be a member of the Organization Management role group (or be assigned
the Role Management role) in the Office 365 Security & Compliance Center to assign eDiscovery permissions.
The following list describes the eDiscovery-related role groups in the Security & Compliance Center.
Reviewer - This role group has the most restrictive eDiscovery-related permissions. The primary purpose
of this role group is to allow members to view and access case data in Office 365 Advanced eDiscovery.
Members of this group can only see and open the list of the cases on the eDiscovery page in the Security
& Compliance Center that they are members of. After the user accesses a case in the Security &
Compliance Center, they can click Switch to Advanced eDiscovery to access and analyze the case data
in Advanced eDiscovery. They can't create cases, add members to a case, create holds, create searches,
preview search results, export search results, or prepare results for Advanced eDiscovery.
eDiscovery Manager - Members of this role group can create and manage eDiscovery cases. They can
add and remove members, place content locations on hold, create and edit Content Searches associated
with a case, export the results of a Content Search, and prepare search results for analysis in Advanced
eDiscovery. There are two sub-groups in this role group. The difference between these subgroups is based
on scope.
eDiscovery Manager - Can view and manage the eDiscovery cases they create or are a member
of. If another eDiscovery Manager creates a case but doesn't add a second eDiscovery Manager as a
member of that case, the second eDiscovery Manager won't be able to view or open the case on the
eDiscovery page in the Security & Compliance Center. eDiscovery Managers can also access their
cases in Advanced eDiscovery to perform analysis tasks.
eDiscovery Administrator - Can perform all case management tasks that an eDiscovery Manager
can do. Additionally, an eDiscovery Administrator can:
View all cases that are listed on the eDiscovery page.
Manage any case in the organization after they add themself as a member of the case.
Access case data in Advanced eDiscovery for any case in the organization.
See the More information section for reasons why you may want an eDiscovery Administrator in
your organization.

IMPORTANT
If a person isn't a member of one of these eDiscovery-related role groups, or isn't a member of a role group that's assigned
the Reviewer role, you can't add them as a member of an eDiscovery case.

For more information about eDiscovery permissions, see Assign eDiscovery permissions in the Office 365
Security & Compliance Center.
To assign eDiscovery permissions:
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the Security & Compliance Center, click Permissions, and then do one of the following based on the
eDiscovery permissions that you want to assign.
To assign Reviewer permissions, select the Reviewer role group, and then next to Members, click
Edit. Click Choose members, click Edit, click Add, select the user that you want to add to the
Reviewer role group, and then click Add.
To assign eDiscovery Manager permissions, select the eDiscovery Manager role group, and then
next to eDiscovery Manager, click Edit. Click Choose eDiscovery Manager, click Edit, click **
Add **, select the user that you want to add as an eDiscovery Manager, and then click Add.
To assign eDiscovery Administrator permissions, select the eDiscovery Manager role group, and
then next to eDiscovery Administrator, click Edit. Click Choose eDiscovery Administrator,
click Edit, click Add, select the user that you want to add as an eDiscovery Administrator, and
then click Add.
4. After you've added all the users, click Done, click Save to save the changes to the role group, and then
click Close.
Step 2: Create a new case
The next step is to create a new eDiscovery case. You must be a member of the eDiscovery Managers role group
to create eDiscovery cases. As previously explained, after you create a new case in the Security & Compliance
Center, you (and other case members) will be able to access that same case in Advanced eDiscovery if you're
organization has an Office 365 E5 subscription.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the Security & Compliance Center, click Search & investigation > eDiscovery, and then click
Create a case.
4. On the New Case page, give the case a name, type an optional description, and then click Save. Note that
the case name must be unique in your organization.

The new case is displayed in the list of cases on the eDiscovery page. Note that you can hover the cursor
over a case name to display information about the case, including the status of the case ( Active or
Closed), the description of the case (that was created in the previous step), and when the case was changed
last and who changed it.

TIP
After you create a new case, you can rename it anytime. Just click the name of the case on the eDiscovery page.
On the Manage this case flyout page, change the name displayed in the box under Name, and then save the
change.

Step 3: Add members to a case


After you create a new case, the next step is to add members to the case. As previous explained, only users who
are members of the Reviewer or eDiscovery Manager role groups can be added as members of the case. Note
that the eDiscovery Manager who created the case is automatically added as a member.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to add members to.
The Manage this case flyout page is displayed.
3. Under Manage members, click Add to add members to the case.
You can also choose to add a role group to the case. Under Manage role groups, click Add.

NOTE
Role groups control who can assign members to an eDiscovery case. That means you can only assign the role
groups that you are a member of to a case.

4. In the list of people or role groups that can be added as members of the case, click the check box next to
the names of the people or role groups that you want to add.
TIP
If you have a large list of people who can added as members, use the Search box to search for a specific person in
the list.

5. After you've selected the people or role groups to add as members of the group, click Add.
In Manage this case, click Save to save the new list of case members.
6. Click Save to save the new list of case members.

Step 4: Place content locations on hold


You can use an eDiscovery case to create holds to preserve content that might be relevant to the case. You can
place a hold on the mailboxes and OneDrive for Business sites of people who are custodians in the case. You can
also place a hold on the group mailbox, SharePoint site, and OneDrive for Business site for an Office 365 Group.
Similarly, you can place a hold on the mailbox and site that are associated with Microsoft Teams. When you place
content locations on hold, content is held until you remove the hold from the content location or until you delete
the hold.
When you create a hold, you have the following options to scope the content that is held in the specified content
locations:
You create an infinite hold where all content is placed on hold. Alternatively, you can create a query-based
hold where only content that matches a search query is placed on hold.
You can specify a date range to hold only the content that was sent, received, or created within that date
range. Alternatively, you can hold all content regardless of when it was sent, received, or created.

NOTE
You can have a maximum of 10,000 hold policies across all eDiscovery cases in your organization.

To create a hold for an eDiscovery case:


1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to create the holds in.
3. On the Home page for the case, click the Hold tab.

4. On the Hold page, click Create.


5. On the Name your hold page, give the hold a name. The name of the hold must be unique in your
organization.
6. (Optional) In the Description box, add a description of the hold.
7. Click Next.
8. Choose the content locations that you want to place on hold. You can place mailboxes, sites, and public
folders on hold.

a. Exchange email - Click Choose users, groups, or teams and then click Choose users, groups, or
teams again. to specify mailboxes to place on hold. Use the search box to find user mailboxes and
distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also
place a hold on the associated mailbox for an Office 365 Group or a Microsoft Team. Select the user, group,
team check box, click Choose, and then click Done.

NOTE
When you click Choose users, groups, or teams to specify mailboxes to place on hold, the mailbox picker that's
displayed is empty. This is by design to enhance performance. To add people to this list, type a name (a minimum of
3 characters) in the search box.

b. SharePoint Sites - Click Choose sites and then click Choose sites again to specify SharePoint and
OneDrive for Business sites to place on hold. Type the URL for each site that you want to place on hold.
You can also add the URL for the SharePoint site for an Office 365 Group or a Microsoft Team. Click
Choose, and then click Done.
See the More information section for tips on putting Office 365 Groups and Microsoft Teams on hold.

NOTE
In the rare case that a person's user principal name (UPN) is changed, the URL for their OneDrive account will also
be changed to incorporate the new UPN. If this happens, you'll have to modify the hold by adding the user's new
OneDrive URL and removing the old one.

c. Exchange public folders - Move the toggle switch to the All position to put all public folders in
your Exchange Online organization on hold. Note that you can't choose specific public folders to put on
hold. Leave the toggle switch set to None if you don't want to put a hold on public folders.
9. When you're done adding content locations to the hold, click Next.
10. To create a query-based hold with conditions, complete the following. Otherwise, just click Next

a. In the box under Keywords, type a search query in the box so that only the content that meets the search
criteria is placed on hold. You can specify keywords, message properties, or document properties, such as
file names. You can also use more complex queries that use a Boolean operator, such as AND, OR, or NOT.
If you leave the keyword box empty, then all content located in the specified content locations will be
placed on hold.
b. Click Add conditions to add one or more conditions to narrow the search query for the hold. Each
condition adds a clause to the KQL search query that is created and run when you create the hold. For
example you can specify a date range so that email or site documents that were created within the date
ranged are placed on hold. A condition is logically connected to the keyword query (specified in the
keyword box) by the AND operator. That means that items have to satisfy both the keyword query and the
condition to be placed on hold.
For more information about creating a search query and using conditions, see Keyword queries and search
conditions for Content Search.
11. After configuring a query-based hold, click Next.
12. Review your settings, and then click Create this hold.
Hold statistics
After a while, information about the new hold is displayed in the details pane on the Holds page for the selected
hold. This information includes the number of mailboxes and sites on hold and statistics about the content that
was placed on hold, such as the total number and size of items placed on hold and the last time the hold statistics
were calculated. These hold statistics help you identify how much content that's related to the eDiscovery case is
being held.
Keep the following things in mind about hold statistics:
The total number of items on hold indicates the number of items from all content sources that are placed
on hold. If you've created a query-based hold, this statistic indicates the number of items that match the
query.
The number of items on hold also includes unindexed items found in the content locations. Note that if you
create a query-based hold, all unindexed items in the content locations are placed on hold. This includes
unindexed items that don't match the search criteria of a query-based hold and unindexed items that might
fall outside of a date range condition. This is different than what happens when you run a Content Search,
in which unindexed items that don't match the search query or are excluded by a date range condition
aren't included in the search results. For more information about unindexed items, see Partially indexed
items in Content Search in Office 365.
You can get the latest hold statistics by clicking Update statistics to re-run a search estimate that
calculates the current number of items on hold. If necessary, click Refresh in the toolbar to update the
hold statistics in the details pane.
It's normal for the number of items on hold to increase over time because users whose mailbox or site is
on hold are typically sending or receiving new email message and creating new SharePoint and OneDrive
for Business documents.

NOTE
If a SharePoint site or OneDrive account is moved to a different region in a multi-geo environment, the statistics for that
site won't be included in the hold statistics. However, the content in the site will still be on hold. Also, if a site is moved to a
different region the URL that's displayed in the hold will not be updated. You'll have to edit the hold and update the URL.

Step 5: Create and run a Content Search associated with a case


After an eDiscovery case is created and any custodians related to the case are placed on hold, you can create and
run one or more Content Searches that are associated with the case. Content Searches associated with a case
aren't listed on the Search page in the Security & Compliance Center. This means that Content Searches
associated with a case can only be accessed by case members who are also members of the eDiscovery Manager
role group.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to create a Content Search in.
3. On the Home page for the case, click the Search tab.

4. On the Search page, click New search.


5. On the New search page, you can add keywords and conditions to create the search query.

6. You can specify keywords, message properties, such as sent and received dates, or document properties,
such as file names or the date that a document was last changed. You can use more complex queries that
use a Boolean operator, such as AND, OR, NOT, NEAR, or ONEAR. You can also search for sensitive
information (such as social security numbers) in documents, or search for documents that have been
shared externally. If you leave the keyword box empty, all content located in the specified content locations
will be included in the search results.
7. You can click the Show keyword list check box and the type a keyword in each row. If you do this, the
keywords on each row are connected by the OR operator in the search query that's created.
Why use the keyword list? You can get statistics that show how many items match each keyword. This can
help you quickly identify which keywords are the most (and least) effective. You can also use a keyword
phrase (surrounded by parentheses) in a row. For more information about search statistics, see View
keyword statistics for Content Search results.
For more information about using the keywords list, see Building a search query.
8. Under Conditions, add conditions to a search query to narrow a search and return a more refined set of
results. Each condition adds a clause to the KQL search query that is created and run when you start the
search. A condition is logically connected to the keyword query (specified in the keyword box) by the AND
operator. That means that items have to satisfy both the keyword query and the condition to be included in
the results. This is how conditions help to narrow your results.
For more information about creating a search query and using conditions, see Keyword queries for
Content Search.
9. Under Locations: locations on hold, choose the content locations that you want to search. You can
search mailboxes, sites, and public folders in the same search.

All locations - Select this option to search all content locations in your organization. When you select this
option, you can choose to search all Exchange mailboxes (which includes the mailboxes for all Office 365
Groups and Microsoft Teams), all SharePoint and OneDrive for Business sites (which includes the sites for
all Office 365 Groups and Microsoft Teams), and all public folders.
All locations on hold - Select this option to search all the content locations that have been placed on hold
in the case. If the case contains multiple holds, the content locations from all holds will be searched when
you select this option. Additionally, if a content location was placed on a query-based hold, only the items
that are on hold will be searched when you run the content search that you're creating in this step. For
example, if a user was placed on query-based case hold that preserves items that were sent or created
before a specific date, only those items would be searched by using the search criteria of the content
search. This is accomplished by connecting the case hold query and the content search query by an AND
operator. See the More information section at the end of this article for more details about searching case
content.
Specific locations - Select this option to select the mailboxes and sites that you want to search. When you
select this option and click Modify, a list of locations appears. You can choose to search any or all users,
groups, teams, or site locations.

You can also choose to search all public folders in your organization, but if you select this option and search
any content location that's on hold, any query from a query-based case hold won't be applied to the search
query. In other words, all content in a location is searched, not just the content that is preserved by a query-
based case hold.
You can remove the pre-populated case content locations or add new ones. If you choose this option, you
also have flexibility to search all content locations for a specific service (such as searching all Exchange
mailboxes) or you can search specific content locations for a service. You can also choose whether or not to
search the public folders in your organization.
Keep these things in mind when adding content locations to search:
When you click Choose users, groups, or teams to specify mailboxes to search, the mailbox picker that's
displayed is empty. This is by design to enhance performance. To add recipients to this list, click Choose
users, groups, or teams, type a name (a minimum of 3 characters) in the search box, select the check box
next to the name, and then click Choose.
You can add inactive mailboxes, Office 365 Groups, Microsoft Teams, and distribution groups to the list of
mailboxes to search. Dynamic distribution groups aren't supported. If you add Office 365 Groups or
Microsoft Teams, the group or team mailbox is searched; the mailboxes of the group members aren't
searched.
To add sites click Choose sites, click Choose sites again, and then type the URL for each site that you
want to search. You can also add the URL for the SharePoint site for Office 365 Groups and Microsoft
Teams.
7. After you select the content locations to search, click Done and then click Save.
8. On the New search page, click Save and then type a name for the search. Content Searches associated
with a case must have names that are unique within your Office 365 organization.
9. Click Save & run to save the search settings.
10. Enter a unique name for the search, and click Save to start the search.
The search begins. After a while, an estimate of the search results is displayed in the details pane. The
estimate includes the total size and number of items that matched the search criteria. The search estimate
also includes the number of unindexed items in the content locations that were searched. The number of
unindexed items that don't meet the search criteria will be included in the search statistics displayed in the
details pane. If an unindexed item matches the search query (because other message or document
properties meet the search criteria), it won't be included in the estimated number of unindexed items. If an
unindexed item is excluded by the search criteria, it also won't be included in the estimate of unindexed
items.
After the search is completed, you can preview the search results. If necessary, click Refresh to update
the information in the details pane.

Step 6: Export the results of a Content Search associated with a case


After a search is successfully run, you can export the search results. When you export search results, mailbox
items are downloaded in PST files or as individual messages. When you export content from SharePoint and
OneDrive for Business sites, copies of native Office documents and other documents are exported. A manifest file
(in XML format) that contains information about every search result is also exported.
You can export the results of a Export the results of a single search associated with a case or you can export the
results of Export the results of multiple searches associated with a case.
Export the results of a single search associated with a case
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to export search from.
3. On the Home page for the case, click Search.
4. In the list of searches for the case, click the search that you want to export search results from, click
More, and then select Export results from the drop-down list.
The Export results page is displayed.
The workflow to export the results from a Content Search associated with a case is that same as exporting
the search results for a search on the Content search page. For step-by-step instructions, see Export
Content Search results from the Office 365 Security & Compliance Center.

NOTE
When you export search results, you have the option to enable de-duplication so that only one copy of an email
message is exported even though multiple instances of the same message might have been found in the mailboxes
that were searched. For more information about de-duplication and how duplicate items are identified, see De-
duplication in eDiscovery search results.

5. Click the Export tab to display the list of export jobs that exist for that case.
You might have to click Refresh to update the list of export jobs so that it shows the export job that you
just created. Note that export jobs have the same name as the corresponding Content Search with _Export
appended to the end of search name.
6. Click the export job that you just created to display status information in the details pane. This information
includes the percentage of items that have been transferred to an Azure storage area in the Microsoft
cloud.
After all items have been transferred, click Download results to download the search results to your local
computer. For more information, see Step 2 in Export Content Search results from the Office 365 Security
& Compliance Center
Export the results of multiple searches associated with a case
As an alternative to exporting the results of a single Content Search associated with a case, you can export the
results of multiple searches from the same case in a single export. Exporting the results of multiple searches is
faster and easier than exporting the results one search at a time.

NOTE
You can't export the results of multiple searches if one of those searches was configured to search all case content. only
export the results of multiple searches for searches that are associated with an eDiscovery case. You can't export the results
of multiple searches listed on the Content search page in the Security & Compliance Center.

1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to export search results from.
3. On the Home page for the case, click Search.
4. In the list of searches for the case, select two or more searches that you want to export search results from.

NOTE
To select multiple searches, press Ctrl as you click each search. Or you can select multiple adjacent searches by
clicking the first search, holding down the Shift key, and then clicking the last search.

5. After you select the searches, the Bulk actions page appears.
6. Click Export results.
7. On the Export results page, give the export a unique name, select output options, and choose how your
content will be exported. Click Export.
The workflow to export the results from multiple content searches associated with a case is the same as
exporting the search results for a single search. For step-by-step instructions, see Export Content Search
results from the Office 365 Security & Compliance Center.

NOTE
When you export search results from multiple searches associated with a case, you also have the option to enable
de-duplication so that only one copy of an email message is exported even though multiple instances of the same
message might have been found in the mailboxes that were searched in one or more of the searches. For more
information about de-duplication and how duplicate items are identified, see De-duplication in eDiscovery search
results.

8. After you start the export, click the Export tab to display the list of export jobs for that case.

You might have to click Refresh to update the list of export jobs to display the export job that you just
created. Note that the searches that were included in the export job are listed in the Searches column.
9. Click the export job that you just created to display status information in the details pane. This information
includes the percentage of items that have been transferred to an Azure storage area in the Microsoft
cloud.
10. After all items have been transferred, click Download results to download the search results to your local
computer. For more information, see Step 2 in Export search results from the Office 365 Security &
Compliance Center
More information about exporting the results of multiple searches
When you export the results of multiple searches, the search queries from all the searches are combined by
using OR operators, and then the combined search is started. The estimated results of the combined
search are displayed in the details pane of the selected export job. The search results are then transferred
to the Azure storage area in the Microsoft cloud. The status of the transfer is also displayed in the details
pane. As previously stated, after all the search results have been transferred, you can download them to
your local computer.
The maximum number of keywords from the search queries for all searches that you want to export is 500.
(this is the same limit for a single Content Search). That's because the export job combines all the search
queries by using the OR operator. If you exceed this limit, an error will be returned. In this case, you'll have
to export the results from fewer searches or simplify the search queries of the searches that you want to
export.
The search results that are exported are organized by the content source the item was found in. That
means a content source in the export results might have items returned by different searches. For example,
if you chose to export email messages in one PST file for each mailbox, the PST file might have results
from multiple searches.
If the same email item or document from the same content location is returned by more than one of the
searches that you export, only one copy of the item will be exported.
You can't edit an export for multiple searches after you create it. For example, you can't add or remove
searches from the export. You'll have to create a new export job to change which search results are
exported. After a export job is created, you only can download the results to a computer, restart the export,
or delete the export job.
If you restart the export, any changes to the queries of the searches that make up the export job won't
affect the search results that will be retrieved. When you restart an export, the same combined search
query job that was run when the export job was created will be run again.
If you restart an export from the Exports page in an eDiscovery case, the search results that are
transferred to the Azure storage area will overwrite the previous results; the previous results there were
transferred won't be available to be downloaded.
Preparing the results of multiple searches for analysis in Advanced eDiscovery isn't available. You can only
prepare the results of a single search for analysis in Advanced eDiscovery.

Step 7: Prepare search results for Advanced eDiscovery


If your organization has an Office 365 E5 subscription, you can prepare the results of Content Searches
associated with a case for analysis in Advanced eDiscovery. After you prepare search results, you can go to
Advanced eDiscovery (see Step 8: Go to the case in Advanced eDiscovery) and process the search result data for
further analysis in Advanced eDiscovery.
When you prepare search results for Advanced eDiscovery, optical character recognition (OCR ) functionality
automatically extracts text from images. OCR is supported for loose files, email attachments, and embedded
images. This allows you to apply the text analytic capabilities of Advanced eDiscovery (near-duplicates, email
threading, themes, and predictive coding) to any text in image files.
NOTE
To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned an Office 365 E5
license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an Advanced eDiscovery standalone license.
Administrators and compliance officers who are assigned to cases and use Advanced eDiscovery to analyze data don't need
an E5 license.

1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to prepare search results for analysis in Advanced eDiscovery.
3. On the Home page for the case, click Search, and then select the search.
4. In the details pane, click More, and then click Prepare for Advanced eDiscovery.

5. On the Prepare for Advanced eDiscovery page, choose to prepare one of the following:
All items, excluding those with unrecognized format, are encrypted, or weren't indexed for other
reasons.
All items, including those that have unrecognized format, are encrypted, or weren't indexed for other
reasons.
Only items that have an unrecognizable format, are encrypted, or weren't indexed for other reasons.
6. (Optional) Click the Include versions for SharePoint files check box.
7. Click Prepare.
The search results are prepared for analysis with Advanced eDiscovery.
8. Click Close to close the details pane.
Step 8: Go to the case in Advanced eDiscovery
After you create a case in the Security & Compliance Center, you can go to the same case in Advanced
eDiscovery.
To go to a case in Advanced eDiscovery:
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click Open next to the case that you want to go to in Advanced eDiscovery.
3. On the Home page for the case, click Switch to Advanced eDiscovery.

The Connecting to Advanced eDiscovery progress bar is displayed. When you're connected to
Advanced eDiscovery, a list of containers is displayed on the page.

These containers represent the search results that you prepared for analysis in Advanced eDiscovery in
Step 7. Note that the name of the container has the same name as Content Search in the case in the
Security & Compliance Center. The containers in the list are the ones that you prepared. If a different user
prepared search results for Advanced eDiscovery, the corresponding containers won't be included in the
list.
4. To load the search result data from a container to the case in Advanced eDiscovery, select a container and
click Process.
For information about how to process containers, see Run the Process module and load data in Office 365
Advanced eDiscovery.

TIP
Click Switch to eDiscovery to go back to the same case in the Security & Compliance Center.

(Optional) Step 9: Close a case


When the legal case or investigation supported by an eDiscovery case is completed, you can close the case. Here's
what happens when you close a case:
If the case contains any content locations on hold, those holds will be turned off. This might result in
content being permanently deleted or purged, either by the user or by an automated process, such as a
deletion policy.
Closing a case only turns off the holds that are associated with that case. If other holds are place on a
content location (such as a Litigation Hold. a Preservation Policy, or a hold from a different eDiscovery
case) those holds will still be maintained.
The case is still listed on the eDiscovery page in the Security & Compliance Center. The details, holds,
searches, and members of a closed case are retained.
You can edit a case after it's closed. For example, you can add or removing members, create searches,
export search results, and prepare search result for analysis in Advanced eDiscovery. The primary
difference between active and closed cases is that holds are turned off when a case is closed.
To close a case:
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to close.
The Manage this case flyout page is displayed.
3. Under Manage case status, click Close case.
A warning is displayed saying that the holds associated with the case will be turned off.
4. Click Yes to close the case.
The status on the Manage this case flyout page is changed from Active to Closing.
5. Close the Manage this case page.
6. On the eDiscovery page, click Refresh to update the status of the closed case. It might take up to 60
minutes for the closing process to complete.
When the process is complete, the status of the case is changed to Closed on the eDiscovery page. Click
the name of the case again to display the Manage this case flyout page, which contains information about
when the case was closed and who closed it.

(Optional) Step 10: Re-open a closed case


When you reopen a case, any holds that were in place when the case was closed won't be automatically reinstated.
After the case is reopened, you'll have to go to the Hold page and turn on the previous holds. To turn a hold on,
select it and click Turn it on in the details pane.
1. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
2. Click the name of the case that you want to reopen.
The Manage this case flyout page is displayed.
3. Under Manage case status, click Reopen case.
A warning is displayed saying that the holds that were associated with the case when it was closed won't be
turned on automatically.
4. Click Yes to reopen the case.
The status on the Manage this case flyout page is changed from Closed to Active.
5. Close the Manage this case page.
6. On the eDiscovery page, click Refresh to update the status of the reopened case. It might take up to 60
minutes for the reopening process to complete.
When the process is complete, the status of the case is changed to Active on the eDiscovery page.

More information
Are there any limits for eDiscovery cases or holds associated with an eDiscovery case? The
following table lists the limits for eDiscovery cases and case holds.

DESCRIPTION OF LIMIT LIMIT

Maximum number of cases for an organization No limit

Maximum number of case holds for an organization 10,000

Maximum number of mailboxes in a single case hold 1,000

Maximum number of SharePoint and OneDrive for 100


Business sites in a single case hold

What about cases that were created on the case management page in Advanced eDiscovery? You
can access a list of older Advanced eDiscovery cases by clicking the link at the bottom on the eDiscovery
page in the Security & Compliance Center. However, to do any work in an older case, you have to contact
Office 365 Support and request that the case be moved to a new eDiscovery case in the Security &
Compliance Center.
Why create an eDiscovery Administrator? As previously explained, an eDiscovery Administrator is
member of the eDiscovery Manager role group who can view and access all eDiscovery cases in your
organization. This ability to access all the eDiscovery cases has two important purposes:
If a person who is the only member of an eDiscovery case leaves your organization, no one
(including members of the Organization Management role group or another member of the
eDiscovery Manager role group) can access that eDiscovery case because they aren't a member of a
case. In this situation, there would be no way to access the data in the case. But because an
eDiscovery Administrator can access all eDiscovery cases in the organization, they can view the case
in the Security & Compliance Center and add themselves or another eDiscovery manager as a
member of the case.
Because an eDiscovery Administrator can view and access all eDiscovery cases, they can audit and
oversee all cases and associated Content Searches. This can help to prevent any misuse of Content
Searches or eDiscovery cases. And because eDiscovery Administrators can access potentially
sensitive information in the results of a Content Search, you should limit the number of people who
are eDiscovery Administrators.
Finally, as previous explained, eDiscovery Administrators in the Security & Compliance Center are
automatically added as administrators in Advanced eDiscovery. That means a person who is an
eDiscovery Administrator can perform administrative tasks in Advanced eDiscovery, such as setting
up users, creating cases, and adding data to cases.
What are the licensing requirements to place content locations on hold? In general, organizations
require an Office 365 E3 subscription or higher to place content locations on hold. To place mailboxes on
hold, an Exchange Online Plan 2 license is required.
What else should you know about searching all case content in Step 5? As previously explained, you
can search the content locations that have been placed on hold in the case. When you do this, only the
content that matches the hold criteria is search. If there is no hold criteria, all content is searched. If
contents are on a query-based hold, only the content that matches both hold criteria (from the hold placed
in Step 4) and the search criteria (from the search in Step 5) is returned with the search results.
Here are some other things to keep in mind when searching all case content:
If a content location is part of multiple holds within the same case, the hold queries are combined by
an OR operator when you search that content location using the all case content option. Similarly, if
a content location is part of two different holds, where one is query-based and the other is an
infinite hold (where all content is placed on hold), then all content will be search because of the
infinite hold.
If a content search is for a case and you've configured it to search all case content and then you
change a hold (by adding or removing a content location or changing the hold query), the search
configuration is updated with those changes. However, you have to re-run the search after the hold
is changed to update the search results.
If multiple case holds are placed on a content location in an eDiscovery case and you select to search
all case content, the maximum number of keywords for that search query is 500. That's because the
content search combines all the query-based holds by using the OR operator. If there are more than
500 keywords in the combined hold queries and the content search query, then all content in the
mailbox is searched, not just that content that matches the any of query-based case holds.
If a case hold has a status of Turning on, you can still search the case content locations while the
hold is being turned on.
As previously stated, if a search is configured to search all case content, then you can't include that
search if you want to export the results of multiple searches. If a search is configured to search all
case content, then you'll have to export the results of that single search.
If a mailbox, SharePoint site, or OneDrive account that is on hold is moved to a different region
in a multi-geo environment, will the hold still apply? In all cases, the content in a mailbox, site, or
OneDrive account will still be retained. However, the hold statistics will no longer include items from a
content location that's been moved to a different region. To include hold statistics for a content location
that's been moved, you'll have to edit the hold and update the URL (or SMTP address of a mailbox) so that
the content location is once again included in the hold statistics.
What about placing a hold on Office 365 Groups and Microsoft Teams? Microsoft Teams are built on
Office 365 Groups. Therefore, placing them on hold in an eDiscovery case is very similar. Keep the
following things in mind when placing Office 365 Groups and Microsoft Teams on hold.
To place content located in Office 365 Groups and Microsoft Teams on hold, you have to specify the
mailbox and SharePoint site that associated with a group or team.
Run the Get-UnifiedGroup cmdlet in Exchange Online to view properties for an Office 365 Group
or Microsoft Team. This is a good way to get the URL for the site that's associated with an Office
365 Group or a Microsoft Team. For example, the following command displays selected properties
for an Office 365 Group named Senior Leadership Team:
Get-UnifiedGroup "Senior Leadership Team" | FL
DisplayName,Alias,PrimarySmtpAddress,SharePointSiteUrl

DisplayName : Senior Leadership Team


Alias : seniorleadershipteam
PrimarySmtpAddress : seniorleadershipteam@contoso.onmicrosoft.com
SharePointSiteUrl : https://contoso.sharepoint.com/sites/seniorleadershipteam

NOTE
To run the Get-UnifiedGroup cmdlet, you have to be assigned the View-Only Recipients role in Exchange
Online or be a member of a role group that's assigned the View-Only Recipients role.

When a user's mailbox is searched, any Office 365 Group or Microsoft Team that the user is a
member of won't be searched. Similarly, when you place an Office 365 Group or Microsoft Team
hold, only the group mailbox and group site are placed on hold; the mailboxes and OneDrive for
Business sites of group members aren't placed on hold unless you explicitly add them to the hold.
Therefore, if you the need to place an Office 365 Group or Microsoft Team on hold for a legal
reasons, consider adding the mailboxes and OneDrive for Business sites for group and team
members on the same hold.
To get a list of the members of a Office 365 Group or Microsoft Team, you can view the properties
on the Home > Groups page in the Office 365 admin center. Alternatively, you can run the
following command in Exchange Online PowerShell:

Get-UnifiedGroupLinks <group or team name> -LinkType Members | FL DisplayName,PrimarySmtpAddress

NOTE
To run the Get-UnifiedGroupLinks cmdlet, you have to be assigned the View-Only Recipients role in
Exchange Online or be a member of a role group that's assigned the View-Only Recipients role.

Conversations that are part of a Microsoft Teams channel are stored in the mailbox that's associated
with the Microsoft Team. Similarly, files that team members share in a channel are stored on the
team's SharePoint site. Therefore, you have to place the Microsoft Team mailbox and SharePoint site
on hold to retain conversations and files in a channel.
Alternatively, conversations that are part of the Chat list in Microsoft Teams are stored in the
mailbox of the user's who participate in the chat. And files that a user shares in Chat conversations
are stored in the OneDrive for Business site of the user who shares the file. Therefore, you have to
place the individual user mailboxes and OneDrive for Business sites on hold to retain conversations
and files in the Chat list. That's why it's a good idea to place a hold on the mailboxes of members of
a Microsoft Team in addition to placing the team mailbox (and site) on hold.
IMPORTANT
Users who participate in conversations that are part of the Chat list in Microsoft Teams must have an
Exchange Online (cloud-based) mailbox in order to retain chat conversations when the mailbox is placed on
an eDiscovery hold. That's because conversations that are part of the Chat list are stored in the cloud-based
mailboxes of the chat participants. If a chat participant doesn't have an Exchange Online mailbox, you won't
be able to retain chat conversations. For example, in an Exchange hybrid deployment, users with an on-
premises mailbox might be able to participate in conversations that are part of the Chat list in Microsoft
Teams. However in this case, content from these conversation can't be retained because the users don't have
cloud-based mailboxes.

Every Microsoft Team or team channel contains a Wiki for note-taking and collaboration. The Wiki
content is automatically saved to a file with a .mht format. This file is stored in the Teams Wiki Data
document library on the team's SharePoint site. You can place the content in the Wiki on hold by
placing the team's SharePoint site on hold.

NOTE
The capability to retain Wiki content for a Microsoft Team or team channel (when you place the team's
SharePoint site on hold) was released on June 22, 2017. If a team site is on hold, the Wiki content will be
retained starting on that date. However, if a team site is on hold and the Wiki content was deleted before
June 22, 2017, the Wiki content was not retained.

How do I find the URL for OneDrive for Business sites? To collect a list of the URLs for the OneDrive
for Business sites in your organization so you can add them to a hold or search associated with an
eDiscovery case, see Create a list of all OneDrive locations in your organization. This script in this article
creates a text file that contains a list of all OneDrive sites. To run this script, you'll have to install and use the
SharePoint Online Management Shell. Be sure to append the URL for your organization's MySite domain
to each OneDrive site that you want to search. This is the domain that contains all your OneDrive; for
example, https://contoso-my.sharepoint.com . Here's an example of a URL for a user's OneDrive site:
https://contoso-my.sharepoint.com/personal/sarad_contoso_onmicrosoft.com .
Create a Litigation Hold in Office 365
9/26/2018 • 2 minutes to read • Edit Online

You can place a mailbox on Litigation Hold to retain all mailbox content, including deleted items and the original
versions of modified items. When you place a user mailbox on Litigation Hold, content in the user's archive mailbox
(if it's enabled) is also retained. When you create a hold, you can specify a hold duration (also called a time-based
hold) so that deleted and modified items are retained for a specified period and then permanently deleted from the
mailbox. Or you can just retain content indefinitely (called an infinite hold) or until the Litigation Hold is removed. If
you do specify a hold duration period, it's calculated from the date a message is received or a mailbox item is
created.
Here's what happens when you create a Litigation Hold.
Items that are permanently deleted by the user are retained in the Recoverable Items folder in the user's
mailbox for the duration of the hold.
Items that are purged from the Recoverable Items folder by the user are retained for the duration of the
hold.
The storage quota for the Recoverable Items folder is increased from 30 GB to 110 GB.
Items in the user's primary and the archive mailboxes are retained

Before you begin


To place an Exchange Online mailbox on Litigation Hold, it must be assigned an Exchange Online Plan 2 license.
If a mailbox is assigned an Exchange Online Plan 1 license, you would have to assign it a separate Exchange
Online Archiving license to place it on hold.

Place a mailbox on Litigation Hold in the Office 365 admin center


Here are the steps to place a maibox on Litigation Hold using the Office 365 admin center.
1. Go to https://portal.office.com/adminportal/home and sign in using your global administrator account.
2. Click Users > Active users in the left navigation pane.
3. Select the user whose mailbox you want to place on Litigation Hold.
4. On the fly-out page, click Mail settings, and then click Edit next to Litigation hold.
5. On the Litigation hold page, click the toggle to turn on Litigation Hold and complete the following optional
settings that are displayed:
a. Hold duration (days) - Use this box to create a time-based hold and specify how long mailbox items are
held when the mailbox is placed on Litigation Hold. The duration is calculated from the date a mailbox item
is received or created. If you leave this box blank, items are held indefinitely or until the hold is removed.
Use days to specify the duration.
b. Note - Use this box to inform the user their mailbox is on Litigation Hold. The note will appear on the
Account Information page in the user's mailbox if they're using Outlook 2010 or later. To access this page,
users can click File in Outlook.
c. Web page - Use this box to direct the user to a website for more information about Litigation Hold. This
URL appears on the Account Information page in the user's mailbox if they are using Outlook 2010 or later.
To access this page, users can click File in Outlook.
6. Click Save to create the Litigation Hold.
After you create the hold, the mail settings on the fly-out page shows that Litigation Hold is turned on for the
selected user.
For more information about creating and managing Litigation Holds and using Exchange Online PowerShell to
bulk-create Litigation Holds, see Place a mailbox on Litigation Hold.
Delete items in the Recoverable Items folder of
cloud-based mailboxes on hold - Admin Help
10/16/2018 • 22 minutes to read • Edit Online

The Recoverable Items folder for an Exchange Online mailbox exists to protect from accidental or malicious
deletions. It's also used to store items that are retained and accessed by Office 365 compliance features, such as
holds and eDiscovery searches. However, in some situations organizations might have data that's been
unintentionally retained in the Recoverable Items folder that they must delete. For example, a user might
unknowingly send or forward an email message that contains sensitive information or information that may have
serious business consequences. Even if the message is permanently deleted, it might be retained indefinitely
because a legal hold has been placed on the mailbox. This scenario is known as data spillage because data has been
unintentionally spilled into Office 365. In these situations, you can delete items in a user's Recoverable Items folder
for an Exchange Online mailbox, even if that mailbox is placed on hold with one of the different hold features in
Office 365. These types of holds include Litigation Holds, In-Place Holds, eDiscovery holds, and Office 365
retention policies created in the Office 365 Security & Compliance Center.
This article explains how to delete items from the Recoverable Items folder for cloud-based mailboxes that are on
hold. This procedure involves disabling access to the mailbox and disabling single item recovery, disabling the
Managed Folder Assistant from processing the mailbox, temporarily removing the hold, deleting items from the
Recoverable Items folder, and then reverting the mailbox to its previous configuration. Here's the process:
Step 1: Collect information about the mailbox
Step 2: Prepare the mailbox
Step 3: Remove all holds from the mailbox
Step 4: Remove the delay hold from the mailbox
Step 5: Delete items in the Recoverable Items folder
Step 6: Revert the mailbox to its previous state
Cau t i on

The procedures outlined in this article will result in data being permanently deleted (purged) from an Exchange
Online mailbox. That means messages that you delete from the Recoverable Items folder can't be recovered and
won't be available for legal discovery or other compliance purposes. If you want to delete messages from a
mailbox that's placed on hold as part of a Litigation Hold, In-Place Hold, eDiscovery hold, or Office 365 retention
policy created in the Office 365 Security & Compliance Center, check with your records management or legal
departments before removing the hold. Your organization might have a policy that defines whether a mailbox on
hold or a data spillage incident takes priority.

Before you begin


You have to be assigned both of the following management roles in Exchange Online to search for and
delete messages from the Recoverable Items folder in Step 5.
Mailbox Search - This role lets you to search mailboxes in your organization. Exchange
administrators aren't assigned this role by default. To assign yourself this role, add yourself as a
member of the Discovery Management role group in Exchange Online.
Mailbox Import Export - This role lets you to delete messages from a user's mailbox. By default,
this role isn't assigned to any role group. To delete messages from users' mailboxes, you can add the
Mailbox Import Export role to the Organization Management role group in Exchange Online.
The procedure described in this article isn't supported for inactive mailboxes. That's because you can't re-
apply a hold (or Office 365 retention policy) to an inactive mailbox after you remove it. When you remove a
hold from an inactive mailbox, it's changed to a normal soft-deleted mailbox and will be permanently
deleted from your organization after it's processed by the Managed Folder Assistant.
You can't perform this procedure for a mailbox that has been assigned to an Office 365 retention policy
that's been locked with a Preservation Lock. That's because a Preservation Lock prevents you from
removing or excluding the mailbox from the Office 365 retention policy and from disabling the Managed
Folder Assistant on the mailbox. For more information about locking retention policies, see Locking a
retention policy.
If a mailbox isn't placed on hold (or doesn't have single item recovery enabled), you can simply delete the
items from the Recoverable Items folder. For more information about how to do this, see Search for and
delete messages .

Step 1: Collect information about the mailbox


This first step is to collect selected properties from the target mailbox that will affect this procedure. Be sure to
write down these settings or save them to a text file because you'll change some of these properties and then
revert back to the original values in Step 6, after you delete items from the Recoverable Items folder. Here's a list of
the mailbox properties you need to collect.
SingleItemRecoveryEnabled and RetainDeletedItemsFor ; if necessary, you'll disable single recovery and
increase the deleted items retention period in Step 3.
LitigationHoldEnabled and InPlaceHolds ; you need to identify all the holds placed on the mailbox so that
you can temporarily remove them in Step 3. See the More information section for tips about how to identify
the type hold that might be placed on a mailbox.
Additionally, you need to get the mailbox client access settings so you can temporarily disable them so the owner
(or other users) can't access the mailbox during this procedure. Finally, you can get the current size and number of
items in the Recoverable Items folder. After you delete items in the Recoverable Items folder in Step 5, you'll use
this information to verify that items were actually removed.
1. Connect to Exchange Online PowerShell. Be sure to use a user name and password for an administrator
account that's been assigned the appropriate management roles in Exchange Online.
2. Run the following command to get information about single item recovery and the deleted item retention
period.

Get-Mailbox <username> | FL SingleItemRecoveryEnabled,RetainDeletedItemsFor

If single item recovery is enabled, you'll have to disable it in Step 2. If the deleted item retention period isn't
set for 30 days (the maximum value in Exchange Online), then you can increase it in Step 2.
3. Run the following command to get the mailbox access settings for the mailbox.

Get-CASMailbox <username> | FL
EwsEnabled,ActiveSyncEnabled,MAPIEnabled,OWAEnabled,ImapEnabled,PopEnabled

You'll disable all of these access methods in Step 2.


4. Run the following command to get information about the holds and Office 365 retention policies applied to
the mailbox.
Get-Mailbox <username> | FL LitigationHoldEnabled,InPlaceHolds

TIP
If there are too many values in the InPlaceHolds property and not all of them are displayed, you can run the
Get-Mailbox <username> | Select-Object -ExpandProperty InPlaceHolds command to display each value on a
separate line.

5. Run the following command to get information about any organization-wide Office 365 retention policies.

Get-OrganizationConfig | FL InPlaceHolds

If your organization has any organization-wide Office 365 retention policies, you'll have to exclude the
mailbox from these policies in Step 3.

TIP
If there are too many values in the InPlaceHolds property and not all of them are displayed, you can run the
Get-OrganizationConfig | Select-Object -ExpandProperty InPlaceHolds command to display each value on a
separate line.

6. Run the following command to get the current size and total number of items in folders and subfolders in
the Recoverable Items folder in the user's primary mailbox.

Get-MailboxFolderStatistics <username> -FolderScope RecoverableItems | FL


Name,FolderAndSubfolderSize,ItemsInFolderAndSubfolders

If the user's archive mailbox is enabled, run the following command to get the size and total number of
items in folders and subfolders in the Recoverable Items folder in their archive mailbox.

Get-MailboxFolderStatistics <username> -FolderScope RecoverableItems -Archive | FL


Name,FolderAndSubfolderSize,ItemsInFolderAndSubfolders

When you delete items in Step 5, you can choose to delete or not delete items in the Recoverable Items
folder in the user's primary archive mailbox. Note that if auto-expanding archiving is enabled for the
mailbox, items in an auxiliary archive mailbox won't be deleted.

Step 2: Prepare the mailbox


After collecting and saving information about the mailbox, the next step is to prepare the mailbox by performing
the following tasks:
Disable client access to mailbox so that the mailbox owner can't access their mailbox and make any
changes to the mailbox data during this procedure.
Increase the deleted item retention period to 30 days (the maximum value in Exchange Online) so that
items aren't purged from the Recoverable Items folder before you can delete them in Step 5.
Disable single Item recovery so that items won't be retained (for the duration of the deleted item
retention period) after you delete them from the Recoverable Items folder in Step 5.
Disable the Managed Folder Assistant so that it doesn't process the mailbox and retain the items that
you delete in Step 5.
Perform the following steps in Exchange Online PowerShell.
1. Run the following command to disable all client access to the mailbox. The command syntax assumes that
all client access methods were enabled on the mailbox.

Set-CASMailbox <username> -EwsEnabled $false -ActiveSyncEnabled $false -MAPIEnabled $false -OWAEnabled


$false -ImapEnabled $false -PopEnabled $false

NOTE
It might take up to 60 minutes to disable all client access methods to the mailbox. Note that disabling these access
methods won't disconnect the mailbox owner they're currently signed in. If the owner isn't signed in, then they won't
be able to access their mailbox after these access methods are disabled.

2. Run the following command to increase the deleted item retention period the maximum of 30 days. This
assumes that the current setting is less than 30 days.

Set-Mailbox <username> -RetainDeletedItemsFor 30

3. Run the following command to disable single item recovery.

Set-Mailbox <username> -SingleItemRecoveryEnabled $false

NOTE
It might take up to 60 minutes to disable single item recovery. Don't delete items in the Recoverable Items folder
until this period has elapsed.

4. Run the following command to prevent the Managed Folder Assistant from processing the mailbox. As
previously explained, you can disable the Managed Folder Assistant only if an Office 365 retention policy
with a Preservation Lock is not applied to the mailbox.

Set-Mailbox <username> -ElcProcessingDisabled $true

Step 3: Remove all holds from the mailbox


The last step before you can delete items from the Recoverable Items folder is to remove all holds (that you
identified in Step 1) placed on the mailbox. All holds must be removed so that items won't be retained after you
delete them from the Recoverable Items folder. The following sections contain information about removing
different types of holds on a mailbox. See the More information section for tips about how to identify the type hold
that might be placed on a mailbox. For additional information, see How to identify the type of hold placed on an
Exchange Online mailbox.
Cau t i on

As previously stated, check with your records management or legal departments before removing a hold from a
mailbox.
Litigation Hold
Run the following command in Exchange Online PowerShell to remove a Litigation Hold from the mailbox.
Set-Mailbox <username> -LitigationHoldEnabled $false

NOTE
Similar to disabling the client access methods and single item recovery, it might take up to 60 minutes to remove the
Litigation Hold. Don't delete items from the Recoverable Items folder until this period has elapsed.

In-Place Hold
Run the following command in Exchange Online PowerShell to identify the In-Place Hold that's placed on the
mailbox. Use the GUID for the In-Place Hold that you identified in Step 1.

Get-MailboxSearch -InPlaceHoldIdentity <hold GUID> | FL Name

After you identify the In-Place Hold, you can use the Exchange admin center (EAC ) or Exchange Online PowerShell
to remove the mailbox from the hold. For more information, see Create or remove an In-Place Hold.
Office 365 retention policies applied to specific mailboxes
Run the following command in Office 365 Security & Compliance Center PowerShell to identify the Office 365
retention policy that is applied to the mailbox. Use the GUID (not including the mbx or skp prefix) for the
retention policy that you identified in Step 1.

Get-RetentionCompliancePolicy <retention policy GUID without prefix> | FL Name

After you identify the retention policy, go to the Date governance > Retention page in the Security &
Compliance Center, edit the retention policy that you identified in the previous step, and remove the mailbox from
the list of recipients that are included in the retention policy.
Organization-wide Office 365 retention policies
Organization-wide and Exchange-wide Office 365 retention policies are applied to every mailbox in the
organization. They are applied at the organization level (not the mailbox level) and are returned when you run the
Get-OrganizationConfig cmdlet in Step 1. Run the following command in Security & Compliance Center
PowerShell to identify the organization-wide Office 365 retention policies. Use the GUID (not including the mbx
prefix) for the organization-wide retention policies that you identified in Step 1.

Get-RetentionCompliancePolicy <retention policy GUID without prefix> | FL Name

After you identify the organization-wide Office 365 retention policies, go to the Date governance > Retention
page in the Security & Compliance Center, edit each organization-wide retention policy that you identified in the
previous step, and add the mailbox to the list of excluded recipients. Doing this will remove the user's mailbox from
the retention policy.
Office 365 retention labels
Whenever a user applies a label that's configured to retain content or retain and then delete content to any folder
or item in their mailbox, the ComplianceTagHoldApplied mailbox property is set to True. When this happens, the
mailbox is considered to be on hold, just as if it was placed on Litigation Hold or assigned to an Office 365
retention policy.
To view the value of the ComplianceTagHoldApplied property, run the following command in Exchange Online
PowerShell:
Get-Mailbox <username> |FL ComplianceTagHoldApplied

After you've identified that a mailbox is on hold because a retention label is applied to a folder or item, you can use
the Content Search tool in the Security & Compliance Center to search for labeled items by using the
ComplianceTag search condition. For more information, see the "Search conditions" section in Keyword queries
and search conditions for Content Search.
For more information about labels, see Overview of Office 365 labels.
eDiscovery case holds
Run the following commands in Security & Compliance Center PowerShell to identify the hold associated with an
eDiscovery case that's applied to the mailbox. Use the GUID (not including the UniH prefix) for the eDiscovery
hold that you identified in Step 1. Note that the second command displays the name of the eDiscovery case the
hold is associated with; the third command displays the name of the hold.

$CaseHold = Get-CaseHoldPolicy <hold GUID without prefix>

Get-ComplianceCase $CaseHold.CaseId | FL Name

$CaseHold.Name

After you've identified the name of the eDiscovery case and the hold, go to the Search & investigation >
eDiscovery page in the Security & Compliance Center, open the case, and remove the mailbox from the hold. For
more information, see Manage eDiscovery cases in the Office 365 Security & Compliance Center.

Step 4: Remove the delay hold from the mailbox


After any type of hold is removed from a mailbox, the value of the DelayHoldApplied mailbox property is set to
True. This occurs the next time the Managed Folder Assistant processes the mailbox and detects that a hold has
been removed. This is called a delay hold and means the actual removal of the hold is delayed for 30 days to
prevent data from being permanently deleted from the mailbox. (The purpose of a delay hold is to give admins an
opportunity to search for or recover mailbox items that will be purged after a hold is removed.) When a delay hold
is placed on the mailbox, the mailbox is still considered to be on hold for an unlimited duration, as if the mailbox
was on Litigation Hold. After 30 days, the delay hold expires, and Office 365 will automatically attempt to remove
the delay hold (by setting the DelayHoldApplied property to False) so that the hold is actually removed.
Before you can delete items in Step 5, you have to remove the delay hold from the mailbox. First, determine if the
delay hold is applied to the mailbox by running the following command in Exchange Online PowerShell:

Get-Mailbox <username> | FL DelayHoldApplied

If the value of the DelayHoldApplied property is set to False, a delay hold has not been placed on the mailbox. You
can go to Step 5 and delete items in the Recoverable Items folder.
If the value of the DelayHoldApplied property is set to True, run the following command to remove the delay hold:

Set-Mailbox <username> -RemoveDelayHoldApplied

Note that you must be assigned the Legal Hold role in Exchange Online to use the RemoveDelayHoldApplied
parameter.
Step 5: Delete items in the Recoverable Items folder
Now you're ready to actually delete items in the Recoverable Items folder by using the Search-Mailbox cmdlet in
Exchange Online PowerShell. You have three options when running the Search-Mailbox cmdlet.
Copy items to a target mailbox before you delete them so that you can review the items, if necessary, before
you delete them.
Copy items to a target mailbox and delete them in the same command.
Delete items without copying them to a target mailbox.
Note that items in the Recoverable Items folder in the user's primary archive mailbox will also be deleted when you
run the ** Search-Mailbox ** cmdlet. To prevent this, you can include the DoNotIncludeArchive switch. And as
previously stated, if auto-expanding archiving is enabled for the mailbox, the ** Search-Mailbox ** cmdlet doesn't
deleted items in an auxiliary archive mailbox. For more information about auto-expanding archive, see Overview of
unlimited archiving in Office 365.

NOTE
If you include a search query (by using the SearchQuery parameter), the Search-Mailbox cmdlet will return a maximum of
10,000 items in the search results. Therefore if you include a search query, you might have to run the Search-Mailbox
command multiple times to delete more than 10,000 items.

The following examples show the command syntax for each of these options. These examples use the
-SearchQuery size>0 parameter value, which deletes all items from all subfolders in the Recoverable Items folder. If
you need to delete only items that match specific conditions, you can also use the SearchQuery parameter to
specify other conditions, such as the subject of a message or a date range. See the other examples of using the
SearchQuery parameter below.
Example 1
This example copies all items in the user's Recoverable Items folder to a folder in your organization's Discovery
Search Mailbox. This lets you review the items before you permanently delete them.

Search-Mailbox <username> -SearchQuery size>0 -SearchDumpsterOnly -TargetMailbox "Discovery Search Mailbox" -


TargetFolder "<foldername>"

In the previous example, it isn't required to copy items to the Discovery Search Mailbox. You can copy messages to
any target mailbox. However, to prevent access to potentially sensitive mailbox data, we recommend copying
messages to a mailbox that has access restricted to authorized personnel. By default, access to the default
Discovery Search Mailbox is restricted to members of the Discovery Management role group in Exchange Online.
Example 2
This example copies all items in the user's Recoverable Items folder to a folder in your organization's Discovery
Search Mailbox and then deletes the items from the user's Recoverable Items folder.

Search-Mailbox <username> -SearchQuery size>0 -SearchDumpsterOnly -TargetMailbox "Discovery Search Mailbox" -


TargetFolder "<foldername>" -DeleteContent

Example 3
This example deletes all items in the user's Recoverable Items folder, without copying them to a target mailbox.

Search-Mailbox <username> -SearchQuery size>0 -SearchDumpsterOnly -DeleteContent


Other examples of using the SearchQuery parameter
Here are a few examples of using the SearchQuery parameter to find specific messages. If you use the
SearchQuery parameter to search for specific items, consider copying the search results to a target mailbox so that
you can review the search results and then revise the query if necessary before you delete the results of a search.
This example returns messages that contain a specific phrase in the Subject field.

SearchQuery 'subject:"MAIL_BOX VALIDATION/UPGRADE!!!"'

This example returns messages that were sent within the specified date range.

SearchQuery 'sent>=06/01/2016 AND sent<=09/01/2016'

This example returns messages that were sent to the specified person.

SearchQuery 'to:garthf@alpinehouse.com'

Verify that items were deleted


To verify that you've successfully deleted items from the Recoverable Items folder of a mailbox, use Get-
MailboxFolderStatistics cmdlet in Exchange Online PowerShell to check the size and number of items in
Recoverable Items folder. You can compare these statistics with the ones you collected in Step 1.
Run the following command in to get the current size and total number of items in folders and subfolders in the
Recoverable Items folder in the user's primary mailbox.

Get-MailboxFolderStatistics <username> -FolderScope RecoverableItems | FL


Name,FolderAndSubfolderSize,ItemsInFolderAndSubfolders

Run the following command to get the size and total number of items in folders and subfolders in the Recoverable
Items folder in the user's archive mailbox.

Get-MailboxFolderStatistics <username> -FolderScope RecoverableItems -Archive | FL


Name,FolderAndSubfolderSize,ItemsInFolderAndSubfolders

Step 6: Revert the mailbox to its previous state


The final step is to revert the mailbox back to its previous configuration. This means resetting the properties that
you changed in Step 2 and re-applying the holds that you removed in Step 3. This includes:
Changing the deleted item retention period back to its previous value. Alternatively, you can just leave this
set to 30 days, the maximum value in Exchange Online.
Re-enabling single Item recovery.
Re-enabling the client access methods so that the owner can access their mailbox.
Re-applying the holds and Office 365 retention policies that you removed.
Re-enabling the Managed Folder Assistant to process the mailbox.
IMPORTANT
We recommend that you wait 24 hours after re-applying a hold or Office 365 retention policy (and verifying that it's in place)
before you re-enable the Managed Folder Assistant to process the mailbox.

Perform the following steps (in the specified sequence) in Exchange Online PowerShell.
1. Run the following command to change the deleted item retention period back to its original value. This
assumes that the previous setting is less than 30 days; for example 14 days.

Set-Mailbox <username> -RetainDeletedItemsFor 14

2. Run the following command to re-enable single item recovery.

Set-Mailbox <username> -SingleItemRecoveryEnabled $true

3. Run the following command to re-enable all client access methods to the mailbox.

Set-CASMailbox <username> -EwsEnabled $true -ActiveSyncEnabled $true -MAPIEnabled $true -OWAEnabled


$true -ImapEnabled $true -PopEnabled $true

4. Re-apply the holds that you removed in Step 3. Depending on the type of hold, use one of the following
procedures.
Litigation Hold
Run the following command to re-enable a Litigation Hold for the mailbox.

Set-Mailbox <username> -LitigationHoldEnabled $true

In-Place Hold
Use the EAC (or Exchange Online PowerShell) to add the mailbox back to the In-Place Hold.
Office 365 retention policies applied to specific mailboxes
Use the Security & Compliance Center to add the mailbox back to the Office 365 retention policy. Go to the
Date governance > Retention page in the Security & Compliance Center, edit the retention policy, and
add the mailbox back to the list of recipients that the retention policy is applied to.
Organization-wide Office 365 retention policies
If you removed an organization-wide or Exchange-wide retention policy by excluding it from the policy, then
use the Security & Compliance Center to remove the mailbox from the list of excluded users. Go to the
Date governance > Retention page in the Security & Compliance Center, edit the organization-wide
retention policy, and remove the mailbox from the list of excluded recipients. Doing this will re-apply the
retention policy to the user's mailbox.
eDiscovery case holds
Use the Security & Compliance Center to add the mailbox back the hold that's associated with an
eDiscovery case. Go to the Search & investigation > eDiscovery page in the Security & Compliance
Center, open the case, and add the mailbox back to the hold.
5. Run the following command to allow the Managed Folder Assistant to process the mailbox again. As
previously stated, we recommend that you wait 24 hours after re-applying a hold or Office 365 retention
policy (and verifying that it's in place) before you re-enable the Managed Folder Assistant.

Set-Mailbox <username> -ElcProcessingDisabled $false

6. To verify that the mailbox has been reverted back to its previous configuration, you can run the following
commands and then compare the settings to the ones that you collected in Step 1.

Get-Mailbox <username> | FL
ElcProcessingDisabled,InPlaceHolds,LitigationHoldEnabled,RetainDeletedItemsFor,SingleItemRecoveryEnabled

Get-CASMailbox <username> | FL
EwsEnabled,ActiveSyncEnabled,MAPIEnabled,OWAEnabled,ImapEnabled,PopEnabled

More information
Here's a table that describes how to identify different types of holds based on the values in the InPlaceHolds
property when you run the Get-Mailbox or Get-OrganizationConfig cmdlets. For more detailed information,
see How to identify the type of hold placed on an Exchange Online mailbox.
As previously explained, you have to remove all holds and Office 365 retention policies from a mailbox before you
can successfully delete items in the Recoverable Items folder.

HOLD TYPE EXAMPLE VALUE HOW TO IDENTIFY THE HOLD

Litigation Hold True The LitigationHoldEnabled property is


set to True .

In-Place Hold c0ba3ce811b6432a8751430937152491 The InPlaceHolds property contains the


GUID of the In-Place Hold that's placed
on the mailbox. You can tell this is an
In-Place Hold because the GUID doesn't
start with a prefix.
You can use the
Get-MailboxSearch -
InPlaceHoldIdentity <hold GUID> |
FL
command in Exchange Online
PowerShell to get information about the
In-Place Hold on the mailbox.
HOLD TYPE EXAMPLE VALUE HOW TO IDENTIFY THE HOLD

Office 365 retention policies in the mbxcdbbb86ce60342489bff371876e7f224 When you run the Get-Mailbox
Security & Compliance Center applied or cmdlet, the InPlaceHolds property also
to specific mailboxes skp127d7cf1076947929bf136b7a2a8c36f contains GUIDs of Office 365 retention
policies applied to the mailbox. You can
identify retention policies because the
GUID starts with the mbx prefix. Note
that if the GUID of the retention policy
starts with the skp prefix, that
indicates that the retention policy is
applied to Skype for Business
conversations.
To identity the Office 365 retention
policy that's applied to the mailbox, run
the following command in Security &
Compliance Center PowerShell:

Get-RetentionCompliancePolicy
<retention policy GUID without
prefix> | FL Name

Be sure to remove the mbx or skp


prefix when you run this command.

Organization-wide Office 365 retention No value Even if the InPlaceHolds property is


policies in the Security & Compliance or empty when you run the Get-Mailbox
Center - cmdlet, there still might be one or more
mbxe9b52bf7ab3b46a286308ecb29624696 organization-wide Office 365 retention
(indicates that the mailbox is excluded policies applied to the mailbox.
from an organization-wide policy) To verify this, you can run the
Get-OrganizationConfig | FL
InPlaceHolds
command in Exchange Online
PowerShell to get a list of the GUIDs for
organization-wide Office 365 retention
policies. The GUID for organization-wide
retention policies applied to Exchange
mailboxes start with the mbx prefix; for
example
mbxa3056bb15562480fadb46ce523ff7b02
.
To identity the organization-wide Office
365 retention policy that's applied to
the mailbox, run the following
command in Security & Compliance
Center PowerShell:

Get-RetentionCompliancePolicy
<retention policy GUID without
prefix> | FL Name

Note that if a mailbox is excluded from


an organization-wide Office 365
retention policy, the GUID for the
retention policy is displayed in the
InPlaceHolds property of the user's
mailbox when you run the Get-
Mailbox cmdlet; it's identified by the
prefix -mbx ; for example,
-
mbxe9b52bf7ab3b46a286308ecb29624696
HOLD TYPE EXAMPLE VALUE HOW TO IDENTIFY THE HOLD

eDiscovery case hold in the Security & UniH7d895d48-7e23-4a8d-8346- The InPlaceHolds property also
Compliance Center 533c3beac15d contains the GUID of any hold
associated with an eDiscovery case in
the Security & Compliance Center that
might be placed on the mailbox. You
can tell this is an eDiscovery case hold
because the GUID starts with the
UniH prefix.
You can use the Get-CaseHoldPolicy
cmdlet in Security & Compliance Center
PowerShell to get information about the
eDiscovery case that the hold on the
mailbox is associated with. For example,
you can run the command
Get-CaseHoldPolicy <hold GUID
without prefix> | FL Name
to display the name of the case hold
that's on the mailbox. Be sure to
remove the UniH prefix when you run
this command.

To identity the eDiscovery case that the


hold on the mailbox is associated with,
run the following commands:

$CaseHold = Get-CaseHoldPolicy
<hold GUID without prefix>

Get-ComplianceCase
$CaseHold.CaseId | FL Name
Increase the Recoverable Items quota for mailboxes
on hold
10/12/2018 • 10 minutes to read • Edit Online

The default retention policy—named Default MRM Policy—that is automatically applied to new mailboxes in
Exchange Online contains a retention tag named Recoverable Items 14 days move to archive. This retention tag
moves items from the Recoverable Items folder in the user's primary mailbox to the Recoverable Items folder in
the user's archive mailbox after the 14-day retention period expires for an item. For this to happen, the user's
archive mailbox must be enabled. If the archive mailbox isn't enabled, no action is taken, which means that items in
the Recoverable Items folder for a mailbox on hold aren't moved to the archive mailbox after the 14-day retention
period expires. Because nothing is deleted from a mailbox on hold, it's possible that the storage quota for the
Recoverable Items folder might be exceeded, especially if the user's archive mailbox isn't enabled.
To help reduce the chance of exceeding this limit, the storage quota for the Recoverable Items folder is
automatically increased from 30 GB to 100 GB when a hold is placed on a mailbox in Exchange Online. If the
archive mailbox is enabled, the storage quota for the Recoverable Items folder in the archive mailbox is also
increased from 30 GB to 100 GB. If the auto-expanding archiving feature in Exchange Online is enabled, the
storage quota for the Recoverable Items folder in the user's archive will be unlimited.
The following table summarizes the storage quota for the Recoverable Items folder.

LOCATION OF RECOVERABLE ITEMS FOLDER MAILBOXES NOT ON HOLD MAILBOXES ON HOLD

Primary mailbox 30 GB 100 GB

Archive mailbox* Unlimited Unlimited

Total storage quota for the Unlimited Unlimited


Recoverable Items folder

NOTE
* The initial storage quota for the archive mailbox is 100 GB for users with an Exchange Online (Plan 2) license. However,
when auto-expanding archiving is turned on for mailboxes on hold, the storage quota for both the archive mailbox and the
Recoverable Items folder is increased to 110 GB. Additional archive storage space will be provisioned when necessary which
results in an unlimited amount of archive storage. For more information about auto-expanding archiving, see Overview of
unlimited archiving in Office 365.

When the storage quota for the Recoverable Items folder in the primary mailbox of a mailbox on hold is close to
reaching its limit, you can do the following things:
Enable the archive mailbox and turn on auto-expanding archiving - You can enable an unlimited
storage capacity for the Recoverable Items folder simply by enabling the archive mailbox and then turning
on the auto-expanding archiving feature in Exchange Online. This results in 110 GB for the Recoverable
Items folder in the primary mailbox and an unlimited amount of storage capacity for the Recoverable Items
folder in the user's archive. See how: Enable archive mailboxes in the Office 365 Security & Compliance
Center and Enable unlimited archiving in Office 365.
NOTE
After you enable the archive for a mailbox that's close to exceeding the storage quota for the Recoverable Items
folder, you might want to run the Managed Folder Assistant to manually trigger the assistant to process the mailbox
so that expired items are moved the Recoverable Items folder in the archive mailbox. See Step 4 for instructions. Note
that other items in the user's mailbox might be moved to the new archive mailbox. Consider telling the user that this
may happen after you enable the archive mailbox.

Create a custom retention policy for mailboxes on hold - In addition to enabling the archive mailbox
and auto-expanding archiving for mailboxes on Litigation Hold or In-Place Hold, you might also want to
create a custom retention policy for mailboxes on hold. This let's you apply a retention policy to mailboxes
on hold that's different from the Default MRM Policy that's applied to mailboxes that aren't on hold. This lets
you to apply retention tags that are specifically designed for mailboxes on hold. This includes creating a new
retention tag for the Recoverable Items folder.
The remainder of this topic describes the step-by-step procedures to create a custom retention policy for mailboxes
on hold.
Step 1: Create a custom retention tag for the Recoverable Items folder
[Step 2: Create a new retention policy for mailboxes on hold
Step 3: Apply the new retention policy to mailboxes on hold
(Optional) Step 4: Run the Managed Folder Assistant to apply the new retention settings

Step 1: Create a custom retention tag for the Recoverable Items folder
The first step is to create a custom retention tag (called a retention policy tag or RPT) for the Recoverable Items
folder. As previously explained, this RPT moves items from the Recoverable Items folder in the user's primary
mailbox to the Recoverable Items folder in the user's archive mailbox. You have to use PowerShell to create an RPT
for the Recoverable Items folder. You can't use the Exchange admin center (EAC ).
1. Connect to Exchange Online using remote PowerShell
2. Run the following command to create a new RPT for the Recoverable Items folder:

New-RetentionPolicyTag -Name <Name of RPT> -Type RecoverableItems -AgeLimitForRetention <Number of days>


-RetentionAction MoveToArchive

For example, the following command creates a RPT for the Recoverable Items folder named "Recoverable
Items 30 days for mailboxes on hold", with a retention period of 30 days. This means that after an item has
been in the Recoverable Items folder for 30 days, it will be moved to the Recoverable Items folder in the
user's archive mailbox.

New-RetentionPolicyTag -Name "Recoverable Items 30 days for mailboxes on hold" -Type RecoverableItems -
AgeLimitForRetention 30 -RetentionAction MoveToArchive
TIP
We recommend that the retention period (defined by the AgeLimitForRetention parameter) for the Recoverable Items
RPT is the same as the deleted item retention period for the mailboxes that the RPT will be applied to. This allows a
user the entire deleted item retention period to recover deleted items before they are moved to the archive mailbox.
In the previous example, the retention period was set to 30 days based on the assumption that the deleted item
retention period for mailboxes is also 30 days. An Exchange Online mailbox is configured to retain deleted items for
14 days, by default. But you can change this setting to a maximum of 30 days. For more information, see Change the
deleted item retention period for a mailbox in Exchange Online.

Step 2: Create a new retention policy for mailboxes on hold


The next step is to create a new retention policy and add retention tags to it, including the Recoverable Items RPT
that you created in Step 1. This new policy will be applied to mailboxes on hold in the next step.
Before you create the new retention policy, determine the additional retention tags that you want to add. For a list
of the retention tags that are added to the Default MRM Policy and for information about creating new retention
tags, see the following:
Default Retention Policy in Exchange Online
Default folders that support Retention Policy Tags
The "Create a retention tag" section in the Create a Retention Policy topic.
You can use the EAC or Exchange Online PowerShell to create a retention policy.
Use the EAC to create a retention policy
1. In the EAC, go to Compliance management > Retention policies, and then click Add .
2. On the New retention policy page, under Name, type a name that describes the purpose of the retention
policy; for example, MRM Policy for Mailboxes on Hold.
3. Under Retention tags, click Add .
4. In the list of retention tags, select the Recoverable Items RPT that you created in Step 1, and then click Add.

5. Select additional retention tags to add to the retention policy. For example, you might want to add the same
tags that are included in the Default MRM Policy.
6. When you're finished adding retention tags, click OK.
7. Click Save to create the new retention policy.
Notice that the retention tags linked to the retention policy are displayed in the details pane.

Use Exchange Online PowerShell to create a retention policy


Run the following command to create new retention policy for mailboxes on hold.

New-RetentionPolicy <Name of retention policy> -RetentionPolicyTagLinks <list of retention tags>

For example, the following command creates the retention policy and linked retention tags that is displayed in the
previous illustration.

New-RetentionPolicy "MRM Policy for Mailboxes on Hold" -RetentionPolicyTagLinks "Recoverable Items 30 days for
mailboxes on hold","1 Month Delete","1 Week Delete","1 Year Delete","5 Year Delete","6 Month Delete","Default 2
year move to archive","Junk Email","Never Delete","Personal 1 year move to archive","Personal 5 year move to
archive"

Step 3: Apply the new retention policy to mailboxes on hold


The last step is to apply the new retention policy that you created in Step 2 to mailboxes on hold in your
organization. You can use the EAC or Exchange Online PowerShell to apply the retention policy to a single mailbox
or to multiple mailboxes.
Use the EAC to apply the new retention policy
1. Go to Recipients > Mailboxes.
2. In the list view, select the mailbox you want to apply the retention policy to, and then click Edit .
3. On the User Mailbox page, click Mailbox features.
4. Under Retention policy, select the retention policy that you created in Step 2, and then click Save.
You can also use the EAC to apply the retention policy to multiple mailboxes.
1. Go to Recipients > Mailboxes.
2. In the list view, use the Shift or Ctrl keys to select multiple mailboxes.
3. In the details pane, click More options.
4. Under Retention Policy, click Update.
5. On the Bulk assign retention policy page, select the retention policy that you created in Step 2, and then
click Save.
Use Exchange Online PowerShell to apply the new retention policy
You can use Exchange Online PowerShell to apply a new retention policy to a single mailbox. But the real power of
PowerShell is that you can use it to quickly identify all the mailboxes in your organization that are on either
Litigation Hold or In-Place Hold, and then apply the new retention policy to all mailboxes on hold in a single
command. Here are some examples of using Exchange PowerShell to apply a retention policy to one or more
mailboxes. All of the examples apply the retention policy that was created in Step 2.
This example applies the new retention policy to Pilar Pinilla's mailbox.

Set-Mailbox "Pilar Pinilla" -RetentionPolicy "MRM Policy for Mailboxes on Hold"

This example applies the new retention policy to all mailboxes in the organization that are on Litigation Hold.

$LitigationHolds = Get-Mailbox -ResultSize unlimited | Where-Object {$_.LitigationHoldEnabled -eq 'True'}

$LitigationHolds.DistinguishedName | Set-Mailbox -RetentionPolicy "MRM Policy for Mailboxes on Hold"

This example applies the new retention policy to all mailboxes in the organization that are on In-Place Hold.

$InPlaceHolds = Get-Mailbox -ResultSize unlimited | Where-Object {$_.InPlaceHolds -ne $null}

$InPlaceHolds.DistinguishedName | Set-Mailbox -RetentionPolicy "MRM Policy for Mailboxes on Hold"

You can use the Get-Mailbox cmdlet to verify that the new retention policy was applied.
Here are some examples to verify that the commands in the previous examples applied the "MRM Policy for
Mailboxes on Hold" retention policy to mailboxes on Litigation Hold and mailboxes on In-Place Hold.

Get-Mailbox "Pilar Pinilla" | Select RetentionPolicy

Get-Mailbox -ResultSize unlimited | Where-Object {$_.LitigationHoldEnabled -eq 'True'} | FT


DisplayName,RetentionPolicy -Auto

Get-Mailbox -ResultSize unlimited | Where-Object {$_.InPlaceHolds -ne $null} | FT DisplayName,RetentionPolicy -


Auto

(Optional) Step 4: Run the Managed Folder Assistant to apply the new
retention settings
After you apply the new retention policy to mailboxes on hold, it can take up to 7 days in Exchange Online for the
Managed Folder Assistant to process these mailboxes using the settings in the new retention policy. Instead of
waiting for the Managed Folder Assistant to run, you can use the Start-ManagedFolderAssistant cmdlet to
manually trigger the assistant to process the mailboxes that you applied the new retention policy to.
Run the following command to start the Managed Folder Assistant for Pilar Pinilla's mailbox.

Start-ManagedFolderAssistant "Pilar Pinilla"

Run the following commands to start the Managed Folder Assistant for all mailboxes on hold.

$MailboxesOnHold = Get-Mailbox -ResultSize unlimited | Where-Object {($_.InPlaceHolds -ne $null) -or


($_.LitigationHoldEnabled -eq "True")}

$MailboxesOnHold.DistinguishedName | Start-ManagedFolderAssistant

More information
After you enable a user's archive mailbox, consider telling the user that other items in their mailbox (not just
items in the Recoverable Items folder) might be moved to the archive mailbox. This is because the Default
MRM Policy that's assigned to Exchange Online mailboxes contains a retention tag (named Default 2 years
move to archive) that moves items to the archive mailbox two years after the date the item was delivered to
the mailbox or created by the user. For more information, see Default Retention Policy in Exchange Online
After you enable a user's archive mailbox, you might also tell the user that they can recover deleted items in
the Recoverable Items folder in their archive mailbox. They can do this in Outlook by selecting the Deleted
Items folder in the archive mailbox, and then clicking Recover Deleted Items from Server on the Home
tab. For more information about recovering deleted items, see Recover deleted items in Outlook for
Windows.
How to identify the type of hold placed on an
Exchange Online mailbox
11/6/2018 • 11 minutes to read • Edit Online

This article explains how to identify holds placed on Exchange Online mailboxes in Office 365.
Office 365 offers a number of ways that your organization can prevent mailbox content from being permanently
deleted. This allows your organization to retain content to meet compliance regulars or for the duration of legal or
other types of investigations. Here's a list of the retention features (also called holds) in Office 365:
Litigation Hold - Holds that are applied to user mailboxes in Exchange Online.
eDiscovery hold - Holds that are associated with an eDiscovery case in the Security & Compliance Center.
eDiscovery holds can be applied to user mailboxes, and on the corresponding mailbox for Office 365
Groups and Microsoft Teams.
In-Place Hold - Holds that are applied to user mailboxes by using the In-Place eDiscovery & Hold tool in
the Exchange admin center in Exchange Online.
Office 365 retention policy - Retains content in user mailboxes in Exchange Online and in the
corresponding mailbox for Office 365 Groups and Microsoft Teams. You can create a retention policy
retains Skype for Business Conversations, which are stored in user mailboxes.
There are two types of Office 365 retention policies that can be assigned to mailboxes.
Specific location retention policies - These are policies that are assigned to the content locations
of specific users. You use the Get-Mailbox cmdlet in Exchange Online PowerShell to get information
about retention policies assigned to specific mailboxes.
Organization-wide retention policies - These are policies that are assigned to all content
locations in your organization. You use the Get-OrganizationConfig cmdlet in Exchange Online
PowerShell to get information about organization-wide retention policies. For more information, see
the "Applying a retention policy to an entire organization or specific locations" section in Overview of
Office 365 retention policies.
Office 365 retention labels - If a user applies an Office 365 retention label (one that's configured to retain
content or retain and then delete content) to any folder or item in their mailbox, a hold is placed on the
mailbox just as if the mailbox was placed on Litigation Hold or assigned to an Office 365 retention policy.
For more information, see the Identifying mailboxes on hold because a retention label has been applied to a
folder or item section in this article.
To manage mailboxes on hold, you may have to identify the type of hold that's placed on a mailbox so that you can
perform tasks such as changing the hold duration, temporarily or permanently removing the hold, or excluding a
mailbox from a Office 365 retention policy. In these cases, the first step is to identify the type of hold placed on the
mailbox. And because multiple holds (and different types of holds) can be placed on a single mailbox, you'll have to
identify all holds placed on a mailbox if you want to remove or change those holds.

Step 1: Obtaining the GUID for holds placed on a mailbox


You can run the following two cmdlets in Exchange Online PowerShell to get the GUID of the holds that are placed
on a mailbox. After you obtain a GUID, you use it to identify the specific hold in Step 2. Note that Litigation Holds
are not identified by a GUID. Litigation Holds are either enabled or disabled for a mailbox.
Get-Mailbox - Use this cmdlet to determine whether Litigation Hold is enabled for a mailbox and to get
the GUIDs for eDiscovery holds, In-Place Holds, and Office 365 retention policies that are specifically
assigned to a mailbox. The output of this cmdlet will also indicate if a mailbox has been explicitly excluded
from an organization-wide retention policy.
Get-OrganizationConfig - Use this cmdlet to get the GUIDs for organization-wide retention policies.
To connect to Exchange Online PowerShell, see Connect to Exchange Online PowerShell.
Get-Mailbox
Run the following command to get information about the holds and Office 365 retention policies applied to a
mailbox.

Get-Mailbox <username> | FL LitigationHoldEnabled,InPlaceHolds

TIP
If there are too many values in the InPlaceHolds property and not all of them are displayed, you can run the
Get-Mailbox <username> | Select-Object -ExpandProperty InPlaceHolds command to display each GUID on a
separate line.

The following table describes how to identify different types of holds based on the values in the InPlaceHolds
property when you run the Get-Mailbox cmdlet.

HOLD TYPE EXAMPLE VALUE HOW TO IDENTIFY THE HOLD

Litigation Hold True Litigation Hold is enabled for a mailbox


if the LitigationHoldEnabled property
is set to True .

eDiscovery hold UniH7d895d48-7e23-4a8d-8346- The InPlaceHolds property contains the


533c3beac15d GUID of any hold associated with an
eDiscovery case in the Security &
Compliance Center. You can tell this is
an eDiscovery hold because the GUID
starts with the UniH prefix (which
denotes a Unified Hold).

In-Place Hold c0ba3ce811b6432a8751430937152491 The InPlaceHolds property contains the


or GUID of the In-Place Hold that's placed
cld9c0a984ca74b457fbe4504bf7d3e00de on the mailbox. You can tell this is an
In-Place Hold because the GUID either
doesn't start with a prefix or it starts
with the cld prefix.

Office 365 retention policy specifically mbxcdbbb86ce60342489bff371876e7f224:1 The InPlaceHolds property contains
applied to the mailbox or GUIDs of any specific location retention
skp127d7cf1076947929bf136b7a2a8c36f:3 policy that's applied to the mailbox. You
can identify retention policies because
the GUID starts with the mbx or the
skp prefix. The skp prefix indicates
that the retention policy is applied to
Skype for Business conversations in the
user's mailbox.
HOLD TYPE EXAMPLE VALUE HOW TO IDENTIFY THE HOLD

Excluded from an organization-wide - If a mailbox is excluded from an


Office 365 retention policy mbxe9b52bf7ab3b46a286308ecb29624696 organization-wide Office 365 retention
policy, the GUID for the retention policy
the mailbox is excluded from is
displayed in the InPlaceHolds property
and is identified by the -mbx prefix.

Get-OrganizationConfig
If the InPlaceHolds property is empty when you run the Get-Mailbox cmdlet, there still may be one or more
organization-wide Office 365 retention policies applied to the mailbox. Run the following command in Exchange
Online PowerShell to get a list of GUIDs for organization-wide Office 365 retention policies.

Get-OrganizationConfig | FL InPlaceHolds

TIP
If there are too many values in the InPlaceHolds property and not all of them are displayed, you can run the
Get-OrganizationConfig | Select-Object -ExpandProperty InPlaceHolds command to display each GUID on a
separate line.

The following table describes the different types of organization-wide holds and how to identify each type based
on the GUIDs contained in InPlaceHolds property when you run the Get-OrganizationConfig cmdlet.

HOLD TYPE EXAMPLE VALUE DESCRIPTION

Office 365 retention policies applied to mbx7cfb30345d454ac0a989ab3041051209:2 Organization-wide retention policies


Exchange mailboxes, Exchange public applied to Exchange mailboxes,
folders, and Teams chats Exchange public folders, and 1xN chats
in Microsoft Teams are identified by
GUIDs that start with the mbx prefix.
Note that 1xN chats are stored in the
mailbox of the individual chat
participants.

Office 365 retention policy applied to grp1a0a132ee8944501a4bb6a452ec31171:3 Organization-wide retention policies


Office 365 Groups and Teams channel applied to Office 365 groups and
messages channel messages in Microsoft Teams
are identified by GUIDs that start with
the grp prefix. Note that channel
messages are stored in the group
mailbox that is associated with a
Microsoft Team.

For more information retention policies applied to Microsoft Teams, see the "Teams location" section Overview of
retention policies.
Understanding the format of the InPlaceHolds value for retention policies
In addition to the prefix (mbx, skp, or grp) that identifies an item in the InPlaceHolds property as an Office 365
retention policy, the value also contains a suffix that identifies the type of retention action that's configured for the
policy. For example, the action suffix is highlighted in bold type in the following examples:
skp127d7cf1076947929bf136b7a2a8c36f :1
mbx7cfb30345d454ac0a989ab3041051209 :2
grp1a0a132ee8944501a4bb6a452ec31171 :3
The following table defines the three possible retention actions:

VALUE DESCRIPTION

1 Indicates the retention policy is configured to delete items; the


policy doesn't retain items.

2 Indicates the retention policy is configured to hold items; the


policy doesn't delete items after the retention period expires.

3 Indicates the retention policy is configured to hold items and


then delete them after the retention period expires.

For more information about retention actions, see the "Retaining content for a specific period of time" section in
Overview of retention policies.

Step 2: Using the GUID to identify the hold


After you obtain the GUID for a hold that is applied to a mailbox, the next step is to use that GUID to identify the
hold. The following sections show how to identify the name of the hold (and other information) by using the hold
GUID.
eDiscovery holds
Run the following commands in Security & Compliance Center PowerShell to identify an eDiscovery hold that's
applied to the mailbox. Use the GUID (not including the UniH prefix) for the eDiscovery hold that you identified in
Step 1. The first command creates a variable that contains information about the hold; this variable is used in the
other commands. The second command displays the name of the eDiscovery case the hold is associated with. The
third command displays the name of the hold and a list of the mailboxes the hold applies to.

$CaseHold = Get-CaseHoldPolicy <hold GUID without prefix>

Get-ComplianceCase $CaseHold.CaseId | FL Name

$CaseHold | FL Name,ExchangeLocation

To connect to Security & Compliance Center PowerShell, see Connect to Office 365 Security & Compliance
Center PowerShell.
In-Place Holds
Run the following command in Exchange Online PowerShell to identify the In-Place Hold that's applied to the
mailbox. Use the GUID for the In-Place Hold that you identified in Step 1. The command displays the name of the
hold and a list of the mailboxes the hold applies to.

Get-MailboxSearch -InPlaceHoldIdentity <hold GUID> | FL Name,SourceMailboxes

Note that if the GUID for the In-Place Hold starts with the cld prefix, be sure to include the prefix when running
the previous command.
Office 365 retention policies
Run the following command in Security & Compliance Center PowerShell to identity the Office 365 retention
policy (organization-wide or specific location) that's applied to the mailbox. Use the GUID (not including the mbx,
skp, or grp prefix or the action suffix) that you identified in Step 1.

Get-RetentionCompliancePolicy <hold GUID without prefix or suffix> -DistributionDetail | FL Name,*Location

Identifying mailboxes on hold because a retention label has been


applied to a folder or item
Whenever a user applies a retention label that's configured to retain content or retain and then delete content to
any folder or item in their mailbox, the ComplianceTagHoldApplied mailbox property is set to True. When this
happens, the mailbox is considered to be on hold, just as if it was placed on Litigation Hold or assigned to an
Office 365 retention policy. When the ComplianceTagHoldApplied property is set to True, the following things
may occur:
If the mailbox or the user's Office 365 user account is deleted, the mailbox becomes an inactive mailbox.
You won't be able to disable the mailbox (either the primary mailbox or the archive mailbox, if it's enabled).
Items in the mailbox may be retained longer than expected. This is because the mailbox is on hold and
therefore no items will be permanently deleted (purged).
To view the value of the ComplianceTagHoldApplied property, run the following command in Exchange Online
PowerShell:

Get-Mailbox <username> |FL ComplianceTagHoldApplied

For more information about retention labels, see Overview of Office 365 retention labels.

Managing mailboxes on delay hold


After any type of hold is removed from a mailbox, the value of the DelayHoldApplied mailbox property is set to
True. This occurs the next time the Managed Folder Assistant processes the mailbox and detects that a hold has
been removed. This is called a delay hold and means that the actual removal of the hold is delayed for 30 days to
prevent data from being permanently deleted (purged) from the mailbox. This gives admins an opportunity to
search for or recover mailbox items that will be purged after the hold is actually removed. When a delay hold is
placed on the mailbox, the mailbox is still considered to be on hold for an unlimited duration, as if the mailbox was
on Litigation Hold. After 30 days, the delay hold expires, and Office 365 will automatically attempt to remove the
delay hold (by setting the DelayHoldApplied property to False) so that the hold will be actually removed. After the
DelayHoldApplied property to False, items that are marked for removal will be purged the next time the mailbox
is processed by the Managed Folder Assistant.
To view the value for the DelayHoldApplied property for a mailbox, run the following command in Exchange
Online PowerShell.

Get-Mailbox <username> | FL DelayHoldApplied

To remove the delay hold before it expires, you can run the following command in Exchange Online PowerShell:

Set-Mailbox <username> -RemoveDelayHoldApplied

Note that you must be assigned the Legal Hold role in Exchange Online to use the RemoveDelayHoldApplied
parameter
To remove the delay hold on an inactive mailbox, run the following command in Exchange Online PowerShell:

Set-Mailbox <DN or Exchange GUID> -InactiveMailbox -RemoveDelayHoldApplied

TIP
The best way to specify an inactive mailbox in the previous command is to use its Distinguished Name or Exchange GUID
value. Using one of these values helps prevent accidentally specifying the wrong mailbox.

Next steps
After you identify the holds that are applied to a mailbox, you can perform tasks such as changing the duration of
the hold, temporarily or permanently removing the hold, or in the case of Office 365 retention policies, excluding
an inactive mailbox from the policy. For more information about performing tasks related to holds, see the one of
the following topics:
Run the Set-RetentionCompliancePolicy -AddExchangeLocationException <user mailbox> command in
Security & Compliance Center PowerShell to exclude a mailbox from an organization-wide Office 365
retention policy. Note that this command can only be used for retention policies where the value for the
ExchangeLocation property equals All .
Run the Set-Mailbox -ExcludeFromOrgHolds <hold GUID without prefix or suffix> command in Exchange
Online PowerShell to exclude an inactive mailbox from an organization-wide Office 365 retention policy.
Change the hold duration for an inactive mailbox in Office 365
Delete an inactive mailbox in Office 365
Delete items in the Recoverable Items folder of cloud-based mailboxes on hold
Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

With Advanced eDiscovery, you can better understand your Office 365 data and reduce your eDiscovery costs.
Advanced eDiscovery helps you analyze unstructured data within Office 365, perform more efficient
document review, and make decisions to reduce data for eDiscovery. You can work with data stored in
Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, Office 365 Groups, and
Microsoft Teams. You can perform an eDiscovery search in the Office 365 Security & Compliance Center to
search for content in groups, individual mailboxes and sites, and then analyze the search results with Advanced
eDiscovery. Note that when you prepare search results for analysis in Advanced eDiscovery, Optical Character
Recognition enables the extraction of text from images. This feature allows the powerful text analytic
capabilities of Advanced eDiscovery to be applied to image files.
Advanced eDiscovery streamlines and speeds up the document review process by identifying redundant
information with features like Near-duplicates detection and Email Thread analysis. The Relevance feature
applies predictive coding technology to identify relevant documents. Advanced eDiscovery learns from your
tagging decisions on sample documents and applies statistical and self-learning techniques to calculate the
relevance of each document in the data set. This enables you to focus on key documents, make quick yet
informed decisions on case strategy, cull data, and prioritize review.
**Why advanced eDiscovery? ** Office 365 Advanced eDiscovery builds on the existing set of eDiscovery
capabilities in Office 365. For example, you can use the Search feature in the Office 365 Security &
Compliance Center to perform an initial search of all the content sources in your organization to identify and
collect the data that may be relevant to a specific legal case. Then you can perform analysis on that data by
applying the text analytics, machine learning, and the Relevance/predictive coding capabilities of Advanced
eDiscovery. This can help your organization quickly process thousands of email messages, documents, and
other kinds of data to find those items that are most likely relevant to a specific case. The reduced data set can
then be exported out of Office 365 for further review.

Office 365 Advanced eDiscovery


The following topics describe the setup and use of Advanced eDiscovery modules and features:
Quick setup for Advanced eDiscovery : Helps you to get started with Advanced eDiscovery.
Running the Advanced eDiscovery Process module : Enables the preparation of files from specified data
sources.
Analyzing case data with Advanced eDiscovery : Allows identification and grouping of Near-duplicate
files and hierarchically structured groups of Email Threads.
Managing Advanced eDiscovery Relevance setup : Allows the definition of parameters for Relevance
processing.
Using the Advanced eDiscovery Relevance module : Identifies and ranks files by Relevance scores,
which assists with early case assessment, document culling, and review.
Exporting case data with Advanced eDiscovery : Enables the export of Advanced eDiscovery data and
results for review.
Running reports in Advanced eDiscovery : Enables the generation of .csv file output for the selected
reports.
Defining case and tenants settings in Advanced eDiscovery : Allows the definition of parameters at the
case and tenant level.
Use Express Analysis : Allows quick analysis of a case and export of results.
Using Advanced eDiscovery utilities : Enables the execution of defined Advanced eDiscovery utilities on
case data.
User roles and access in Advanced eDiscovery : Describes the access to features for each user role.
Quick setup for Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

This setup section shows an Office 365 Security & Compliance Center eDiscovery manager how to get started
with Advanced eDiscovery. A working knowledge of both is assumed.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Accessing a case in Advanced eDiscovery


You access Advanced eDiscovery from the Security & Compliance Center. You have to be a member of an
eDiscovery case in the Security & Compliance Center to access the case in Advanced eDiscovery. For instructions
about assigning eDiscovery case permissions and adding users to an eDiscovery case, see Manage eDiscovery
cases in Office 365.
To go to a case in Advanced eDiscovery:
1. Go to the Office 365 Security & Compliance Center .
2. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
3. On the eDiscovery page, click Open next to the case that you want to go to in Advanced eDiscovery.
4. On the Home page for the case, click Advanced eDiscovery.
The Connecting to Advanced eDiscovery progress bar is displayed. When you're connected, the case is
opened in Advanced eDiscovery.

Workflow
The following diagram illustrates the common workflow for managing and using eDiscovery cases in the Security
& Compliance Center and Advanced eDiscovery.
This setup section describes the first four steps in the workflow. For a description of the other steps in the
workflow, see the following.

Analyze
Analyzing case data Identifies and organizes the files by various parameters, enables the use of Themes, and
displays the results. Analyze functionality can be customized by the user in order to achieve enhanced results.

Relevance Setup and Relevance


Relevance Setup and Using the Relevance module Enables assessment and relevance training based on a random
sample of files and uses them to apply decisions to the predictive coding process. Calculates and displays interim
results while monitoring statistical validity of the process. Displays the results to facilitate in making review
decisions.

Export
Exporting case data Enables the exporting of Advanced eDiscovery content and results for external review.

Report
Running reports Enables the generation of selected reports related to Advanced eDiscovery processing.

See also
Office 365 Advanced eDiscovery
Setting up users and cases
Preparing data
Import non-Office 365 content for Advanced
eDiscovery analysis
8/21/2018 • 3 minutes to read • Edit Online

Not all documents that you may need to analyze with Office 365 Advanced eDiscovery will live in Office 365. With
the Non-Office 365 content import feature in Advanced eDiscovery you can upload documents that don't live in
Office 365 (except PST files) into a case linked, Azure storage blob and analyze them with Advanced eDiscovery.
This procedure shows you how to bring your non-Office 365 documents into Advanced eDiscovery for analysis.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

NOTE
You can purchase an Office 365 Advanced eDiscovery data storage add-on subscription for your non-Office 365 content.
This is exclusively available for content that is to be analyzed with Advanced eDiscovery. Follow the steps in Buy or edit and
add-on for Office 365 for business and purchase the Office 365 Advanced eDiscovery storage add-on.

Before you begin


Using the upload Non-Office 365 feature as described in this procedure requires that you have:
An Office 365 E3 with Advanced Compliance add-on or E5 subscription
All custodians whose non-Office 365 content will be uploaded must have E3 with Advanced Compliance
add-on or E5 licenses
An existing eDiscovery case
All the files for uploading gathered into folders where there is one folder per custodian and the folders'
name is in this format *alias@domainname* . The *alias@domainname* must be users Office 365 alias and
domain. You can collect all the *alias@domainname* folders into a root folder. The root folder can only
contain the *alias@domainname* folders, there must be no loose files in the root folder
An account that is either an eDiscovery Manager or eDiscovery Administrator
Microsoft Azure Storage Tools installed on a computer that has access to the non-Office 365 content folder
structure.

Upload non-Office 365 content into Advanced eDiscovery


1. As an eDiscovery Manager or eDiscovery Administrator, open eDiscovery, and open the case that the non-
Office 365 data will be uploaded to. If you need to create a case, see Manage eDiscovery cases in the Office
365 Security & Compliance Center
2. Click Switch to Advanced eDiscovery
3. Under Source type select Non-Office 365 data.
4. Click Add container. Name the container and add a description.
5. Select the newly added container from the container list and copy the URL that appears in the container
details pane and then close the pane
6. Open a command prompt as an administrator and change directory to folder where you have AzCopy
installed..
7. Construct the AzCopy command line to upload the files like this:
AzCopy /Source:" full path to root folder on local machine " /Dest:" container URL up to but not including
the ? " /DestSAS:" remainder of the container url from the ? to the end " /S.
For example, using these values:
root folder - C:\Collected Data
container url -
https://zoomsabcprodeuss114.blob.core.windows.net/ingestion53d059efe5f74784afb308f66cdebf17?
sv=2015-04-
05&sr=c&si=NonOfficeData15%7C0&sig=Bk5INP8CUfv1y4CSJiJl3pJt3Ekvu8GS3P8NkOvoQxA%3D
the AzCopy command line syntax would be:
AzCopy /Source:"C:\CollectedData"
/Dest:"https://zoomsabcprodeuss114.blob.core.windows.net/ingestion53d059efe5f74784afb308f66cdebf17"
/DestSAS:"?sv=2015-04-
05&amp;sr=c&amp;si=NonOfficeData15%7C0&amp;sig=Bk5INP8CUfv1y4CSJiJl3pJt3Ekvu8GS3P8NkOvoQxA%3D" /S

For more information on Azcopy syntax see, Transfer data with the AzCopy on Windows .

IMPORTANT
There must be one root folder per user and the folder name must be in the *alias@domainname* format.

8. Once the folders have finished uploading, switch back to Advanced eDiscovery. The content in the folders
you uploaded is now ready to be processed in Advanced eDiscovery. Select the container and click the
Process button. For more details on Advanced eDiscovery Processing see, Run the Process module and
load data in Office 365 Advanced eDiscovery

IMPORTANT
Once the container is successfully processed in Advanced eDiscovery, you will no longer be able to add new content
to the SAS storage in Azure. If you collect additional content and you want to add it to the case for Advanced
eDiscovery analysis, you must create a new Non-Office 365 data container and repeat this procedure.

NOTE
If the container does not process successfully due to folder naming issues and you then fix the issues, you will still
have to create a new container and the reconnect and upload again using the procedures in this article.
Set up users and cases in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

This topic describes how to set up users and cases for Office 365 Advanced eDiscovery.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Prerequisites
Before setting up cases and users in Advanced eDiscovery, the following is required:
To analyze a user's data using Advanced eDiscovery, the user (the custodian of the data) must be assigned
an Office 365 E5 license. Alternatively, users with an Office 365 E1 or E3 license can be assigned an
Advanced eDiscovery standalone license. Administrators and compliance officers who are assigned to cases
and use Advanced eDiscovery to analyze data don't need an E5 license.
You have to be a member of the eDiscovery Manager role group in the Office 365 Security & Compliance
Center to create an eDiscovery case and add members to it. To add yourself to the eDiscovery Manager role
group in Security & Compliance Center, you have to be a global administrator in your Office 365
organization. If you're not a global administrator, you 'll have to ask a global administrator to add you to the
eDiscovery Manager role group. For more information, see:
Permissions in the Office 365 Security & Compliance Center
Assign eDiscovery permissions in the Office 365 Security & Compliance Center

Step 1: Assign users eDiscovery permissions


The first step is to assign users the requirement permissions in the Security & Compliance Center so that they can
me added as a member of an eDiscovery case. After a user is added as a member of a case in the Security &
Compliance Center, they'll be able to access the case in Advanced eDiscovery.
To assign a user the necessary permissions so they can be added as a member of an eDiscovery case, see Step 1 in
eDiscovery cases in the Office 365 Security & Compliance Center.

Step 2: Create an eDiscovery case and add members


The next step is to create a new eDiscovery case in the Security & Compliance Center and add members.
Members of the case will then be able to access the case in Advanced eDiscovery.
1. To create a new eDiscovery case, see Step 2 in eDiscovery cases in the Office 365 Security & Compliance
Center.
2. To add members to an eDiscovery case, see Step 3 in eDiscovery cases in the Office 365 Security &
Compliance Center
Step 3: Go a case in Advanced eDiscovery
After you create an eDiscovery case and add members, you (or any member of the case) can access the
corresponding case in Advanced eDiscovery. To access a case in Advanced eDiscovery, see Step 8 in eDiscovery
cases in the Office 365 Security & Compliance Center.

See also
Office 365 Advanced eDiscovery
Preparing data
User roles and access
Export results in Office 365 Advanced eDiscovery
8/21/2018 • 9 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This topic describes the Advanced eDiscovery Export Setup options.


In this topic:
Defining export batches and sessions
Incremental and additional exports
Set up batch export parameters
Export report output files

Defining export batches and sessions


An export batch allows export processing using a set of defined parameters. Advanced eDiscovery enables you to
define batches to customize each export.
Parameters are defined per export batch. A batch named "Export batch 01" is created by default for the first batch
of a case. You can also edit the batch name and description.
An export session is an execution of Advanced eDiscovery Export within an export batch.

Incremental and additional exports


You can run multiple export sessions within an export batch, to ensure consistent results based on the same
export template and parameters. For each session within a batch, you can export analytics for newly processed
case data and process each "incrementally."
In order to export using a different set of parameters, you first need to create a new batch. The first session in the
new batch will produce results for files processed in the case so far, whether or not these files were imported and
processed over one or multiple Imports. Each batch recalculates pivots, similarity, inclusives, etc. Sessions use the
parameters defined for the batch and do not recalculate pivots, similarity, inclusives, etc. for each session
execution.
For example, assume a case was imported and its data analyzed. In order to retrieve Near-duplicates and Email
Threading results for the incremental data, click Create export session in the same batch that was previously
used to export data.

Set up batch export parameters


The eDiscovery Export Tool is used to export search results from Advanced eDiscovery to your local computer. To
increase the data transfer throughput and speed-up the export process, you can configure a Windows Registry
setting on the computer that you use to export the search results. If you'd like to increase the download speed,
configure the registry setting before you set up the export parameters. For more information, see Increase the
download speed when exporting eDiscovery search results from Office 365.
1. In Advanced eDiscovery, select a Case and click Export > Setup.
From the Export batch list, select the batch name or export results to Export batch 01, (the default batch).
To export results for new files that you added to an existing case, continue with your current batch. To create
a session in the batch, select the same batch number and click Create export session You can use this
option to export the same parameters as the previous batch, in an incremental manner.
To export to a new batch, click Add and enter a new name in Batch name (or accept the default) and a
description in Batch description. Click OK.

To edit a batch name or description, select the name in Export batch, click Edit , and then modify the
fields.

NOTE
After you've run sessions for an export batch, they cannot be deleted. In addition, only some parameters can be
edited once the first session is run.

To create a duplicate export batch, choose Duplicate export batch and enter a name and a description
for the duplicate batch in the panel.

To delete an export batch, choose Delete .

To view the history of a batch, choose Batch history .


2. Under Population,Select Include only files above Relevance cut-off score and/or Refine export
batch if you want to fine-tune the settings for your export batch.
3. If you select Include only files above Relevance cut-off score, then the Issue is enabled. If the file's
relevance score is higher than the cut-off score for the selected issue, the file will be exported unless it's
excluded by the 'For review' filter.
If you select Refine export batch, the De-dupe and Filter by 'For review' field radio buttons are enabled. If you
choose De-dupe, then duplicate files will be filtered out according to the policy defined [Case level (default): from
every set of duplicate files in the entire case, all but one file will be de-duped. Custodian level: from every set of
duplicate files of the same custodian, all but one file will be de-duped.] The export output contains a record of all
duplicate files. If you choose Filter by 'For review' field, select Modify under Metadata to enter your 'For
review' field settings. Select Include input files to include source files in the package content. You can clear this
setting to speed up the export process. Note that the Native files will be exported in any case.
4. Under Metadata, select from the following options in the Export template list (once per session).
Standard: Basic set of data items, metadata, and properties. Use this option when import data was already
processed in Advanced eDiscovery and export data is uploaded to a system that already contains the files.
By default, export template columns are created and filled.
All: Full set of standard metadata including all processing data, as well as Analyze and Relevance scores.
This template is required when Advanced eDiscovery performs the processing and file data is uploaded to
an external system for the first time.
Issues: Select All Issues or select a particular issue you have created.
5. Under Destination:
Download to local machine
Export to user-defined Azure blob: If this is checked, you can specify a container URL and SAS token.

NOTE
Once an export package is stored to the user defined Azure blob, the data is no longer managed by Advanced
eDiscovery; it's managed by the Azure blob. This means if you delete the case, the exported files will still remain on
the Azure blob.

Save SAS token for future export session: If checked, the SAS token will be encrypted in the Advanced
eDiscovery's internal database for future use.

NOTE
Currently the SAS token expires after a month. If you try to download after more than a month you have to undo
last session, then export again.

6. Click Modify to set the "for review' field settings.


In **For review field settings** panel, in **Select scenario**, select the scenario and scope of the review.
The settings are displayed based on your selection.

**Review all** (default): All emails, attachments, and documents are selected by default.

**Review all unique content in a set**: Inclusives and unique inclusive copies, unique attachments in email
set level, representative from every set of exact duplicates.

**Review all unique content in a set - no inclusive copies**: Inclusives, unique attachments in email set
level, representative from every set of exact duplicates.

**Review all unique content and related family files**: Inclusives, unique attachments in email set level,
representative from every set of exact duplicates, expand to include family files.

**Custom** (allows you to define the options in the dialog): The default is to keep current selections and
enable all dialog options, to allow their selection.

If you select custom, you can then customize the settings for emails, documents, attachments and
miscellaneous.

In Emails select the emails you want to export:

**All emails**: (default) All emails are selected.

**Inclusives**: An inclusive email is a last email of a thread, and it contains all the other emails from the
thread.

**Inclusives and unique inclusive copies**: Inclusive copies and inclusives with the same subject, body and
attachments; unique inclusive copies are unique copies of these emails .

In Documents select the documents you want to export:

**All documents**: (default) All documents are selected.

**Pivots**: A file chosen as representative of near-duplicates set, which is typically used as the baseline
when reviewing the set.

**Representative from every set of exact duplicates**: Unique near-duplicate files (including the pivot).

In Attachments select the attachments you want to export

**All attachments**: (default) All attachments are selected.

**Unique attachment in case level**: Unique attachment files within the specified case.

**Unique attachment in email set level**: Unique attachment files within the specified email case.

In Micellaneous you can choose to Treat attachments as documents, Treat emails as documents, or
Expand to include family files. When you choose Expand to include family files, for each file that is
flagged for review, all files of the same family will also be flagged.

Choose **Save** to save the settings.


7. After you specify export parameters, to start export batch, click Create export session.
During export, the status is displayed in Task status. The results are displayed in Export summary.
8. In the Download files window, click Copy to clipboard to copy the Export key.

9. Click Close.
The eDiscovery Export Tool is started.

10. In the eDiscovery Export Tool:


11. In Paste the Shared Access Signature that will be used to connect to the source, paste the Export
key that youcopied to the clipboard in step 7.
12. Click Browse to select the target location for storing the downloaded export files on the local machine.
13. Click Start.The export files are downloaded to the local machine. If you chose Export to user-defined
Azure blob in step 4, the session is exported to a Blob storage URL destination of your choosing.
For a full description of the fields in the export report, see Export report fields.

Export report output files


The following table lists the output files that are generated when you run an Export batch.

FILE NAME FILE TYPE DESCRIPTION

Export summary csv A log file generated by the eDiscovery


Export Tool.

Trace txt A log file generated by the eDiscovery


Export Tool.
FILE NAME FILE TYPE DESCRIPTION

Extracted text files File folder Folder that contains the extracted text
files of the exported files.

Input or native files File folder Folder that contains the native and
input files of the exported files.

Export list xlsx Exported files metadata in xlsx format.


Fields in files are according to template
user selects to export. If needed, several
files are created, each contains 100-
150K rows. If a certain value contains
more characters than an Excel cell can
contain (currently the limit is 32,767
characters), then the value will be
trimmed to the maximum length
allowed. If a value is trimmed, the cell's
background color is red to indicate this
to the user."Email participants" is an
example of a field that can exceed the
length limit, if the email was sent to a
large distribution. See Export report
fields for details about the output fields.

Load file csv Exported files metadata in csv format


for loading into a different application.
Fields in files are according to template
user selects to export.

Success indicator txt Only created when exporting to a 3rd


party Azure blob. If export succeed
completely, the file will be created. In
case of failure, or partial success the file
will not be created. File will be created
in the root folder, allowing automated
tracking on different Export
batches/sessions statuses. This is an
empty file. Its name is:
TenantId_CaseId_ExternalCaseId_CaseN
ame_ExportBatchId_SessionId_DateTime
.txt.

See also
Office 365 Advanced eDiscovery
Viewing batch history and exporting past results
Quick setup for Office 365 Advanced eDiscovery
Export report fields
Increase the download speed when exporting eDiscovery search results from Office 365
Run the Process module in Office 365 Advanced
eDiscovery
8/21/2018 • 3 minutes to read • Edit Online

Case files are loaded into the Advanced eDiscovery during Prepare > Process.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Guidelines: Preparing data for Advanced eDiscovery


Quality: Clearly identify the case file population pertinent to the case.
Loads: Load the files into a location that is accessible to Advanced eDiscovery.
File ID: A unique file identifier in Advanced eDiscovery. If no file identifier is imported, Advanced
eDiscovery automatically generates the ID. If you map the ID in a subsequent Process load, and map a
different path than in the initial Process load, Advanced eDiscovery will replace the path (rather than add a
new file entry). The ID can be used as a reference in the Export process. The ID value should not be "-1".
MD5: This signature is used to differentiate between files (two files are not considered exact duplicates
unless they have the same MD5). By default, Advanced eDiscovery calculates the MD5 of files. When the
loaded files are text files, it is recommended to load and map the original MD5 value instead of calculating it
in Advanced eDiscovery.
File type and name:
Advanced eDiscovery can process files of various formats and extract loaded native files into a
standard format, such as *.TXT, HTML, or .XML. Processing of text files is faster than native files.
Extracted text files are stored in the case folder.
Do not load files that cannot be extracted, such as system files or graphic images. These files may
delay processing.
Verify that file names are significantly named and paths are correct.
File path: Advanced eDiscovery can load files with path lengths up to 400 characters.
Text extraction: When extracting text from native files, in addition to normal text, the following are also
extracted: hidden text (Excel and .doc), hidden columns (Excel), track changes (.doc), speaker notes (.ppt),
embedded objects (for example, Excel objects in a .ppt). These can be viewed in the Text editor.
Ignore Text: This optional feature is defined after Process is run and before Analyze. Ignore text should be
used with caution because its use may reduce the performance of file analysis.
Multilingual text: Advanced eDiscovery does not currently handle multilingual names for tags, custodian,
and issues.
Metadata: Determine if there is metadata that you want to save in the case database for future reference,
such as date range, file size, file type, custodian, and subject. Metadata can be loaded after files were already
loaded without rerunning the inventory or adding reprocessing overhead.
If the files were originally loaded by path, map the path column when later importing metadata. It is
possible to refer to the file by ID and to map a different path. This is a useful scenario when the file
paths change.
If the files were originally loaded by File ID, map the ID column when loading metadata. Referring to
the file by path (instead of ID ) will cause files to be re-loaded with a different ID. Advanced
eDiscovery creates copies of the files rather that loading metadata of the existing files.
Families: It is not possible to load a family without its parent (head of family).
File size: There is no limitation on the size of files loaded to Advanced eDiscovery. For analysis (Analyze,
Relevance, etc.), the limit is 5,242,880 characters of extracted text. Larger files are ignored (for example, in
Relevance, files do not participate in the Relevance training process and do not receive a Relevance score
after batch calculation).
File quantity: There is no recommended limit on the number of files that can be handled in a single case.
Performance depends on the resources of your system.

Filtering files
A user-defined label can be associated with a set of files to exclude them from Process or other tasks. Each Process
session is associated with a batch ID. Although the batch ID is not visible to the expert in Relevance, this can be
done using a search utility, by adding a filter for the current batch and tagging all appropriate files with a user-
defined label.

See also
Office 365 Advanced eDiscovery
Running the Process module and loading data
Viewing Process module results
Analyze case data with Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The Prepare > Analyze process in Advanced eDiscovery applies the following functionality to the included files:
Identifies and organizes the loaded files into groups of unique files, duplicates, and near-duplicates.
Identifies and organizes emails into hierarchically structured groups of email threads, based on the
progressive inclusiveness of the emails.
Enables the use of Themes in Advanced eDiscovery processing and file batching.
Analyze allows you to set parameters, run options, and view the results, as follows:
Analyze setup: Allows settings to be specified before running Analyze on the files.
Analyze results: Displays metrics of the analysis.
Before running Analyze, define the criteria for selecting and processing files, including which loaded files will be
analyzed and the type of analysis to which each type of file will be submitted.

See also
Office 365 Advanced eDiscovery
Understanding document similarity
Setting ignore text
Setting Analyze advanced settings
Viewing Analyze tasks
Export case data in Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The Export process in Advanced eDiscovery enables the exporting of Advanced eDiscovery content and results for
external review.

Guidelines for exporting data


You can review the export data generated from Advanced eDiscovery, for example, to distribute pertinent
elements to the document review team or export to an external document review tool.
You can generate and manipulate the export output at any time during and after Advanced eDiscovery
processing. In a standard scenario, significant results are achieved after Relevance training and Batch
calculation are successfully completed. For example, you can generate a sample of the 1,000 most relevant
files and evaluate Advanced eDiscovery performance before you proceed.
Exporting a large amount of data to a database may have a significant impact on the required database size
and the required configuration of the Advanced eDiscovery database.

See also
Office 365 Advanced eDiscovery
Exporting results
Viewing Batch history and Export results
Export report fields
Use Office 365 Advanced eDiscovery utilities
8/21/2018 • 3 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The utilities that are displayed and available in Advanced eDiscovery depend on context and user roles.

Case log
The Case log provides a detailed list of application processing activities, which can be used for tracking,
troubleshooting, and for addressing errors and warnings. The log can be generated and stored locally on the host
or server, or sent directly to an email address.
The log file can also be downloaded to the client's computer. The client download option may be enabled or
disabled according to configuration and user role.
1. In the menu bar, click the Cogwheel icon.
2. In the Settings and utilities > Utilities tab, select Case log > Setup.
3. Select the Log level as follows:
Standard: Includes the basic log data. This option is usually necessary for monitoring, and should be used
unless recommended otherwise.
Minimal: Used for very large cases, and returns only the latest data.
4. Click Run Case log. The log is generated and path is displayed. The task progress information for the current
and last task is displayed in the Task status pane.

Clear data
If it is necessary to delete or reinitialize case data, the database instance must be initialized. The Clear data utility
deletes all specified entries from the case database, text files, case folder, and accumulated results. The function can
only be performed by an administrator.

IMPORTANT
This action is not reversible and will clear all Relevance tagging and analysis performed by the expert. Save a backup of data,
if necessary. Use this option with extreme care. Deleting tagged and ranked files can impact the Relevance results.

1. In the menu bar, click the Cogwheel icon.


2. In the Settings and utilities > Utilities tab, select Clear data > Setup.
3. Select an option for the information to initialize:
Relevance: Deletes all work done in Relevance, including definition of loads and association of files to
loads. It deletes all samples and tagging.
Near-duplicates and email threads: Deletes all analysis information of near-duplicates and email
threads.
Themes: Deletes themes-related data.
Export history: Deletes history information of Export batches.
4. Click Clear data. The case data is cleared. The task progress information for the current and last task is
displayed in the Task status pane.

Modify Relevance
This section describes how to skip or roll back a Relevance sample.
1. In the menu bar, click the Cogwheel icon.
2. In the Settings and utilities > Utilities tab, select Modify relevance.
3. Select from the options:
Skip current sample - for current user: This will tag, as Skip, all untagged files in the open case sample
of the user running the utility. Relevance processing will not be performed on files tagged as Skip.
Skip current sample - all open samples: This will tag, as Skip, all untagged files in all open samples for
all users. This option is not recommended if users are currently tagging samples.
Roll back last sample: The last completed Relevance training sample will be rolled back, regardless of
whether it is before or after the "Calculate" process. Rollback of a catch-up sample is not allowed.
4. Click Execute to run.

Transparency analysis
The Transparency analysis utility enables a detailed view of files and their assigned Relevance score. The report
can be used as a sanity check or to compare the relevance of a file defined by a human reviewer as compared to
the relevance assigned by Advanced eDiscovery.
In addition to Relevance scores, Advanced eDiscovery calculates and assigns keyword weights that consider the
keyword context. The same word in a file can be assigned different weights, depending on context and location.
Each keyword is marked using an increasing scale of color intensity ranging from yellow to dark orange and
varying shades of gray. Color coding is used to visually indicate the word's relative positive or negative
contribution to the Relevance score.
In a multiple-issue case scenario, a Transparency analysis report can be generated for each issue.
1. In the menu bar, click the Cogwheel icon.
2. In the Settings and utilities > Utilities tab, select Transparency analysis > Setup.
3. In ** File ID **, enter the file ID of the file to process.
4. In the Issue list, select the pertinent issue.
5. Click Transparency analysis. Upon completion, the Transparency analysis report for the file is displayed,
which shows how the marked keyword colors correlate to the overall Relevance score.

See also
Office 365 Advanced eDiscovery
Defining case and tenant settings
User roles and access in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

The following table lists the Advanced eDiscovery user roles and their access.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

User roles and access


The user roles and access are defined in Settings and utilities > Tenant settings > User administration.

MODULE TASK ADMINISTRATOR MANAGER REVIEWER

Cases View cases assigned X X X


to this user

Add / modify cases X X


assigned to this use

Assign users to a case X X

Assign self to a case X

Delete a case X

Prepare Process X X

Analyze X X

Relevance Relevance setup X X

Relevance - Track. X X X
Tag, Decide, and Test

Export Export X X

Reports Reports X X

Setting & utilities User administration X

Tenant settings X

Case settings X X
MODULE TASK ADMINISTRATOR MANAGER REVIEWER

Utilities: Transparency X X X
analysis; Modify
relevance

Utilities: Other X X

To edit a user, select a user in the list, and then click Edit .
In the ** Edit user ** panel you can change the display name, or the Role.

To add a user, click Add


In the Add user panel enter Email, Display name and Role for the user.

To delete a user, select a user in the list, and then click Delete .

See also
Office 365 Advanced eDiscovery
Setting up users and cases
Manage Relevance setup in Office 365 Advanced
eDiscovery
8/21/2018 • 3 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Advanced eDiscovery Relevance technology employs expert-guided software for scoring files by their relevance.
Advanced eDiscovery Relevance can be used for Early Case Assessment (ECA), culling, and file sample review.
Advanced eDiscovery includes components for the Relevance training and tagging of files relevant to a case.
Advanced eDiscovery learns from the trained samples of Relevant and Not Relevant files to provide Relevance
scores for each file, and generates analytical results that can be used during and after the file review process.

Guidelines for setting up Relevance training


In Advance eDiscovery, in the Cases window, select a case and click Go to case. Click Relevance > Relevanace
setup. Follow these recommended guidelines to setup Relevance.
Tagging: The effectiveness of the iterative Relevance training process is dependent on the ability of the
expert to tag the file samples with precision and consistency.
Case issues:
For each issue, use the same expert throughout the entire Relevance training process. Simultaneous
tagging of the same issue by multiple experts is not permitted.
Determine if each group of files is pertinent only to a specific issue.
If an issue is defined too generally, Advanced eDiscovery may yield too many files that are actually
not relevant. If an issue is defined too narrowly, the Relevance training process may take more time.
During each Relevance training cycle, Advanced eDiscovery focuses on a single active issue and
interim sample results are displayed accordingly.
In a multiple-issue scenario, the Sampling mode enables the selection of issues to be included in
processing. Issues defined as "off" are not handled until their Sampling mode is changed. An issue
can be "idle" or "on" for only one expert.
Advanced eDiscovery can be used to generate candidate privilege files. Set up a separate issue for
privilege. If possible, train and cull for relevance first, and then train for privilege on the culled set
only (reload the culled set as a separate case).
Batch calculation can be performed only when there are no open samples (when clicking Batch
Calculation, there will be a list displayed of users with open samples). To "close" samples of other
users (this should be performed only if these users are not tagging these samples), an Administrator
can use the "Modify relevance" utility with the "All users sample" option.
Metadata: Advanced eDiscovery focuses on content. It does not consider metadata as part of the relevance
criteria.
Richness: If the Richness for an issue is less than 3% after Assessment, consider seeding the Relevance
training with known Relevant and Not Relevant files.
File size: Large files (over 5,242,880 characters of extracted text) are ignored in Relevance. The files do not
participate in the Relevance training process and do not receive a Relevance score after Batch Calculation.
Files over 5MB can be included in the Assessment set.

Setting up case issues


The parameters described in this section are available in the Advanced eDiscovery Relevance > Relevance
setup.
Issues must be assigned to a user who will train the files.
Imported files must then be added to the load being processed.
Define and organize issues carefully, as this can impact the Relevance training results.
After parameters are set, the reviewer / expert can start training the files in the Relevance tab.

See also
Office 365 Advanced eDiscovery
Defining issues and assigning users
Setting up loads to add imported files
Defining highlighted keywords and advanced options
Use the Relevance module in Office 365 Advanced
eDiscovery
8/21/2018 • 6 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, the Relevance module includes the Relevance training and review of files related to a
case. The Relevance workflow is shown and described as follows:

Cycles of assessment and tracking:


Assessment: Advanced eDiscovery enables early assessment based on a random sample of files and
uses this assessment to apply decisions to determine the performance of the predictive coding
process.
Track: Advanced eDiscovery calculates and displays interim results of the assessment while
monitoring statistical validity of the process.
Cycles of training and tracking:
Tag: Advanced eDiscovery learns Relevance criteria specific to each issue based on the expert's
iterative review and tagging of individual files.
Track: Advanced eDiscovery calculates and displays interim results of the Relevance training while
monitoring statistical validity of the process.
Batch calculation: Advanced eDiscovery takes the accumulated and learned Relevance criteria, applies it
to the entire file collection, and generates Relevance scores for each file.
Decide: Advanced eDiscovery displays the results of the analysis applied to the entire case after Batch
calculation and displays data for making document review decisions.
Test: Advanced eDiscovery results can be tested to verify the validity and effectiveness of the Advanced
eDiscovery processing.
Guidelines for Relevance training and review
Following is an overview of guidelines for Relevance training and review:
Errors and inconsistencies: If tagging errors are made during training, return to previous file samples to
correct them. If there are too many errors to correct or there is a new perspective of the case or issue, the
Relevance criteria should be redefined by the Administrator, and the Relevance training restarted.
Tagging and training:
Files should be tagged based on content only. Do not consider metadata, such as custodian, date, or
file path.
Do not consider date range indications in the text when tagging files.
Do not consider embedded graphical images when tagging files.
If viewing a file using the formatted text view icon while tagging, do not consider the formatting of
text. For example, a word displayed with a strikethrough (a horizontal line through its center
indicating deletion) is still considered by Relevance as part of the analyzed text.
Ignore text applied to Relevance (as set by the Case Manager or Administrator) will be removed in
the displayed file content in the text view in Relevance. If the values for Ignore text were defined after
Relevance training already started, the new ignored text will be applied to sample files created from
the point in which it was defined. The Ignore Text feature should be used cautiously, as its use may
reduce the performance of file analysis
Use the Skip tagging option only when necessary. Advanced eDiscovery does not train based on
skipped files. In assessment, if it's hard to tell whether a file is relevant, it is better to tag as Relevant
(R ) or Not relevant (NR ) whenever possible rather than selecting Skip. When Advanced eDiscovery
evaluates training, it can then be seen how well these types of files were processed.
Even files with a very small amount of extracted text should be tagged in training as R/NR, rather
than as "Skip", when possible.
Tagging can impact the classifier as long as the file is readable and can be tagged as R/NR.
The file sequence number on the displayed Sample files list on the Tag tab allows the user to return
to the original displayed order of the files.
You can go back to any sample and change the tagging of the assessment and training set files. The
changes will be applied when creating the next sample.
Scanned Excel files in PDF format should be treated the same as native Excel files when tagging files.
When in doubt regarding the Relevance tagging of a file, consult an expert. Incorrect tagging during
the Relevance training can lead to lost time later in the process and may also have a negative impact
on the quality of the overall results.
Keywords that were defined in Keyword lists will be displayed in colors to help the user identify
relevant files while tagging.
Batch calculation: Files that were tagged as R/NR by the expert will receive a score of either 0 or 100.
This applies to tagging made before Batch calculation. If the expert switched the issue to Idle after Batch
Calculation and continued tagging this issue, the newly tagged scores will not be 100/0 but rather the
original score.
Issues and sampling mode: Issues are usually turned Off when work on them is completed (Relevance
training is stabilized and Batch calculation was performed), when the issues are canceled, or when another
user is working on the issues.

Steps in Relevance training


In the Relevance > Track tab, Advanced eDiscovery provides recommendations on how to proceed in the
processing, with the following next steps. The implications are described below when each of the following steps is
recommended in the Relevance training process.
Tagging / Continue tagging: File review and Relevance tagging performed by an expert for each file and
issue within a sample.
Implication: An existing sample needs to be tagged.
Assessment / Continue assessment: Enables early validation of case issue relevance and a preliminary view
of the relevance of the file population imported for the current case.
Implication: More assessment is required or recommended.
Training / Continue training: Process during which Advanced eDiscovery learns from the expert who is
tagging the file samples and acquires the ability to identify Relevance criteria pertinent to each issue within
the context of each case.
Implication: The issue needs more training; the next sample should be created and tagged.
Batch calculation: Relevance process in which Advanced eDiscovery takes the knowledge acquired during
the training stage and applies it to the entire file population. All files in the pertinent file group are assessed
for relevance and assigned a Relevance score.
Implication: The issue has stabilized, and Batch calculation can be performed.
Catch-up: Relevance indicates when an expert reviews and tags a sample of files selected from an
additional file load during a Rolling Loads scenario.
Implication: A new load has been added, and Catch-up is required to continue working.
Tag inconsistencies: Process identifies, via an Advanced eDiscovery algorithm, inconsistencies in the file
tagging process that may negatively impact the analysis.
Implication: The next sample will include files that have been tagged in previous samples, and their
tagging must be redone.
Update classifier: Allows the user to apply tagging or seeding changes.
Implication: Tagging and seeding changes can be applied without needing to manually run another
Relevance sample.
On hold: The Relevance training process is completed.
Implication: No Relevance training is required at this point.
Although Advanced eDiscovery guides you through the process, with recommended Next steps at different
stages, it also allows you to navigate between tabs and pages, and to make choices to address situations that may
be pertinent to your individual case, issue, or document review process.
It is possible to accept or override Advanced eDiscovery Next step processing choices. If you want to perform a
step other than the recommended Next step, click the Next step listed in the expanded issue display in the dialog,
click the Modify button next to the Next step, and select another Next step option.

NOTE
Some options may remain disabled after unlocking as they are not supported for use at that point in the process.
See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Assessment
Tagging and Relevance training
Tracking Relevance analysis
Deciding based on the results
Testing Relevance analysis
Tagging and Relevance training in Office 365
Advanced eDiscovery
8/21/2018 • 4 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This topic describes the procedure for working with the Advanced eDiscovery Relevance training module.
After Assessment is completed in Advanced eDiscovery, and you enter the Relevance training stage, a training
sample of 40 files is brought into the Tag tab for tagging.

Performing Relevance training


1. In the Relevance > Tag tab, the Tagging pane is displayed by default in the left pane and the sample files
are displayed, one at a time for tagging.

In the Tag tab, the file's display name is shown. This could be the path, email subject, title, or user-defined
name. The ID, file path or text path can be copied by right-clicking on the file's path.
The Tag tab tagging statistics show the file sample number (at the top of the left pane), the number of the
currently displayed file out of the total files in the sample (bottom of right pane), and the current total
number of tagged files in the sample (bottom of the left pane), which changes as you tag files. This applies
for any Relevance tagging done, whether in Assessment, Training, Catch-up, or Test.
Icons indicating the existence of comments, tags, and family files are displayed in the file view in a bar
above the file.
2. Determine the file's relevance for the case issue and tag the file using either the Tagging option icon
buttons or keyboard shortcuts, as shown in the following table:

Tagging option Description Keyboard shortcut For multiple issues - bulk


tag keyboard shortcut
:----- :----- :----- :-----

R Relevant Z Shift + Z

NR Not relevant X Shift + X

Skip Skip C Shift + A

When multiple issues exist for a file, after tagging one issue, the selection moves to the next issue (if any).
Keywords that were defined by the Administrator or Case manager when highlighting keywords
(Relevance setup > Highlighted keywords), will be displayed (in specified colors) to help identify relevant
files while tagging. If a keyword has a double underline, it can be clicked to display a tool-tip with the
keyword's description.
Optionally, in the Tag tab, click Tag settings to set the following options:

Bulk tag: Use this option to assign multiple issues for a file by selecting All to set the tag for the selected
file for all issues (overrides already tagged issues) or by selecting The rest to apply the tag to the
remaining untagged issues. The selected option remains in effect for all of this user's cases until changed
by that user (setting is per user for all the user's cases).
Auto tag: Select this check box to set other issues for a file as Not relevant after a single Relevant tagging.
Auto advance: Select this check box to move the displayed file selection to the next file when tagging the
last or only untagged issue.
Skipped files will not be considered for Relevance training and Relevance scoring purposes.
3. Free-text comments, associated with a file, can be viewed and edited via the Comment option in the left
pane drop-down list. (optional)
4. Guidelines for tagging can be viewed by selecting the Tagging guidelines option in the left pane drop-
down list.
5. After you finish tagging all files in the list and are ready to calculate the results, click Calculate. The Track
tab is displayed.

Working with the sample files list


The sample files list allows you to view a list of the files in a training sample and perform various action on one or
more files. In the Relevance > Tag tab, the Sample files left pane displays a list of sample files for processing
with Assessment, Training, Catch-up, and Inconsistencies processes.
1. In the Relevance > Tag tab, select the Sample files in the left pane drop-down list. The sample files are
listed in the left pane.

2. Select a specific sample or file number by entering or selecting its number in the Sample or File boxes.
A file sequence number is listed in the left column of the displayed file list on the Tag tab. By clicking
the header, the original displayed order of the files returns to its original order.
Clicking on a file row displays its content in the right pane.
Navigate between files in the current sample by using the lower menu bar options. In addition,
navigational keyboard shortcuts are available:
To navigate to the first file in the sample: Shift + Ctrl + <
To navigate to the previous file in the sample: Shift + <
To navigate to the next file in the sample: Shift + >
To navigate to the last file in the sample: Shift + Ctrl + >

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Assessment
Tracking Relevance analysis
Deciding based on the results
Testing Relevance analysis
Run the Process module and load data in Office 365
Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This section describes the functionality of the Advanced eDiscovery Process module.
In addition to file data, metadata such as file type, extension, location or path, creation date and time, author,
custodian, and subject, can be loaded into Advanced eDiscovery and saved for each case. Some metadata is
calculated by Advanced eDiscovery, for example, when native files are loaded.
Advanced eDiscovery provides system metadata values, such as Near-duplicate groupings or Relevance scores.
Other metadata, such as file annotations, can be added by the Administrator.

Running Process
NOTE
Batch numbers are assigned to a file during Process to allow the tracking of files. The batch number also enables
identification of Process batches for reprocessing options. Additional filters are available for filtering by batch number and
sessions.

Perform the following steps to run Process.


1. Open the Office 365 Security & Compliance Center .
2. Go to Search & investigation > eDiscovery and then click Go to Advanced eDiscovery.
3. In Advanced eDiscovery, select the appropriate case in the displayed Cases page and click Go to case.
4. In Prepare > Process > Setup, select a container from the list of available containers.
5. Click Advanced settings... if you want to add the container as seed files or as pre-tagged files.
Use seed files to accelerate training for issues with low richness (usually 2%, or less). For seed files, it is
recommended that you select a variety of distinctly relevant files and process about 20-50 seeds per issue
(too many seed files can skew Relevance results). Seed files should be reviewed by the same person who
will train the issue.
Use pre-tagged files to automate Relevance training. You should tag at least 1,500 files, and keep the
proportion of relevant to non-relevant files the same as in the collection added to Relevance. These files
should be manually tagged, and you should be confident in the quality of tagging.

In the Seed section:


Choose Mark as seed files to mark the container as seed files. You also need choose to assign them per
issue from the For issue drop-down. Choose either Relevant or Not relevant from the Tag drop-down.
NOTE
Once you set files as Seed, you cannot mark them as Pre-tagged.

In the Pre-tagged files section:


Choose Mark as pre-tagged files to mark the container as pre-tagged files. You also need to assign them
per issue from the For issue drop-down. Choose either Relevant or Not relevant from the Tag drop-
down.

NOTE
Once you set files as Pre-tagged, you cannot mark them as Seed.

In the Email tagging section. set which part of a processed email are to be marked as Seed or Pre-tagged.
6. To begin, click Process. When completed, the Process results are displayed.
7. (Optional) If you need to assign data sources to a specific custodian, you can add and edit custodian names
in Custodians > Manage and assign custodians in Custodians > Assign.
If you add to the case, then you can process again.

See also
Office 365 Advanced eDiscovery
Viewing Process module results
Define case and tenant settings in Office 365
Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The Advanced eDiscovery case and tenant settings are described in this topic.

Case settings
This sections describes the settings that can be defined at the case level.

NOTE
If no case is currently selected in Advanced eDiscovery, the Case settings tab is inactive.

Cross module
The following Cross module settings are case options that apply to Advanced eDiscovery modules.
Default page after login: Sets the default page to be displayed upon starting Advanced eDiscovery.
File display name: File identifier that will be displayed throughout Advanced eDiscovery to identify the file,
as an alternative to the Advanced eDiscovery display name of file title/path or email subject.
1. Open Settings and utilities by clicking the Cogwheel icon. Open Settings and utilities > Case
settings tab > Cross module.
2. Select from the Default page after login options:
Last page of previous login
Cases page
3. Click Save.

Tenant settings
The Advanced eDiscovery Tenant settings are described in this section.
User administration
The User administration options are described in Setting up users and cases.
Event log
The Event log provides metadata regarding Advanced eDiscovery processing anytime during Advanced
eDiscovery operation. For example, it includes the start time of the main Advanced eDiscovery processes (Import,
Analyze, Relevance, and Export) as well as the end time and status. This log can be used for tracking and
troubleshooting data processing activities and for addressing errors and warnings.
1. Open Settings and utilities by clicking the Cogwheel icon.
2. In the Settings and utilities > Tenant settings tab, select Event log. The event log data is displayed.
To filter the log output by a case, select the case from the Cases list.
To sort the log by columns, click a column header.
To modify column order, click and drag the column header.
To move between log pages, click > and < icons.
System information
Advanced eDiscovery version system information and active tasks are displayed in the Tenant settings tab.
1. Open Settings and utilities by clicking the Cogwheel icon.
2. In the Settings and utilities > Tenant settings tab, select System information. The version information
is displayed.
The display can be updated by clicking the Refresh icon below the Tenant information.

See also
Office 365 Advanced eDiscovery
Using utilities
Run reports in Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This topic describes how to run reports in Advanced eDiscovery.

Running reports
You can download a .csv file with a report for the selected process.
1. In the Reports tab, select an option from the Report name list. Select from three Report name options:
Relevance decide, Themes list, or Tagged files.

2. Available parameters, and sort and filter options can be set, depending on the selected report.
3. Click Download CSV. The requested report is generated and downloaded.

See also
Office 365 Advanced eDiscovery
View Analyze results in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, progress and results for the Analyze process can be viewed in a variety of displays as
described below.

View Analyze task status


In Prepare > Analyze > Results > Task status, the status is displayed during and after Analyze process
execution.

The tasks displayed may vary depending on the options selected.


ND/ET: setup: Prepares for the run, for example, sets run and case parameters.
ND/ET: ND calculation: Processes Near-duplicate analysis of files.
ND/ET: ET calculation: Performs Email Thread analysis on the entire email set.
ND/ET: pivots and similarities: Performs pivot and file similarity processing.
ND/ET: metadata update: Finalizes the new data collected on the files in the database.
Themes: themes calculation: Runs themes analysis. (Displayed only if selected.)
Task status: This line is displayed after task completion. While tasks are running, run duration is displayed.

NOTE
The Analyze results of Near-duplicates and Email Threads (ND and ED) applies to the number of documents to be
processed. It does not include Exact duplicate files.

View Near-duplicates and Email Threads status


The Target population results display the number of documents, emails, attachments, and errors in the target
population.
The Documents results display the number of pivots, unique near-duplicates, and exact duplicate files.
The Emails results display the number of inclusive, inclusive minus, unique inclusive copies, and the rest of the
email messages. The different types of email results are:
Inclusive: An inclusive email is the terminating node in an email thread and contains all the previous
history of that thread. As a result, the reviewer can safely focus on the inclusive email, without the need to
read the previous messages in the thread.
Inclusive minus: An inclusive email is designated as inclusive minus if there are one or more different
attachments associated with the parents of the inclusive message. In this context, the term Parent is used
for messages located upwards on the email thread or conversations included in that specific inclusive
email. A reviewer can use the inclusive minus indication as a signal that although it might not be necessary
to review the content of the inclusive email parents, it may be useful to review the attachments associated
with the inclusive path parents.
Inclusive copy: An inclusive email is designated as inclusive copy if it's the copy of another message
marked as inclusive or inclusive minus. In other words, this message has the same subject and body as
another inclusive message and, as such, co-resides in the same node. Because inclusive copy messages
contain the same content, they can usually be skipped in the review process.
The rest: This indicates email that doesn't contain any unique content, and therefore doesn't fall into any of
the previous three categories. These email messages don't need to be reviewed. If a message contains an
attachment that isn't on a later inclusive email, then the attachment might need to be reviewed. This is
indicated by the existence of an inclusive minus email within the thread.
The Attachments results display the number of attachments, according to such type as unique and duplicates.

See also
Office 365 Advanced eDiscovery
Understanding document similarity
Setting Analyze options
Setting ignore text
Setting Analyze advanced settings
Use Express Analysis in Office 365 Advanced
eDiscovery
8/21/2018 • 6 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

You can use Express analysis to quickly analyze a case and export the results.
You can use express analysis to calculate near-duplicates and email threads and calculate themes. You can also set
certain parameters for themes, document similarity and the export files in the Advanced settings for Express
analysis.

Run Express analysis


1. In the Express analysis (1) tab, select a container to enable the ** Express analysis ** (2), and Advanced
settings buttons.

2. Under Analyze parameters:


Check Calculate near-duplicates and email threads if you want to run the analysis. It is selected by
default.
Check Calculate Themes to process all files and assign themes to them. It is selected by default.
3. Under Export destination:
Check Download to local machine to download to your local computer.
If you check Export to user-defined Azure blob then you can also specify a container URL and SAS
token.
NOTE
Once an export package is stored to the user defined Azure blob, the data is no longer managed by Advanced
eDiscovery. it is managed by the Azure blob. This means if you delete the case, the exported files will still remain on
the Azure blob.

Save SAS token for future export session: If checked, the SAS token will be encrypted in the Advanced
eDiscovery's internal database for future use.

NOTE
Currently the SAS token expires after a month. If you try to download after more than a month you have to undo
last session, then export again.

4. To start the express analysis with default settings, choose Express analysis, and the Task status page will
display
On the Task status page you can expand the Process, Analyze and Export tabs to display details about
the express run.

5. Choose the Express analysis summary page to list detailed information about the run.
On the bottom of the Express analysis summary page, choose Download last session to download the
analysis files tp your local computer. You will first have to download eDiscovery Export tool and paste the
Export key to the eDiscovery Export tool.

Advanced settings for Express analysis


You can optionally set Advanced settings to change the default Express analysis parameters.
1. In the Analyze section:
In the Near duplicates and email threads, enter the Document similarity value, or accept the default of
65%.
In the Max number of themes enter or select a value for the number of themes to create. The default is
200.

NOTE
Increasing the number of themes affects performance, as well as the ability of a theme to generalize. The higher the
number of themes, the more granular they are. For example, if a set of 50 themes include a theme such as
"Basketball, Spurs, Clippers, Lakers"; 300 themes may include separate themes: "Spurs", "Clippers", "Lakers". If you
had no awareness of the theme "Basketball" and use this feature for ECA, seeing the theme "Basketball" could be
useful. But, if the processing had too many themes, you may never see the word "Basketball" and may not know that
Spurs and Clippers are good Basketball themes to review, rather than items that go on boots and used for hair.
In the Suggested themes choose Modify to suggest theme words to control Themes processing.
Advanced eDiscovery will focus on these suggested words and try to create one or more relevant themes,
based on the "Max number of themes" settings.
For example, if the suggested word is "computer", and you specified "2" as the "Max number of Themes",
Advanced eDiscovery will try to generate two themes that relate to the word "computer". The two themes
might be "computer software" and "computer hardware", for example.

Mode From the drop-down list, select a Themes option:


Create and apply model: Calculates themes by models from a segment of the files and then distributes
files among them.
Create model: Calculates a themes model from a segment of the files. The Apply process of dividing files is
done separately at another time.
Apply model: This option is only shown if a model was created previously and not yet applied. This will
divide the files based on the themes.
2. In the Export section:
3. In the Select export batch:
From the Export batch list, select the batch name or export results to Export batch 01, (the default batch).
To export results for new files that you added to an existing case, continue with your current batch. To create
a session in the batch, select the same batch number and click Create export session You can use this
option to export the same parameters as the previous batch, in an incremental manner.

To export to a new batch, click Add and enter a new name in Batch name (or accept the default) and a
description in Batch description. Click OK.

To edit a batch name or description, select the name in Export batch, click Edit , and then modify the
fields.

NOTE
After you've run sessions for an export batch, they cannot be deleted. In addition, only some parameters can be
edited once the first session is run.

To create a duplicate export batch, choose Duplicate export batch and enter a name and a description
for the duplicate batch in the panel.

To delete an export batch, choose Delete .

To view the history of a batch, choose Batch history .


2. Under Define p opulation: Select Include only files above Relevance cut-off score and/or Refine
export batch if you want to fine-tune the settings for your export batch. If you select Include only files
above Relevance cut-off score, then the Issue is enabled, and if the file's relevance score is higher than
the cut-off score for the selected issue, then the file is exported. The file will be exported unless it's excluded
by the ' For review filter. If you select Refine export batch, then the De-dupe and Filter by 'For review'
field radio buttons are enabled. If you choose De-dupe, then duplicates files will be filtered-out according
to the policy defined: [Case level (default): from every set of duplicate files in the entire case, all but one file
will be de-duped. Custodian level: from every set of duplicate files of the same custodian, all but one file will
be de-duped. A record of all duplicate files is available in export output. If you choose Filter by 'For
review' field, select Modify under Metadata to enter your **'For review'**field settings. Select Include
input filesto include source files in the package content. You can clear this option to speed up the export
process. Note that the Native files will be exported in any case.
3. Under Define metadata, select from the following options in the Export template list (once per session).
Standard: Basic set of data items, metadata, and properties. Use this option when import data was already
processed in Advanced eDiscovery and export data is uploaded to a system that already contains the files.
By default, export template columns are created and filled.
All: Full set of standard metadata including all processing data, as well as Analyze and Relevance scores.
This template is required when Advanced eDiscovery performs the processing and file data is uploaded to
an external system for the first time.
Issues: Select All Issues or select a particular issue you have created.
Choose OKto save the advanced settings, Restore defaults to use default values, or Cancel to cancel setting the
advanced settings.

See also
Office 365 Advanced eDiscovery
Prepare data for Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

This topic describes how to load the results of a Content Search in to a case in Advanced eDiscovery.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Step 1: Prepare Office 365 data for Advanced eDiscovery


To analyze data with Advanced eDiscovery, you can use the results of a Content Search that you run in the Office
365 Security & Compliance Center (listed on the Content search page in the Office 365 Security & Compliance
Center) or a search associated with an eDiscovery case (listed on the eDiscovery page in the Security &
Compliance Center).
For the detailed steps on preparing search results for analysis in Advanced eDiscovery, see Prepare search results
for Office 365 Advanced eDiscovery.

NOTE
If you have data outside of Office 365 and want to import it to Office 365 so that you can prepare and analyze it in
Advanced eDiscovery, a see Overview of importing PST files to Office 365 and Archiving third-party data in Office 365.

Step 2: Load search result data in to a case in Advanced eDiscovery


After you prepare the search results in the Security & Compliance Center for analysis, the next step is to load the
search results in to a case in Advanced eDiscovery. For more detailed information, see Run the Process module.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the Security & Compliance Center, click Search & investigation > eDiscovery to display the list of
cases in your organization.
4. Click Open next to the case that you want to load data in to in Advanced eDiscovery.
5. On the Home page for the case, click Advanced eDiscovery.
The Connecting to Advanced eDiscovery progress bar is displayed. When you're connected to
Advanced eDiscovery, a list of containers is displayed on the setup page for the case.

These containers represent the search results that you prepared for analysis in Advanced eDiscovery in
Step 1. Note that the name of the container has the same name as the Content Search in the case in the
Security & Compliance Center. The containers in the list are the ones that you prepared. If a different user
prepared search results for Advanced eDiscovery, the corresponding containers won't be included in the
list.
6. To load the search result data from a container in to the case in Advanced eDiscovery, select a container and
then click Process.
After the search results from the Security & Compliance Center are added to the case in Advanced eDiscovery, the
next step is to use the tools in Advanced eDiscovery to analyze and cull the data that's relevant to the case.

See also
Office 365 Advanced eDiscovery
Set up users and cases
Analyzing case data
Managing Relevance setup
Using the Relevance module
Exporting case data
Export report fields in Office 365 Advanced
eDiscovery
8/21/2018 • 6 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This topic describes the Advanced eDiscovery Export report fields for the Standard and All templates.

Export report fields


The following table lists the fields for each export template.

AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Row_nu General Row Yes Yes


mber number.

File_ID General File ID. Yes Yes

File_clas Processi File Yes Yes


s ng class.

Family_I Processi Numeric Yes Yes


D ng identifier
that is
used to
group
files
(usually
email
instance
and its
attachm
ents).
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

For_revi Processi Flag to Yes Yes


ew ng indicate
that the
field will
be
included
in
export
for
review.

Native_fi Processi Native Yes Yes


le_name ng file
name,
without
referenci
ng
folder
and
extensio
n.

Custodi General Custodi Yes Yes


ans an of
the file.

Set_ID Analyze "ND set" Yes Yes


or
"Email
set" id.

Inclusive Email Indicate Yes Yes


_type s if file is
inclusive
,
accordin
g to the
followin
g values:
0 - not
inclusive
,1-
Inclusive
,2-
Inclusive
minus, 3
-
Inclusive
copy.

Marked_ Near Indicate Yes Yes


as_pivot duplicat s if the
es file is a
pivot.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Similarit Near Percenta Yes Yes


y_perce duplicat ge of
nt es similarit
y
relative
to the
pivot.

Duplicat Near Unique Yes Yes


e_subset duplicat identifier
es of the
duplicat
e
subset.
Indicate
s
whether
the file
has
exact
text
duplicat
es.

Date General Date of Yes Yes


file
(depend
s on file
type -
email:
date
sent;
docume
nt: date
modified
).

Domina Analyze Primary Yes Yes


nt_them Theme
e of the
file.

Themes_ Themes List of Yes Yes


list Theme
names.

ND_set EquiSet Unique Yes Yes


numeric
identifier
of a
Neardup
licate
set.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Email_se Email Unique Yes Yes


t numeric
identifier
of an
Email
set.

Email_th Email Describe Yes Yes


read s the
position
of the
email
within
the
Email
set
Consists
of all
Node
IDs from
the root
to the
current
email,
separate
d by
periods.

Email_su Email Subject Yes Yes


bject of the
email.

Email_da Email Date on Yes Yes


te_sent which
the
email
was
sent.

Email_pa Email Email Yes Yes


rticipant address
s es of all
participa
nts in an
email
thread,
includin
g for
missing
links.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Email_pa Email Domain Yes Yes


rticipant s of all
_domain participa
s nts in an
email
thread,
includin
g for
missing
link.

Email_se Email Email Yes Yes


nder sender
name
and/or
address.

Email_se Email Email Yes Yes


nder_do sender's
main domain.

Email_to Email To Yes Yes


recipient
of the
email.

Email_cc Email CC Yes Yes


recipient
of the
email.

Email_bc Email BCC Yes Yes


c recipient
of the
email.

Email_re Email Email Yes Yes


cipient_ recipient
domains s
domains
(To, CC,
and
BCC).

Email_da Email Date on Yes Yes


te_receiv which
ed email
was
received.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Email_ac Email Values: Yes Yes


tion accordin
g to
Email
Subject:
"Forwar
d" (for
"FW:"),
"Reply"
(for
"RE:") or
"Other"
(other
Subject
text).

Meeting The date Yes Yes


_Start_D and
ate/Time time at
which a
meeting
item
started.

Meeting The date Yes Yes


_End_Da and
te/Time time at
which a
meeting
item
ended.

File_rele Relevanc Relevanc Yes Yes


vance_sc e e score
ore (0-100).
Per
issue.

Family_r Relevanc Max Yes Yes


elevance e family
_score Relevanc
e score
(0-100).
Per
issue.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Relevanc Relevanc Tagging Yes Yes


e_tag e of the
file, if
the file
was
manuall
y
tagged
in
Relevanc
e. Per
issue.

Relevanc Relevanc Relevanc Yes Yes


e_load_g e e Load
roup group,
of the
specified
file, with
a field
per
issue.

Normali Relevanc Normali Yes Yes


zed_rele e zed
vance_sc Relevanc
ore e score
(0-100),
which is
compara
ble
between
issues
and
loads.

Marked_ Relevanc Tagging Yes Yes


as_seed e of the
file, if it
was set
to be as
a seed
file in
Relevanc
e Per
issue/cat
egory.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Marked_ Relevanc Tagging Yes Yes


as_pre- e of the
tagged file, if it
was set
as pre-
tagged
in
Relevanc
e Per
issue/cat
egory.

Relevanc Relevanc Descripti Yes Yes


e_status e on of
_descrip the
tion relevanc
e status.

Comme General Comme Yes Yes


nt nt
entered
by the
user.

Export_i Processi Export Yes Yes


nput_pa ng input
th path.

Pivot_ID Near Pivot ID Yes Yes


Duplicat of the
es file.

Family_s Processi Number Yes Yes


ize ng of files
in a
family.

Native_t Processi Native Yes Yes


ype ng file type.
For
example,
spreads
heet or
presenta
tion.

Native_ Processi MD5 Yes Yes


MD5 ng hash
value of
the
native
file.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Native_s Processi Native Yes Yes


ize ng file size.

Native_e Processi Native Yes Yes


xtension ng file
extensio
n.

Doc_dat Docume Date Yes Yes


e_modifi nt native
ed Properti file was
es modified
, taken
from the
file's
metadat
a.

Doc_dat Docume Date Yes Yes


e_create nt native
d Properti file was
es created,
taken
from the
file's
metadat
a.

Doc_mo Docume User Yes Yes


dified_b nt who
y Properti modified
es native
file,
taken
from the
file's
metadat
a.

O365_d Docume Date Yes Yes


ate_mod nt native
ified Properti file was
es modified
, taken
from the
either
SharePoi
nt or
Exchang
e fields.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

O365_d Docume Date Yes Yes


ate_crea nt native
ted Properti file was
es created,
taken
from
either
SharePoi
nt or
Exchang
e fields.

O365_m Docume User Yes Yes


odified_ nt who last
by Properti modified
es native
file,
taken
from
either
SharePoi
nt or
Exchang
e fields.

Compou Processi Native Yes Yes


nd_path ng file path
includin
g its
compou
nd
source.

Input_p Processi Path of Yes Yes


ath ng the
input
file.

Input_d Processi Date Yes Yes


ate_mod ng Input
ified file was
last
modified
.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

ND_ET_s Analyze Concate Yes Yes


ort_excl_ nation
attach of Email
set and
ND set
for
review.
'D' is
added
as a
prefix to
ND sets,
and 'E' is
added
to Email
ssets.

ND_ET_s Analyze Concate Yes Yes


ort_incl_ nation
attach of Email
set and
ND set
for
review
'D' is
added
as a
prefix to
ND sets,
and 'E' is
added
to Email
sets. In
addition,
each
email
within
an
Email_se
t is
followed
by its
appropri
ate
attachm
ents.

Dedupe General Custodi Yes Yes


d_custo ans of
dians de-
duped
files
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Dedupe General IDs of Yes Yes


d_file_ID de-
s duped
files

Dedupe General Paths of Yes Yes


d_paths de-
duped
files

File_key General Internal Yes Yes


identifier
for
future
use.

Export_n Processi Path of Yes Yes


ative_pa ng the
th native
file in
the
export
package.

Extracte Processi Path of Yes Yes


d_text_p ng the
ath extracte
d file.

Process_ Processi Batch Yes Yes


batch ng identifier
for
Import
batch.

Process_ Processi Identifie Yes Yes


status_I ng r
D represen
ting
Process
stage
status.

Process_ Processi Process Yes Yes


status_d ng stage
escriptio status
n descripti
on:
successf
ul or
error
descripti
on.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Export_s Processi ID of Yes Yes


tatus_ID ng the
export
status.

Export_s Processi Descripti Yes Yes


tatus_de ng on of
scription the
export
status;
successf
ul or
error
descripti
on.

Read_pe Relevanc Read % Yes Yes


rcent e (0-100).
Per
issue.

Doc_aut Docume Docume No Yes


hor nt nt
properti properti
es es:
author.

Doc_co Docume Docume No Yes


mments nt nt
properti properti
es es:
commen
ts.

Doc_key Docume Docume No Yes


words nt nt
properti properti
es es:
keyword
s.

Doc_last Docume Docume No Yes


_saved_ nt nt
by properti properti
es es: last
saved
by.

Doc_revi Docume Docume No Yes


sion nt nt
properti properti
es es:
revision
number.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Doc_sub Docume Docume No Yes


ject nt nt
properti properti
es es:
subject.

Doc_te Docume Docume No Yes


mplate nt nt
properti properti
es es:
templat
e.

Doc_title Docume Docume No Yes


nt nt
properti properti
es es: title.

Email_ha Email Indicate No Yes


s_attach s if the
ment email
has one
or more
attachm
ents.

Email_im Email Email No Yes


portanc importa
e nce
property
.

Email_le Email Indicate No Yes


vel s email's
level
within
the
email
thread.
For
attachm
ents, the
value of
the
attached
email.

Email_re Email Email No Yes


cipients recipient
s name
and/or
address
es (To,
CC, and
BCC).
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Email_se Email Email No Yes


curity security
property
.

Email_se Email Email No Yes


nsitivity sensitivit
y
property
.

Export_b Processi File's No Yes


atch ng last
Export
batch
name.

Export_s Processi File's No Yes


ession ng last
Export
session
Id
includin
g date.

Extracte Processi Charact No Yes


d_text_le ng er
ngth length
of the
Extracte
d text
file.

Family_d Processi Numeric No Yes


uplicate_ ng Identifie
set r for
families
that are
exact
text
duplicat
es of
each
other
(respecti
vely - all
member
s of the
families
are
exact
duplicat
es).
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Has_Text Processi Indicate No Yes


ng s if there
is a text
in the
file: 0 -
no ; 1-
yes.

Input_fil Processi ID of No Yes


e_ID ng the
Input
file from
which
file was
extracte
d from.

Native_S Processi SHA- No Yes


HA_256 ng 256
hash
value of
the
native
file.

O365_a Docume Users No Yes


uthors nt who
properti modified
es native
file,
taken
from
either
SharePoi
nt or
Exchang
e fields.

O365_cr Docume User No Yes


eated_b nt who
y properti created
es native
file,
taken
from
either
SharePoi
nt or
Exchang
e fields.
AVAILAB
LE IN
STANDA AVAILAB
EXPORT RD LE IN ALL
FIELD DESCRIP TEMPLAT TEMPLAT
NAME GROUP TION E E

Parent_ Email Relates No Yes


node a node
in an
email
thread
to the
closest
parent
node
that is
not a
missing
link.

Set_orde Email Emails No Yes


r_inclusi and
ves_first attachm
ents:
counter
chronol
ogical
order
(Inclusiv
es first).
Docume
nts:
pivots
first and
the rest
by
similarit
y score,
descendi
ng.

Tagged_ Relevanc User No Yes


By e who
tagged
the file
in
Relevanc
e for the
specific
issue.

Word_c Analyze Number No Yes


ount of words
in the
docume
nt.
Related Topics
Office 365 Advanced eDiscovery
Exporting case data with Advanced eDiscovery
Exporting results
Viewing batch history and exporting past results
Tagging and Assessment in Office 365 Advanced
eDiscovery
8/21/2018 • 5 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

This section describes the procedure for the Advanced eDiscovery Relevance Assessment module.

Performing Assessment training and analysis


1. In the Relevance > Track tab, click Assessment to start case assessment.
For example purposes in this procedure, a sample assessment set of 500 files is created and the Tag tab is
displayed, which contains the Tagging panel, displayed file content and other tagging options.

2. Review each file in the sample, determine the file's relevance for each case issue, and tag the file using the
Relevance (R ), Not relevant (NR ) and Skip buttons in the Tagging panel pane.

NOTE
Assessment requires 500 tagged files. If files are "skipped", you will receive more files to tag.

3. After tagging all files in the sample, click Calculate.


The Assessment current error margin and richness are calculated and displayed in the Relevance Track
tab, with expanded details per issue, as shown below. More details about this dialog are described in the
later section "Reviewing Assessments results".
TIP
By default, we recommend that you proceed to the default Next step when the Assessment progress indicator for
the issue has completed, indicating that the assessment sample was reviewed and sufficient relevant files were
tagged. > Otherwise, if you want to view the Track tab results and control the margin of error and the next step,
click Modify adjacent to Next Step, select Continue assessment, and then click OK.

4. Click Modify to the right of the Assessment check box to view and specify assessment parameters per
issue. An Assessment level dialog for each issue is displayed, as shown in the following example:

The following parameters for the issue are calculated and displayed in the Assessment level dialog:
Target error margin for recall estimates: Based on this value, the estimated number of additional files
necessary to review is calculated. The margin used for recall is greater than 75% and with a 95%
confidence level.
Additional assessment files required: Indicates how many more files are necessary if the current error
margin's requirements have not been met.
5. To adjust the current error margin and see the effect of different error margins (per issue):
6. In the Select issue list, select an issue.
7. In Target error margin for recall estimates, enter a new value.
8. Click Update values to see the impact of the adjustments.
9. Click Advanced in the Assessment level dialog to see the following additional parameters and details:
Estimated richness: Estimated richness according to the current assessment results
For assumed recall: By default, the target error margin applies to recall above 75%. Click Edit if you want
to change this parameter and control the margin of error on a different range of recall values.
Confidence level: By default, the recommended error margin for confidence is 95%. Click Edit if you
want to change this parameter.
Expected richness error margin: Given the updated values, this is the expected margin of error of the
richness, after all additional assessment files are reviewed.
Additional assessment files required: Given the updated values, the number of additional assessment
files that need to be reviewed to reach the target.
Total assessment files required: Given the updated values, total assessment files required for review.
Expected number of relevant files in assessment: Given the updated values, the expected number of
relevant files in the entire assessment after all additional assessment files are reviewed.
10. Click Recalculate values, if parameters are changed. When you are done, if there is one issue, click OK to
save the changes (or Next when there are multiple issues to review or modify and then Finish).
When there are multiple issues, after all issues have been reviewed or adjusted, an Assessment level:
summary dialog is displayed, as shown in the following example.
Upon successful completion of assessment, proceed to the next stage in Relevance training.

Reviewing assessment results


After an Assessment sample is tagged, the assessment results are calculated and displayed in the Relevance Track
tab.
The following results are displayed in the expanded Track display:
Assessment current error margin for recall estimates
Estimated richness
Additional assessment files required (for review )
The Assessment current error margin is the error margin recommended by Advanced eDiscovery. The number
displayed for the "Additional assessment files required" corresponds to that recommendation.
The Assessment progress indicator shows the level of completion of the assessment, given the current error
margin. When assessment is underway, the user will tag another assessment sample.
When the assessment progress indicator shows assessment as complete, that means the assessment sample
review was completed and sufficient relevant files were tagged.
The expanded Track display shows the recommended next step, the assessment statistics, and access to detailed
results.
When richness is very low, the number of additional assessment files needed to reach a minimal number of
relevant files to produce useful statistics is very high. Advanced eDiscovery will then recommend moving on to
training. The assessment progress indicator will be shaded, and no statistics will be available.
In the absence of statistically based stabilization, there will be results with a lower level of accuracy and
confidence level. However, these results can be used to find relevant files when you do not need to know the
percentage of relevant files found. Similarly, this status can be used to train issues with low richness, where
Relevance scores can accelerate access to files relevant to a specific issue.
TIP
In the Relevance > Track tab, expanded issue display, the following viewing options are available: > The recommended
next step, such as Next step: Tagging can be bypassed (per issue) by clicking the Modify button to its right, and then
selecting an different step in the Next step. When the assessment progress indicator has not completed, assessment will be
the next recommended option, to tag more assessment files and increase statistics accuracy. > You can change the error
margin and assess its impact, by clicking Modify, and in the Assessment level dialog, changing the Target error margin
for recall estimates, and clicking Update values. Also, in this dialog, you can view advanced options, by clicking
Advanced. > You can view additional assessment level statistics and their impact by clicking View. In the displayed Detail
results dialog, statistics are available per issue, when there are at least 500 tagged assessment files and at least 18 files are
tagged as Relevant for the issue.

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Relevance training
Tracking Relevance analysis
Deciding based on the results
Testing Relevance analysis
Understand document similarity in Office 365
Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, Document Similarity is the minimal level of resemblance required for two documents to
be considered as near-duplicates.

TIP
For most business applications, it is recommended to use a Similarity value of 60%-75%. For very poor quality optical
character recognition (OCR) material, lower Similarity values can be applied.

NOTE
After it's set and run for a given case, the Similarity value cannot be changed.

Within a Near-duplicate (ND ) set, there may be documents with a level of resemblance below the Similarity
threshold. For a document to join an ND set, there must be at least one document in the ND set with a level of
resemblance exceeding the Similarity.
For example, assume the Similarity is set to 80%, document F1 resembles document F2 at a level of 85%, and
document F2 resembles document F3 at a level of 90%.
However, document F1 may resemble document F3 at a level of only 70%, which is below the threshold.
Nonetheless, in this example, documents F1, F2, and F3 all appear in the one ND set. Similarly, using a Similarity
value of 80%, we may have created two sets, EquiSet-1 and EquiSet-2. EquiSet-1 contains documents E1 and E2.
Equiset-2 contains documents F1, F2, and F3.
The levels of resemblance are illustrated as follows:

Assume that another document, X1, is now inserted. The resemblance between X1 and E3 is 87%. Similarly, the
resemblance between X1 and F1 is 92%. As a result, EquiSet -1, EquiSet -2, and X1 are now combined into one
ND set.
NOTE
If any two documents are assigned to one ND set, they will remain together in the same ND set, even if additional
documents are added to the set or if the sets are merged.

After sets are merged, the Pivot document can change when new documents are added to a set.

See also
Office 365 Advanced eDiscovery
Setting Analyze options
Setting ignore text
Setting Analyze advanced settings
Viewing Analyze results
Define highlighted keywords and advanced options
in Office 365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, it's possible to add user-defined keywords to Relevance in order to help you identify
relevant files while tagging. Keywords will be displayed in the specified colors in Relevance > Tag.
As described below, keyword lists can be added, and colors assigned to the Keywords list and the related issues. A
tooltip displays the keyword's description, if one exists, as indicated by a double underline.

IMPORTANT
Hit highlighting in Relevance and viewing keyword hit results within documents during Relevance tagging does not work for
the Japanese, Chinese, and Korean double-byte character sets.

Adding highlighted keywords


1. In the Relevance > Relevance setup tab, select Highlighted keywords.
2. Click the + icon to add keywords. The Add new keywords dialog is displayed.
3. In Keywords, type the keywords list, separating keywords with commas.
4. In the Color list, select the color to highlight the entered keywords list.
5. In the Select issue list, select whether to apply the keywords list to "All issues" or to selected issues.
6. In Description, type the keywords list (optional).
7. Click OK when done. The created list is added to the keywords list table and can be edited or deleted.

The user-defined keywords will be displayed, in the specified colors in Relevance > Tag.

Specifying Relevance setup advanced settings


These settings affect the Track and Decide graphs in Relevance.
1. In the Relevance > Relevance setup tab, select Advanced settings.
2. In the Cost parameters dialog, make the following selections:
3. In the Cost review per hour ($) list, select the amount in dollars or accept the default.
4. In the Number of files reviewed by hour list, select the amount or accept the default.

5. Click Save. The selected settings are saved.

See also
Office 365 Advanced eDiscovery
Defining issues and assigning users
Setting up loads to add imported files
Set Ignore Text option for Analyze in Office 365
Advanced eDiscovery
8/21/2018 • 3 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The Ignore Text feature can be applied to all or any of the following Advanced eDiscovery modules: Analyze
(Near-duplicates, Email Threads, Themes) and Relevance. Ignored text will not appear in files displayed in
Relevance, and the analysis/calculations will discard the ignored text.
If the Ignore Text feature was previously defined for modules that have already run, the Ignore Text setting will
now be protected from being modified. However, the Ignore Text feature for the Relevance module can still be
changed at any time.

How Ignore Text filters are applied


Multiple Ignore Text filters are applied in the order that they were entered. To change the order in which they are
applied, they must be deleted and re-entered in the desired order.
For example, if the text content is: "DAVE BOB ALICE CAROL EVE", the following are samples of Ignore Text
entries and the results:

Ignore Text entries ==> Results

"ALICE", "BOB CAROL" ==> "DAVE EVE"

"ALICE", "BOB ALICE CAROL" ==> "DAVE BOB CAROL EVE"

The second Ignore Text entry is not implemented because the string is not found as such AFTER the first Ignore
Text has been applied.

Use regular expressions when defining Ignore Text


Regular expressions are supported for use when defining Ignore Text. The following are examples of regular
expression syntax and usage:
To remove (ignore) text from Begin until the end of a line:
Begin(.*)$

where "Begin" is the initial occurrence of this string in the line.


For example, for the following text:
"This is first sentence and first line
This is second sentence and second line"
the Regular Expression first(.*)$ will result in:
"This is
This is second sentence and second line"
To remove disclaimers and legal statements automatically inserted at the end of email threads:
Begin(.|\s)*End

where "Begin" and "End" are unique strings at the beginning and end of a wrapped text paragraph.
For example, the following regular expression will remove disclaimers and legal statements that were in
the email thread between the Begin and End strings:
This message contains confidential information (.|\s)*If verification is required please request a
hard-copy version
To remove a disclaimer (including special characters):
For example, for the following text (with the disclaimer represented here by x's):
/*\ This message contains confidential information. xxxx xxxx
xxxx xxxx xxxx xxxx xxxx xxxx xxxx
*xxxx xxxx If verification is required, please request a hard -copy version. /**
the regular expression to remove the above disclaimer should be:
/\\ This message contains confidential information.(.|\s)* If verification is required please request a
hard-copy version. /\\
Regular expression rules:
Any characters that are not part of the alphabet except for space(s), "_" and "-" must be preceded by
"".
The regular eExpression field can be unlimited length.

TIP
For an explanation and detailed syntax of regular expressions, see: Regular Expression Language - Quick Reference.

Define Ignore Text rule


1. In the Manage > Analyze > Analyze options tab, in the Ignore Text section, click the + icon to add a
rule.
2. In the Add Ignore Text dialog, in the Name field, type a name for the Ignore Text rule.
3. In the Text box, type the text to be ignored. The text field allows an unlimited number of characters.

TIP
As shown in the window above, click light bulb to see common syntax guidelines for the Ignore Text rule.

4. Select the Case sensitive check box, if desired.


5. In the Apply to list, select the Advanced eDiscovery modules in which to apply the definition.
6. If you want a test run on sample text, type sample text in the Input text box and click Test. The results are
displayed in the Output text box.
7. Click OK to save the Ignore Text rule. The defined Ignore Text rule is displayed.
See also
Office 365 Advanced eDiscovery
Understanding document similarity
Setting Analyze options
Setting Analyze advanced settings
Viewing Analyze results
View batch history and export past results in Office
365 Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The following section describes additional options for batch viewing and export of data in Advanced eDiscovery.

Viewing Export batch history and exporting previous batches


The Export history dialog provides detailed information of selected export batch sessions and also provides the
ability to undo the last session.
1. In Export > Setup, select the batch name from the Export batch drop-down list.
2. To the right of the export batch name, select the Batch history icon:

The Batch history dialog is displayed.

3. If it is necessary to roll back a previous session, click Undo last session. Rollback can be performed
multiple times, which cancels the last session.
4. If you want to download data at any time from a previously executed export batch session, click the
Download icon next to the desired export batch to be exported.
5. When the Shared access signature dialog is displayed, click Copy to clipboard to copy the export
session data to the local machine, and then click Close. The Office 365 Security & Compliance Center
eDiscovery Export Tool dialog is displayed.
6. In the eDiscovery Export Tool dialog:
7. In Paste the Shared Access Signature that will be used to connect to the source, paste the Shared
access signature value, which was previously copied to the clipboard.
8. Click Browse to select the target location for storing the downloaded export files on a local machine.
9. Click Start. The export files are downloaded to the local machine.

See also
Office 365 Advanced eDiscovery
Exporting results
Export report fields
Set Analyze options in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, set the Analyze options prior to running Analyze.

Set Analyze options


Open Prepare > Analyze > Setup. The following window is displayed.

Near-duplicates and email threads Check this box if you want to run the analysis. It is selected by default.
Document similarityEnter the Near-duplicates threshold value or accept the default of 65%.
ThemesCheck this box to process all files and assign themes to them. By default, this check box is not selected.
Enter the following options if you want to perform Themes processing.
Max number of themesEnter or select a value for the number of themes to create. The default is 200.
NOTE
Increasing the number of themes affects performance, as well as the ability of a theme to generalize. The higher the
number of themes, the more granular they are. For example, if a set of 50 themes include a theme such as "Basketball,
Spurs, Clippers, Lakers"; 300 themes may include separate themes: "Spurs", "Clippers", "Lakers". If you had no
awareness of the theme "Basketball" and use this feature for ECA, seeing the theme "Basketball" could be useful. But, if
the processing had too many themes, you may never see the word "Basketball" and may not know that Spurs and
Clippers are good Basketball themes to review, rather than items that go on boots and used for hair.

Suggested themesYou can suggest theme words to control Themes processing. Advanced eDiscovery will
focus on these suggested words and try to create one or more relevant themes, based on the "Max number
of themes" settings.
For example, if the suggested word is "computer", and you specified "2" as the "Max number of Themes",
Advanced eDiscovery will try to generate two themes that relate to the word "computer". The two themes
might be "computer software" and "computer hardware", for example.

1. To view, add, or edit suggested themes, click Modify.


2. In the Suggested themes panel, click the Add icon to add a theme. In the Add suggested theme panel,
add the words, separated by commas.
3. In Number of themes, select a value to determine the number of themes Advanced eDiscovery will try to
generate for these words (default is 1 theme).
4. Click Save and then close the dialogue.

NOTE
The total number of themes includes Suggested Themes. The total Suggested Themes cannot exceed the total themes.
If there are many Suggested Themes relative to the total themes, only a few "novel" themes will be detected by the
system because most of the themes will be dedicated to Suggested Themes.

Mode From the drop-down list, select a Themes option:


Create and apply model: Calculates themes by models from a segment of the files and then
distributes files among them.
Create model: Calculates a themes model from a segment of the files. The Apply process of dividing
files is done separately at another time.
Apply model: This option is only shown if a model was created previously and not yet applied. This
will divide the files based on the themes.
You can also set ignore text and set Analyze advanced settings for Analyze.
After you've set these options, click Analyze to run. View Analyze results are displayed.

See also
Office 365 Advanced eDiscovery
Understanding document similarity
Set Ignore text
Set Analyze advanced settings
View Analyze results
View Process module results in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

After Prepare > Process is initiated, you can view progress and results.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Process task status


In Prepare > Process > Results, the page shows the current status (if Process is currently running) or the last
Process status task status as shown in the following example.

The displayed tasks may vary depending on the Process options selected.
Inventory: Advanced eDiscovery iterates through all files selected for Process and performs basic data
collection.
Calculate signatures: Calculates the MD5 digital signatures.
Compounds extraction: Extracts inner or contained files recursively from compound files (for example,
PST, ZIP, MSG ). Extracted files are stored in the case folder of the case.
Synchronizing database: Internal database process.
File copy: Copies Process files. This task is always displayed, even when the advanced Copy files option is
selected.
Text extraction: When there are native files, Advanced eDiscovery extracts text from these files using
DTSearch. The extracted text of these files is stored as text files in the case folder.
Updating metadata: Processes the loaded metadata.
Finalizing: Internal processing that finalizes data of loaded case files (for example, identify error and
success files).
Task status: Displayed after task completion. While tasks are running, run duration is displayed.
NOTE
Completed tasks may also include totals for files that completed processing or files with errors.

TIP
"Cancel" provides a rollback option to stop Process execution and then roll back to the previous data population or saved
processed data. Rollback clears all processed data. If you do not want the processed data to be lost (for example, you plan to
reload these files), select the "Cancel" option in this window to choose not to roll back.

Process summary
In Prepare > Process > Results > Process summary, a breakdown of loaded file results is displayed according to
successful file processing and error results.
The panes present a graphical display of imported file statistics, as follows:
Process summary accumulated: All files in the case.
Process summary last: Files loaded from the last session or action.
Families last: Family information in the case (if any).
If Seed files were added, the number of seed files is listed per issue that was defined for the files.
If the marking of Seed files failed, that is also noted.
If Pre-tagged files were added, the number of pre-tagged files is listed per issue that was defined for the
files.
If the marking of Pre-tagged files failed, that is also noted.

Process summary accumulated and last charts


The left bar includes Source + extracted files: which is all files found.
The right bar, Processed, includes:
Files with load errors
Successfully loaded files, which may include:
Existing: Files that were loaded before and are now loaded again (including duplicates).
Text: Unique files with text.
Non-text: Empty text files, empty native text files, native non-text files.
Duplicates: Duplicate files with text.

Last process errors


In Prepare > Process > Results > Last process errors, details of the errors in the last session or action performed
are displayed.

See also
Office 365 Advanced eDiscovery
Running the Process module and loading data
Track Relevance analysis in Office 365 Advanced
eDiscovery
8/21/2018 • 6 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, the Relevance Track tab displays the calculated validity of the Relevance training
performed in the Tag tab and indicates the next step to take in the iterative training process in Relevance.

Tracking Relevance training status


1. View the following details in Relevance Track for the case issues, as shown in the following example of an
Issue name dialog below.
Assessment: This progress indicator shows to what degree the Relevance training performed to this point
has achieved the assessment target in terms of margin of error. The richness of the Relevance training
results is also displayed.
Training: This color-coded progress indicator and tool-tip display indicates the Relevance training results
stability and a numeric scale showing the number of Relevance training samples tagged for each issue. The
expert monitors the progress of the iterative Relevance training process.
Batch calculation: This progress indicator provides information about the completion of Batch
calculation.
Next step: Displays the recommendation for the next step to be performed.
In the example, a successfully completed Assessment for an issue is shown, indicated by the completed
color progress indicator and the checkmark. Tagging is underway, but the case is still considered unstable
(stability status also shown in a tool-tip). The next step recommendation is "Training".

The expanded view displays additional information and options. The displayed current error margin is the
error margin of the recall in the current state of assessment, given the existing (already tagged) assessment
files.
NOTE
The Assessment stage can be bypassed by clearing the Assessment check box per issue and then for "all issues".
However, as a result, there will be no statistics for this issue. > Clearing the Assessment check box can only be done
before assessment is performed. Where multiple issues exist in a case, assessment is bypassed only if the check box
is cleared for each issue

When assessment is not completed with the first sample set of files, assessment might be the next step for
tagging more files.
In Relevance > Track, the training progress indicator and tool-tip indicate the estimated number of
additional samples needed to reach stability. This estimate provides a guideline for the additional training
needed.

2. When you're done tagging and if you need to continue training, click Training. Another sample set of files is
generated from the loaded file set for additional training. You are then returned to the Tag tab to tag and train
more files.
Reaching stable training levels
After the assessment files have attained a stable level of training, Advanced eDiscovery is ready for Batch
calculation.

NOTE
Usually, after three stable training samples, the next step is "Batch calculation". There may be exceptions, for example, when
there were changes to the tagging of files from earlier samples or when seed files were added.

Performing Batch calculation


Batch calculation is executed as the next step after training is successfully completed (when a stable training
status is shown by the progress bar, a checkmark and stable status in the tool-tip.) Batch calculation applies the
knowledge acquired during the Relevance training to the entire file population, to assess the files' relevance and
to assign Relevance scores.
When there is more than one issue, Batch calculation is done per issue. During Batch calculation, progress is
monitored while processing all of the files.
Here, the recommended next step is "None", which indicates that no additional iterative Relevance training is
required at this point. The next phase is the Relevance > Decide tab.
If you want to import new files after Batch calculation, the administrator can add the imported files to a new load.

NOTE
If you click Cancel during Batch calculation, the process saves what was already executed. If you run Batch calculation again,
the process will continue from the last executed point.

Assessing tagging consistency


If there are inconsistencies in file tagging, it can affect the analysis. The Advanced eDiscovery tagging consistency
process can be used when results are not optimal or consistency is in doubt. A list of possible inconsistently
tagged files is returned, and they can be reviewed and re-tagged, as necessary.

NOTE
After seven or more training rounds following assessment, tagging consistency can be viewed in Relevance > Track >
Issue > Detailed results > Training progress. This review is done for one issue at a time.

1. In Relevance > Track, expand an issue's row.


2. To the right of Next step, click Modify.
3. Select Tag inconsistencies as the Next step option, after seven training samples and click OK.
4. Select Tag inconsistencies. The Tag tab opens displaying a list of the inconsistencies to re-tag as
necessary.
5. Click Calculate to submit the changes. The next step after tagging inconsistencies is "Training".

Viewing and using Relevance results


In the Relevance > Track tab, expand an issue's row, and next to Detailed results, click View. The Detailed
results panes are displayed, as shown and described below.

Tagging summary
In the example shown below, the Tagging summary displays totals for each of Assessment, Training, and Catch-
up file tagging processes.

Keywords
A keyword is a unique string, word, phrase, or sequence of words in a file identified by Advanced eDiscovery as a
significant indicator of whether a file is relevant. The "Include" columns list keyword and weights in files tagged as
Relevant, and the "Exclude" columns lists keywords and weights in files tagged as Not relevant.
Advanced eDiscovery assigns negative or positive keyword weight values. The higher the weight, the higher the
likelihood that a file in which the keyword appears is assigned a higher Relevance score during Batch calculation.
The Advanced eDiscovery list of keywords can be used to supplement a list built by an expert or as an indirect
sanity check at any point in the file review process.
Training progress
The Training Progress pane includes a training progress graph and quality indicator display, as shown in the
example below.

Training quality indicator: Displays the rating of the tagging consistency as follows:
Good: Files are tagged consistently. (Green light displayed)
Medium: Some files may be tagged inconsistently. (Yellow light displayed)
Warning: Many files may be tagged inconsistently. (Red light displayed)
Training progress graph: Shows the degree of Relevance training stability after a number of Relevance training
cycles in comparison to the F -measure value. As we move from the left to the right across the graph, the
confidence interval narrows and is used, along with the F -measure, by Advanced eDiscovery Relevance to
determine stability when the Relevance training results are optimized.

NOTE
Relevance uses F2, an F-measure metric where Recall receives twice as much weight as Precision. For cases with high
richness (over 25%), Relevance uses F1 (1:1 ratio). The F-measure ratio can be configured in Relevance setup > Advanced
settings.

Batch calculation results


The Batch calculation results pane includes the number of files that were scored for Relevance, as follows:
Success
Empty: Contains no text, for example, only spaces/tabs
Failed: Due to excessive size or could not be read
Ignored: Due to excessive size
Nebulous: Contains meaningless text or no features relevant to the issue
NOTE
Empty, Failed, Ignored, or Nebulous will receive a Relevance score of -1.

Training statistics
The Training statistics pane displays statistics and graphs based on results from Advanced eDiscovery
Relevance training.

This view shows the following:


Review-recall ratio: Comparison of results according to Relevance scores in a hypothetically linear
review. Recall is estimated given the review set size set.
Parameters: Cumulative calculated statistics pertaining to the review set in relation to the file population
for the entire case.
Review: Percentage of files to review based on this cutoff.
Recall: Percentage of Relevant files in the review set.
Distribution by relevance score: Files in the dark gray display to the left are below the cutoff score. A
tool-tip displays the Relevance score and the related percentage of files in the review file set in relation to
the total files.

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Performing and reviewing Assessment
Performing Relevance training
Making decisions based on the results
Testing Relevance analysis
Decision based on the results in Office 365
Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, the Decide tab provides additional information for viewing and using decision-support
statistics for determining the size of the review set of case files.

Using the Decide tab

This tab includes the following:


Issue: From here, you can select the issue of interest from the list.
Review-recall ratio: Comparison of Advanced eDiscovery review according to Relevance scores. The
Cutoff point in the chart represents the percentage of files to review, mapped to a Relevance score. This is
used in the Relevance Test phase and as an Export threshold for culling. The default cutoff point, for the
number of files to review is at the point in which the balance between Recall and Precision is optimal. The
actual cutoff point should be determined by the user depending on objectives and the cost tradeoff
(%review ) and risk (%recall).Using the slider, you can adjust the cutoff point and see the effect on the graph
and parameters, when adjusting the percent of relevant files to be retrieved, and before validating a
decision.
Parameters: Review, Recall, Next relevant and Total cost parameters are cumulative calculated statistics
pertaining to the review set in relation to the collection for the entire case. Definitions for these parameters
are as follows:
Review: Percentage of files to review based on this cutoff.
Recall: Percentage of relevant files in the review set.
Next relevant: Cost to review and identify an additional relevant file that is not currently in the review set.
Total cost: Cost for reviewing this percentage of the case files. Cost parameter settings can be set by the
Case manager.
Distribution by relevance score: Files in the dark gray display to the left are below the cutoff score. A
tool-tip displays the Relevance score and the related percentage of files in the review file set in relation to
the total files.
The expanded Details pane displays additional details. Files in collection figures do not include empty or nebulous
files. Family files figures represent files that are not loaded in Relevance, yet still counted as part of the family.

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Assessment
Performing Relevance training
Tracking Relevance analysis
Testing Relevance analysis
Test Relevance analysis in Office 365 Advanced
eDiscovery
8/21/2018 • 3 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

The Test tab in Advanced eDiscovery enables you to test, compare, and validate the overall quality of processing.
These tests are performed after Batch calculation. By tagging the files in the collection, an expert makes the final
judgment about whether each tagged file is actually relevant to the case.
In single and multiple-issue scenarios, tests are typically performed per issue. Results can be viewed after each
test, and test results can be reworked with specified sample test files.

Testing the rest


The "Test the Rest" test is used to validate culling decisions, for example, to review only files above a specific
Relevance cutoff score based on the final Advanced eDiscovery results. The expert reviews a sample of files
under a selected cutoff score to evaluate the number of relevant files within that set.
This test provides statistics and a comparison between the Review set and the Test the Rest population. The
results of the review set are those calculated by Relevance during Training. The results include calculations , based
on settings and input parameters, such as:
Test sample statistics of the number of files in a sample and identified relevant files.
Tabular comparison of the Population parameters of the Review set and the Rest, for example, the number
of files, estimated number of relevant files, estimated richness, and the average cost of finding an
additional relevant file. Cost parameter settings can be set by the administrator.
1. Open the Relevance > Test tab.
2. In the Test tab, click New test. The Create test dialog is displayed, as shown in the following example.
3. In Test name, and Description, type the name and description.
4. In the Test type list, select Test the Rest
5. In the Issue / Category list, select the issue name.
6. In the Load list, select the load.
7. In Read %, accept the default value or select a value for the cutoff Relevance score.
8. In Set size, or accept the default value. Note that the restore icons will restore the default values.
9. Click Start tagging. A test sample is generated.
10. Review and tag each of the files in the Relevance > Tag tab and when done, click Calculate.
11. In the Test tab, you can click View results to see the test results. An example is shown in the following
figure.
In the figure above, the Sample parameters section of the table contains details about the number of files in the
sample tagged by the expert, and the number of relevant files found in that sample.
The Population parameters section of the table contains the test results, including the Review set population of
files with a score below the selected cutoff and "The Rest" population of files with a score above the selected
cutoff. For each population, the following results are displayed:
Includes files with read % - Stated cutoff
The total number of files
The estimated number of relevant files
The estimated richness
The average review cost of finding another relevant file

Testing the slice


The "Test the Slice" test performs testing similar to the "Test the Rest" test, but to a segment of the file set as
specified by Relevance Read %.
1. Open the Relevance > Test tab.
2. In the Test tab, click New test. The Create test dialog is displayed.
3. In Test name and Description, type the information.
4. In the Test type list, select Test the Slice.
5. In the Issue list, select the issue name.
6. In the Load list, select the load.
7. In Read % between, accept the default low and high range values or select values for the cutoff Relevance
scores.
8. In Set size, select a value or accept the default value.
The restore icons will restore the default value.
9. Click Start tagging. A test sample is generated.
10. Review and tag each of the files in the Relevance > Tag tab and when done, click Calculate.
11. In the Test tab, you can click View results to see the test results.

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Assessment
Tagging and Relevance training
Tracking Relevance analysis
Deciding based on the results
Set up loads to add imported files in Office 365
Advanced eDiscovery
8/21/2018 • 6 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, a load is a new batch of files added to a case. By default, one load is defined and all
imported files are added to it. Before performing Relevance training, imported files must be added to the load.
Consider the following scenarios:
New files are known to be similar to the previous files loaded to the case database, or the previous load of
files was a random set from the file collection. In this instance, add the imported files to the current file load.
New files are different from previous ones (for example, from a different source), or you have no prior
knowledge that they're similar or different to the previous loads. In this scenario, add the imported files to a
new file load. Advanced eDiscovery recognizes this as a Rolling loads scenario, invokes a Catch-up process,
locks Relevance training and Batch calculations until Catch-up is completed, and the new load is integrated
and trained.

Adding imported files to the current load


All imported files must be added to a load to be processed in Advanced eDiscovery. Imported files are added to
the last defined load. If you import additional files later, they also must be added to the load.
1. In the Relevance > Relevance setup tab, select Loads.

2. Include files: Select an option for files to include. By default, adding files to the current load is based on
the "All files" population.

TIP
Load all available culled files into Relevance. If you plan to load only a subset of the available files, please first consult
with Support, as loading subsets can adversely affect Relevance training.
3. In Loads management, select a load.
4. Click Add files. The files are added to the load and a confirmation message is displayed.
5. Click OK.
The files can now be processed in Advanced eDiscovery Relevance for training the files.

Editing a load name within a case


If changing the load name, it is recommended to use a name that is significant to the case.
1. In the Relevance > Relevance setup tab, select Loads.
2. From the Loads management list, select a load and click the Edit icon. The Edit load window is displayed.
3. Enter the changes, and then click OK.

Adding imported files to a new load


After starting Relevance training or performing Batch calculation, you may want to import and process an
additional set of files.
During Catch-up, you can create, tag, and analyze the Catch-up set. Advanced eDiscovery compares its
assessment of Relevant and Non-Relevant files in the new load to those in previous loads. Based on the results,
you are prompted to make Catch-up decisions, if necessary, and Advanced eDiscovery provides recommendations
based on the accrued Relevance information.
Rolling Loads and Catch-up functionality varies as follows:
When you import a new file load after Batch calculation, Advanced eDiscovery determines to what extent
the files fall into one of the following categories:
Similar (homogeneous): A new, custom round of Relevance training is not required and the
knowledge accrued from the previous load can be applied "as is" to the new load.
Distinct (heterogeneous): A new, custom round of Relevance training is required, and the knowledge
accrued from the previous load cannot be applied.
These terms refer to the level of similarity of files between loads and not within the loads.
When importing a new file load during Relevance training (before Batch calculation), Catch-up enables you
to continue Relevance training on the united file set. Advanced eDiscovery does not estimate whether the
new load is similar to or distinct from the previous load. It simply collects information about the new load
and enables Relevance training to continue on the new and previous sets of files.
When there are multiple issues in Relevance training as well as issues after Batch calculation, the Catch-up
process is performed once for all issues, and the results are calculated and displayed for each issue.

NOTE
The size of the Catch-up sample may vary. It depends on the size of the new load relative to the previous loads, and on the
number of samples completed before adding the new load. The Catch-up sample is typically a set of 200 to 2,000 files from
the new load.
TIP
Catch-up stops any other tasks and requires individual file tagging and review. Therefore, you can reduce overhead when
you add new files in large batches.

Adding a new file load using Catch-up and Rolling loads


1. In the Relevance > Relevance setup tab, select Loads.
2. Under Loads management, click the + icon to add a load. A confirmation message is displayed.
3. Click Yes to continue. The Add new load dialog is displayed.

NOTE
You can only add a new load if actions were performed to the previous load.

4. In the Add new load dialog, type information in Load name and Description and then click OK.
Advanced eDiscovery adds a new load.
5. To import the new load file, click Add files. All new files are added to this load. After Advanced eDiscovery
imports the files, it recognizes the Rolling loads scenario and indicates Catch-up as the next step.
6. Click Catch-up at the bottom of the dialog to run the scenario.
A single Catch-up set, typically containing 200 to 2,000 files from the new load, is created for all issues to
allow concurrent file tagging.
Details are provided about whether loads are similar or distinct, whether Advanced eDiscovery merged or
split the loads automatically, and information regarding processing in the next step.
You can then tag files and run a calculate operation. The tagging enables Relevance to determine if loads
are similar or distinct and enables you to continue working on the new set of files.
7. After the Catch-up set is reviewed, view Relevance > Track for the Catch-up results.
8. If the new file load was added during Relevance training (meaning, the issue has not yet gone through
Batch calculation), Continue training is the next step, regardless of the Catch-up results.
The new and previous loads are processed as one load and Relevance training continues on the united set.
You are now finished with this procedure and can continue Relevance training.
9. If the new load was added after Batch calculation, proceed to the following steps.
10. For new loads added after Batch calculation, Advanced eDiscovery determines if the new load is similar to
or distinct from previous loads, as follows:
11. If loads were found to be similar: No additional Relevance training is necessary. The dashboard shows the
recommended next step is to run ** Batch calculation ** again to calculate Relevance scores for the new
load. Loads were found to be similar, so the previous classifier analysis can be run on the new files.
12. If loads were found to be distinct: More Relevance training is necessary and the next step is Catch-up
decision. Select a Catch-up decision as follows:
If you select Merge loads, Advanced eDiscovery merges previous and new loads for the training set.
Although the first load went through Batch calculation, more training is needed. Continue training new and
previous loads together. Batch calculation will then run again and the previous Batch calculation scores
should be ignored. Choose this selection when Relevance scores for existing loads can be recalculated, for
example, when review of existing file loads has not started.
If you select Split loads, continue Relevance training only on the new load. In this instance, previous Batch
calculation scores will remain as is. Choose this option when existing Relevance scores for existing loads
cannot be recalculated, for example, if review of existing loads has already started. Relevance scores are
managed separately from this point onward and cannot be merged.
13. Click Continue training.

See also
Office 365 Advanced eDiscovery
Defining issues and assigning users
Defining highlighted keywords and advanced options
Define issues and assign users in Office 365
Advanced eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, one or more issues can be defined within a case. Defining issues allows further
categorization of topics. When connecting to a new case, a single default issue is provided. You can edit the default
issue name and assign users to the issue.

Adding or editing an issue and assigning users


1. In the Relevance > Relevance setup tab > select Issues.

2. To add an issue, click the ** + ** icon. The Add issue dialog is displayed.

To edit an issue, click the Edit icon.


3. In Issue name, type a name that is descriptive and significant to the case.
4. In Description, type information about the issue.
5. Select the Enable concurrent training check box to enable the option. This setting enables multiple
reviewers to work on the same issue simultaneously (in separate samples).
6. In Assign users to issue, in the All users list, select a user to be assigned to the issue and then click the
right-facing arrow to add the user to the Selected users list. Repeat as necessary. In the window shown
above, "Admin" is shown as a selected user.

NOTE
User assignment to issues can be modified before or after a Relevance training cycle.

7. In Selected users, from the drop-down list next to the name of the selected user, select one of the
following Sampling modes:
On: The files can be viewed and tagged. This is the default setting.
Idle: The files can be viewed; tagged is optional.
Off: The files cannot be viewed or tagged.
8. When done adding issues, click OK.

Deleting issues
Issues may be deleted (meaning, removed from the database) only immediately after they were defined and no
actual work has been done for that issue.
1. In the Relevance > Relevance setup tab, select Issues.
2. Select the issue to delete from the database, and then click Delete.
3. A confirmation message is displayed. Click Yes to confirm.
4. Click OK.

See also
Office 365 Advanced eDiscovery
Setting up loads to add imported files
Defining highlighted keywords and advanced options
Set Analyze options in Office 365 Advanced
eDiscovery
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

In Advanced eDiscovery, set the Analyze options prior to running Analyze.

Set Analyze options


Open Prepare > Analyze > Setup. The following window is displayed.

Near-duplicates and email threads Check this box if you want to run the analysis. It is selected by default.
Document similarityEnter the Near-duplicates threshold value or accept the default of 65%.
ThemesCheck this box to process all files and assign themes to them. By default, this check box is not selected.
Enter the following options if you want to perform Themes processing.
Max number of themesEnter or select a value for the number of themes to create. The default is 200.
NOTE
Increasing the number of themes affects performance, as well as the ability of a theme to generalize. The higher the
number of themes, the more granular they are. For example, if a set of 50 themes include a theme such as
"Basketball, Spurs, Clippers, Lakers"; 300 themes may include separate themes: "Spurs", "Clippers", "Lakers". If you
had no awareness of the theme "Basketball" and use this feature for ECA, seeing the theme "Basketball" could be
useful. But, if the processing had too many themes, you may never see the word "Basketball" and may not know
that Spurs and Clippers are good Basketball themes to review, rather than items that go on boots and used for hair.

Suggested themesYou can suggest theme words to control Themes processing. Advanced eDiscovery
will focus on these suggested words and try to create one or more relevant themes, based on the "Max
number of themes" settings.
For example, if the suggested word is "computer", and you specified "2" as the "Max number of Themes",
Advanced eDiscovery will try to generate two themes that relate to the word "computer". The two themes
might be "computer software" and "computer hardware", for example.

1. To view, add, or edit suggested themes, click Modify.


2. In the Suggested themes panel, click the Add icon to add a theme. In the Add suggested theme
panel, add the words, separated by commas.
3. In Number of themes, select a value to determine the number of themes Advanced eDiscovery will try to
generate for these words (default is 1 theme).
4. Click Save and then close the dialogue.

NOTE
The total number of themes includes Suggested Themes. The total Suggested Themes cannot exceed the total
themes. If there are many Suggested Themes relative to the total themes, only a few "novel" themes will be detected
by the system because most of the themes will be dedicated to Suggested Themes.

Mode From the drop-down list, select a Themes option:


Create and apply model: Calculates themes by models from a segment of the files and then
distributes files among them.
Create model: Calculates a themes model from a segment of the files. The Apply process of
dividing files is done separately at another time.
Apply model: This option is only shown if a model was created previously and not yet applied. This
will divide the files based on the themes.
You can also set ignore text and set Analyze advanced settings for Analyze.
After you've set these options, click Analyze to run. View Analyze results are displayed.

See also
Office 365 Advanced eDiscovery
Understanding document similarity
Set Ignore text
Set Analyze advanced settings
View Analyze results
Understand Assessment in Relevance in Office 365
Advanced eDiscovery
8/21/2018 • 3 minutes to read • Edit Online

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Advanced eDiscovery enables early assessment, for example, for the defined issues and the data imported for a
case. Advanced eDiscovery enables the expert to make decisions pertaining to an adopted approach and to apply
them to the document review project.

Understanding assessment
In Assessment, the expert reviews a random set of at least 500 files, which are used to determine the richness of
the issues and to produce statistics that reflect the training results. Assessment is successful when enough
relevant files are found to reach a statistical level that will help Advanced eDiscovery Relevance to provide
accurate statistics and to effectively determine the stabilization point in the training process.
The higher the number of relevant files in the assessment set, the more accurate the statistics and the
effectiveness of the stability algorithm. The number of relevant files within the assessment files depends on the
richness of the issue. Richness is the estimated percent of relevant files in the set relevant to an issue. Issues with
higher richness will reach a higher number of relevant files more quickly than issues with lower richness. Issues
with extremely low richness (for example, 2% or less) will require a very large assessment set to reach a
significant number of Relevant files.
The statistics, which are presented in the Track and Decide tabs during training and after Batch calculation,
include estimations of recall for different review sets. In statistics, estimations that are based on a sample set (in
this case, the assessment files) include the margin of error and the confidence level of that error margin. For
example, estimated recall of 80% might have a margin of error of plus or minus 5% with a confidence level of
95%. This means that the estimated recall is actually 75%-85% and this estimation has 95% confidence. The
larger the assessment set, the margin of error becomes smaller and the statistics are more accurate.
After the expert reviews an initial assessment set of 500 files, Relevance is able to determine the current margin
of error of the recall values. Relevance will also set a default margin of error that it recommends to reach to
optimize the assessment set. Following are some examples:
If the assessment set already yielded a margin of error of plus or minus 10%, Relevance will recommend
to move on to training (no additional assessment review is needed).
If the assessment set yielded a margin of error of plus or minus 13%, Relevance might recommend the
review of another set of assessment files to reach a smaller margin.
If richness is extremely low, Relevance might recommend stopping assessment even though the margin of
error is large (making statistics impractical), because the assessment set needed to reach a useful margin
of error is too large.
Each issue has its own richness, current margin of error, and as a result, estimated number of additional
assessment files. The next assessment set is created according to the maximum number of files (up to 1,000 in a
single set).
You can accept the Relevance recommendations or adjust the current margin of error according to your needs.
The default current margin of error is determined for recall at equal or above 75%.

NOTE
The Assessment stage can be bypassed, in the Relevance > Track tab in the expanded view for an issue, by clearing the
Assessment check box per issue and then for "all issues". However, as a result, there will be no statistics for this issue. >
Clearing the Assessment check box can only be done before assessment is performed. Where multiple issues exist in a
case, assessment is bypassed only if the check box is cleared for each issue

See also
Office 365 Advanced eDiscovery
Tagging and Assessment
Tagging and Relevance training
Tracking Relevance analysis
Deciding based on the results
Testing Relevance analysis
Search and Tagging
8/21/2018 • 2 minutes to read • Edit Online

In Advanced eDiscovery, the Search and Tagging module enables you to search, preview, and organize the
documents in your case. Currently, this module is in beta.

NOTE
Advanced eDiscovery requires an Office 365 E3 with the Advanced Compliance add-on or an E5 subscription for your
organization. If you don't have that plan and want to try Advanced eDiscovery, you can sign up for a trial of Office 365
Enterprise E5.

Search the documents in your case


Once you have processed documents in Advanced eDiscovery and optionally run the Analyze module or the
Relevance module, you can use Search and Tagging to search through the documents in the case and organize
them using case-specific tags. You can define your queries using the provided condition cards, or through a KQL -
like query language in the Keywords condition card. Common KQL syntax, such as AND, OR, NOT, and NEAR (n)
are supported, as well as trailing multi-character wildcard (*). These properties are supported in the query
language property name:
caselabel: tags created/applied in Search and Tagging for this case
custodians: custodians assigned in the case - subject to limitations
date: sent date for email, modified date for documents
fileid: file ID within the case
filetype: native file extension
fileclass: email, document, or attachment
senderauthor: sender for emails, author for documents
size: size of the file in KB
subjecttitle: subject for emails, title for documents
bcc
cc
participants: Email addresses of all participants in an email thread, including for missing links
received: received date
recipients: email recipient names or addresses (to, cc, bcc)
sender
lastmodifieddate: last modified date of a document
sent: sent date of an email
to
author: author of an email
title: title of a document
dominanttheme: dominant theme of an item*
themeslist: themes that are associated with an item*
readpercentile_[issuenum]: read percentile of an item for issue [issuenum]**
relevancescore_[issuenum]: relevance score of an item for issue [issuenum]**
relevancetag_[issuenum]: if an item has been manually tagged for relevance, its tag for [issuenum]**
* Only available if the Themes module has been run ** Only available if the Relevance module has been run

See also
Office 365 Advanced eDiscovery
Understanding Assessment in Relevance
Tagging and Assessment
Tagging and Relevance training
Tracking Relevance analysis
Deciding based on the results
Testing Relevance analysis
Search the audit log in the Office 365 Security &
Compliance Center
11/30/2018 • 56 minutes to read • Edit Online

Need to find if a user viewed a specific document or purged an item from their mailbox? If so, you can use the
Office 365 Security & Compliance Center to search the unified audit log to view user and administrator activity
in your Office 365 organization. Why a unified audit log? Because you can search for the following types of user
and admin activity in Office 365:
User activity in SharePoint Online and OneDrive for Business
User activity in Exchange Online (Exchange mailbox audit logging)

IMPORTANT
Mailbox audit logging must be turned on for each user mailbox before user activity in Exchange Online will be
logged. For more information, see Enable mailbox auditing in Office 365.

Admin activity in SharePoint Online


Admin activity in Azure Active Directory (the directory service for Office 365)
Admin activity in Exchange Online (Exchange admin audit logging)
User and admin activity in Sway
eDiscovery activities in the Office 365 Security & Compliance Center
User and admin activity in Power BI
User and admin activity in Microsoft Teams
User and admin activity in Dynamics 365
User and admin activity in Yammer
User and admin activity in Microsoft Flow
User and admin activity in Microsoft Stream

Before you begin


Be sure to read the following items before you start searching the Office 365 audit log.
You (or another admin) must first turn on audit logging before you can start searching the Office 365
audit log. To turn it on, just click Start recording user and admin activity on the Audit log search
page in the Security & Compliance Center. (If you don't see this link, auditing has already been turned on
for your organization.) After you turn it on, a message is displayed that says the audit log is being
prepared and that you can run a search in a couple of hours after the preparation is complete. You only
have to do this once.
NOTE
We're in the process of turning on auditing by default. Until then, you can turn it on as previously described.

You have to be assigned the View -Only Audit Logs or Audit Logs role in Exchange Online to search the
Office 365 audit log. By default, these roles are assigned to the Compliance Management and
Organization Management role groups on the Permissions page in the Exchange admin center. To give a
user the ability to search the Office 365 audit log with the minimum level of privileges, you can create a
custom role group in Exchange Online, add the View -Only Audit Logs or Audit Logs role, and then add
the user as a member of the new role group. For more information, see Manage role groups in Exchange
Online.

IMPORTANT
If you assign a user the View-Only Audit Logs or Audit Logs role on the Permissions page in the Security &
Compliance Center, they won't be able to search the Office 365 audit log. You have to assign the permissions in
Exchange Online. This is because the underlying cmdlet used to search the audit log is an Exchange Online cmdlet.

When an audited activity is performed by a user or admin, an audit record is generated and stored in the
Office 365 audit log for your organization. The length of time that an audit record is retained (and
searchable in the audit log) depends on your Office 365 subscription, and specifically the type of the
license that is assigned to a specific user.
Office 365 E3 - Audit records are retained for 90 days. That means you can search the audit log
for activities that were performed within the last 90 days.
Office 365 E5 - Audit records are retained for 365 days (one year). That means you can search the
audit log for activities that were performed within the last year. Retaining audit records for one
year is also available for users that are assigned an E3/Exchange Online Plan 1 license and have an
Office 365 Advanced Compliance add-on license.

NOTE
The one-year retention period for audit records for E5 organizations (or E3 organizations that have
Advanced Compliance add-on licenses) is currently available only as part of a private preview program. To
enroll in this preview program, please file a request with Microsoft Support and include the following as
the description of what you need help with: "Long-term Office 365 audit log private preview".

If you want to turn off audit log search in Office 365 for your organization, you can run the following
command in remote PowerShell connected to your Exchange Online organization:

Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $false

To turn on audit search again, you can run the following command in Exchange Online PowerShell:

Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true

For more information, see Turn off audit log search in Office 365.
As previously stated, the underlying cmdlet used to search the audit log is an Exchange Online cmdlet,
which is Search-UnifiedAuditLog. That means you can use this cmdlet to search the Office 365 audit
log instead of using the Audit log search page in the Security & Compliance Center. You have to run
this cmdlet in remote PowerShell connected to your Exchange Online organization. For more
information, see Search-UnifiedAuditLog.
If you want to programmatically download data from the Office 365 audit log, we recommend that you
use the Office 365 Management Activity API instead of using a PowerShell script. The Office 365
Management Activity API is a REST web service that you can use to develop operations, security, and
compliance monitoring solutions for your organization. For more information, see Office 365
Management Activity API reference.
It can take up to 30 minutes or up to 24 hours after an event occurs for the corresponding audit log entry
to be displayed in the search results. The following table shows the time it takes for the different services
in Office 365.

OFFICE 365 SERVICE 30 MINUTES 24 HOURS

Advanced Threat Protection and


Threat Intelligence

Azure Active Directory (user login


events)

Azure Active Directory (admin


events)

Azure Active Directory (user login


events)

Data Loss Prevention

Dynamics 365 CRM

eDiscovery

Exchange Online

Microsoft Flow

Microsoft Forms

Microsoft Project

Microsoft Stream

Microsoft Teams

Power BI

Security & Compliance Center

SharePoint Online and OneDrive for


Business

Sway
OFFICE 365 SERVICE 30 MINUTES 24 HOURS

Yammer

Azure Active Directory (Azure AD ) is the directory service for Office 365. The unified audit log contains
user, group, application, domain, and directory activities performed in the Office 365 admin center or in
the in Azure management portal. For a complete list of Azure AD events, see Azure Active Directory
Audit Report Events.
Exchange Online audit logs consist of two types of events: Exchange admin events (actions taken by
administrators) and mailbox events (actions taken by users on mailboxes). Note that mailbox auditing
isn't enabled by default. It must be enable for each user mailbox before mailbox events can be searched
for in the Office 365 audit log. For more information about mailbox auditing and the mailbox auditing
actions that are logged, see Enable mailbox auditing in Office 365.
Audit logging for Power BI isn't enabled by default. To search for Power BI activities in the Office 365
audit log, you have to enable auditing in the Power BI admin portal. For instructions, see the "Audit logs"
section in Power BI admin portal.

Search the audit log


Here's the process for searching the audit log in Office 365.
Step 1: Run an audit log search
Step 2: View the search results
Step 3: Filter the search results
Step 4: Export the search results to a file
Step 1: Run an audit log search
1. Go to https://protection.office.com.

TIP
Use a private browsing session (not a regular session) to access the Office 365 Security & Compliance Center
because this will prevent the credential that you are currently logged on with from being used. To open an
InPrivate Browsing session in Internet Explorer or Microsoft Edge, just press CTRL+SHIFT+P. To open a private
browsing session in Google Chrome (called an incognito window), press CTRL+SHIFT+N.

2. Sign in to Office 365 using your work or school account.


3. In the left pane of the Security & Compliance Center, click Search & investigation, and then click Audit
log search.
The Audit log search page is displayed.
NOTE
You have to first turn on audit logging before you can run an audit log search. If the Start recording user and
admin activity link is displayed, click it to turn on auditing. If you don't see this link, auditing has already been
turned on for your organization.

4. Configure the following search criteria:


a. Activities Click the drop-down list to display the activities that you can search for. User and admin
activities are organized in to groups of related activities. You can select specific activities or you can click
the activity group name to select all activities in the group. You can also click a selected activity to clear
the selection. After you run the search, only the audit log entries for the selected activities are displayed.
Selecting Show results for all activities will display results for all activities performed by the selected
user or group of users.
Over 100 user and admin activities are logged in the Office 365 audit log. Click the Audited activities
tab at the topic of this article to see the descriptions of every activity in each of the different Office 365
services.
b. Start date and End date The last seven days are selected by default. Select a date and time range to
display the events that occurred within that period. The date and time are presented in Coordinated
Universal Time (UTC ) format. The maximum date range that you can specify is 90 days. An error is
displayed if the selected date range is greater than 90 days.
TIP
If you're using the maximum date range of 90 days, select the current time for the Start date. Otherwise, you'll
receive an error saying that the start date is earlier than the end date. If you've turned on auditing within the last
90 days, the maximum date range can't start before the date that auditing was turned on.

c. Users Click in this box and then select one or more users to display search results for. The audit log
entries for the selected activity performed by the users you select in this box are displayed in the list of
results. Leave this box blank to return entries for all users (and service accounts) in your organization.
d. File, folder, or site Type some or all of a file or folder name to search for activity related to the file of
folder that contains the specified keyword. You can also specify a URL of a file or folder. If you use a URL,
be sure the type the full URL path or if you just type a portion of the URL, don't include any special
characters or spaces.
Leave this box blank to return entries for all files and folders in your organization.
5. Click Search to run the search using your search criteria.
The search results are loaded, and after a few moments they are displayed under Results. When the
search is finished, the number of results found is displayed. Note that a maximum of 5,000 events will be
displayed in the Results pane in increments of 150 events; if more than 5,000 events meet the search
criteria, the most recent 5,000 events are displayed.

Tips for searching the audit log


You can select specific activities to search for by clicking on the activity name. Or you can search for all
activities in a group (such as File and folder activities) by clicking on the group name. If an activity is
selected, you can click it to cancel the selection. You can also use the search box to display the activities
that contain the keyword that you type.
You have to select Show results for all activities in the Activities list to display events from the
Exchange admin audit log. Events from this audit log display a cmdlet name (for example, Set-Mailbox )
in the Activity column in the results. For more information, click the Audited activities tab in this topic
and then click Exchange admin activities.
Similarly, there are some auditing activities that don't have a corresponding item in the Activities list. If
you know the name of the operation for these activities, you can search for all activities, then filter the
results by typing the name of the operation in the box for the Activity column. See Step 3: Filter the
search results for more information about filtering the results.
Click Clear to clear the current search criteria. The date range returns to the default of the last seven
days. You can also click Clear all to show results for all activities to cancel all selected activities.
If 5,000 results are found, you can probably assume there are more than 5,000 events that met the search
criteria. You can either refine the search criteria and rerun the search to return fewer results, or you can
export all of the search results by selecting Export results > Download all results.
Step 2: View the search results
The results of an audit log search are displayed under Results on the Audit log search page. As previously
stated a maximum of 5,000 (newest) events are displayed in increments of 150 events. To display more events
you can use the scroll bar in the Results pane or you can press Shift + End to display the next 150 events.
The results contain the following information about each event returned by the search.
Date: The date and time (in UTC format) when the event occurred.
IP address: The IP address of the device that was used when the activity was logged. The IP address is
displayed in either an IPv4 or IPv6 address format.
User: The user (or service account) who performed the action that triggered the event.
Activity: The activity performed by the user. This value corresponds to the activities that you selected in
the Activities drop down list. For an event from the Exchange admin audit log, the value in this column
is an Exchange cmdlet.
Item: The object that was created or modified as a result of the corresponding activity. For example, the
file that was viewed or modified or the user account that was updated. Not all activities have a value in
this column.
Detail: Additional detail about an activity. Again, not all activities will have a value.
TIP
Click a column header under Results to sort the results. You can sort the results from A to Z or Z to A. Click the Date
header to sort the results from oldest to newest or newest to oldest.

View the details for a specific event


You can view more details about an event by clicking the event record in the list of search results. A Details
page is displayed that contains the detailed properties from the event record. The properties that are displayed
depend on the Office 365 service in which the event occurs. To display these details, click More information.
For descriptions, see Detailed properties in the Office 365 audit log.

Step 3: Filter the search results


In addition to sorting, you can also filter the results of an audit log search. This is a great feature that can help
you quickly filter the results for a specific user or activity. You can initially create a wide search and then quickly
filter the results to see specific events. Then you can narrow the search criteria and re-run the search to return a
smaller, more concise set of results.
To filter the results:
1. Run an audit log search.
2. When the results are displayed, click Filter results.
Keyword boxes are displayed under each column header.
3. Click one of the boxes under a column header and type a word or phrase, depending on the column
you're filtering on. The results will dynamically readjust to display the events that match your filter.
4. To clear a filter, click the X in the filter box or just click Hide filtering.

TIP
To display events from the Exchange admin audit log, type a - (dash) in the Activity filter box. This will display cmdlet
names, which are displayed in the Activity column for Exchange admin events. Then you can sort the cmdlet names in
alphabetical order.

Step 4: Export the search results to a file


You can export the results of an audit log search to a comma separated value (CSV ) file on your local computer.
You can open this file in Microsoft Excel and use features such as search, sorting, filtering, and splitting a single
column (that contains multi-value cells) into multiple columns.
1. Run an audit log search, and then revise the search criteria until you have the desired results.
2. Click Export results and select one of the following options:
Save loaded results Choose this option to export only the entries that are displayed under Results on
the ** Audit log search ** page. The CSV file that is downloaded contains the same columns (and data)
displayed on the page (Date, User, Activity, Item, and Details). An additional column (named More) is
included in the CSV file that contains more information from the audit log entry. Because you're
exporting the same results that are loaded (and viewable) on the Audit log search page, a maximum of
5,000 entries are exported.
Download all results Choose this option to export all entries from the Office 365 audit log that meet
the search criteria. For a large set of search results, choose this option to download all entries from the
audit log in addition to the 5,000 results that can be displayed on the Audit log search page. This option
will download the raw data from the audit log to a CSV file, and contains additional information from the
audit log entry in a column named AuditData. It may take longer to download the file if you choose this
export option because the file may be much larger than the one that's downloaded if you choose the
other option.

IMPORTANT
You can download a maximum of 50,000 entries to a CSV file from a single audit log search. If 50,000 entries are
downloaded to the CSV file, you can probably assume there are more than 50,000 events that met the search
criteria. To export more than this limit, try using a date range to reduce the number of audit log entries. You
might have to run multiple searches with smaller date ranges to export more than 50,000 entries.

3. After you select an export option, a message is displayed at the bottom of the window that prompts you to
open the CSV file, save it to the Downloads folder, or save it to a specific folder.
More information about exporting audit log search results
The Download all results option downloads the raw data from the Office 365 audit log to a CSV file.
This file contains different column names (CreationDate, UserIds, Operation, AuditData) than the file
that's downloaded if you select the Save loaded results option. The values in the two different CSV files
for the same activity may also be different. For example, the activity in the Action column in the CSV file
and may have a different value than the "user-friendly" version that's displayed in the Activity column
on the Audit log search page; for example, MailboxLogin vs. User signed in to mailbox.
If you download all results, the CSV file contains a column named AuditData, which contains additional
information about each event. As previously stated, this column contains a multi-value property for
multiple properties from the audit log record. Each of the property:value pairs in this multi-value
property are separated by a comma. You can use the Power Query in Excel to split this column into
multiple columns so that each property will have its own column. This will let you sort and filter on one
or more of these properties. To learn how to do this, see the "Split a column by delimiter" section in Split
a column of text (Power Query).
After you split the AuditData column, you can filter on the Operations column to display the detailed
properties for a specific type of activity.
There's a 3,060-character limit for the data that's displayed in the AuditData field for an audit record. If
the 3,060-character limit is exceeded, the data in this field is truncated.
When you download all results from a search query that contains events from different Office 365
services, the AuditData column in the CSV file contains different properties depending on which service
the action was performed in. For example, entries from Exchange and Azure AD audit logs include a
property named ResultStatus that indicates if the action was successful or not. This property isn't
included for events in SharePoint. Similarly, SharePoint events have a property that identifies the site
URL for file and folder related activities. To mitigate this behavior, consider using different searches to
export the results for activities from a single service.
For a description of the properties that are listed in the AuditData column in the CSV file when you
download all results, and the service each one applies to, see Detailed properties in the Office 365 audit
log.

Audited activities
The tables in this section describe the activities that are audited in Office 365. You can search for these events by
searching the audit log in the Security & Compliance Center. Click the Search the audit log tab for step-by-
step instructions.
These tables group related activities or the activities from a specific Office 365 service. The tables include the
friendly name that's displayed in the Activities drop-down list and the name of the corresponding operation
that appears in the detailed information of an audit record and in the CSV file when you export the search
results. For descriptions of the detailed information, see Detailed properties in the Office 365 audit log.
Click one of the following links to go to a specific table.

File and page activities Folder activities Sharing and access request activities

Synchronization activities Site administration activities Exchange mailbox activities

Sway activities User administration activities Azure AD group administration


activities
Application administration activities Role administration activities Directory administration activities

eDiscovery activities Power BI activities Microsoft Teams activities

Yammer activities Microsoft Flow Microsoft Stream

Exchange admin audit log

File and page activities


The following table describes the file and page activities in SharePoint Online and OneDrive for Business.

FRIENDLY NAME OPERATION DESCRIPTION

Accessed file FileAccessed User or system account accesses a file.

(none) FileAccessedExtended This is related to the "Accessed file"


(FileAccessed) activity. A
FileAccessedExtended event is logged
when the same person continually
accesses a file for an extended period
of time (up to 3 hours). The purpose of
logging FileAccessedExtended events is
to reduce the number of FileAccessed
events that are logged when a file is
continually accessed. This helps reduce
the noise of multiple FileAccessed
records for what is essentially the same
user activity, and lets you focus on the
initial (and more important)
FileAccessed event.

Checked in file FileCheckedIn User checks in a document that they


checked out from a document library.

Checked out file FileCheckedOut User checks out a document located in


a document library. Users can check
out and make changes to documents
that have been shared with them.

Copied file FileCopied User copies a document from a site.


The copied file can be saved to another
folder on the site.

Deleted file FileDeleted User deletes a document from a site.

Deleted file from recycle bin FileDeletedFirstStageRecycleBin User deletes a file from the recycle bin
of a site.

Deleted file from second-stage recycle FileDeletedSecondStageRecycleBin User deletes a file from the second-
bin stage recycle bin of a site.

Detected malware in file FileMalwareDetected SharePoint anti-virus engine detects


malware in a file.
FRIENDLY NAME OPERATION DESCRIPTION

Discarded file checkout FileCheckOutDiscarded User discards (or undos) a checked out
file. That means any changes they
made to the file when it was checked
out are discarded, and not saved to
the version of the document in the
document library.

Downloaded file FileDownloaded User downloads a document from a


site.

Modified file FileModified User or system account modifies the


content or the properties of a
document located on a site.

(none) FileModifiedExtended This is related to the "Modified file"


(FileModified) activity. A
FileModifiedExtended event is logged
when the same person continually
modifies a file for an extended period
of time (up to 3 hours). The purpose of
logging FileModifiedExtended events is
to reduce the number of FileModified
events that are logged when a file is
continually modified. This helps reduce
the noise of multiple FileModified
records for what is essentially the same
user activity, and lets you focus on the
initial (and more important)
FileModified event.

Moved file FileMoved User moves a document from its


current location on a site to a new
location.

Recycled all minor versions of file FileVersionsAllMinorsRecycled User deletes all minor versions from
the version history of a file. The
deleted versions are moved to the
site's recycle bin.

Recycled all versions of file FileVersionsAllRecycled User deletes all versions from the
version history of a file. The deleted
versions are moved to the site's recycle
bin.

Recycled version of file FileVersionRecycled User deletes a version from the version
history of a file. The deleted version is
moved to the site's recycle bin.

Renamed file FileRenamed User renames a document on a site.

Restored file FileRestored User restores a document from the


recycle bin of a site.

Uploaded file FileUploaded User uploads a document to a folder


on a site.
FRIENDLY NAME OPERATION DESCRIPTION

Viewed page PageViewed User views a page on a site. This


doesn't include using a Web browser
to view files located in a document
library.

(none) PageViewedExtended This is related to the "Viewed page"


(PageViewed) activity. A
PageViewedExtended event is logged
when the same person continually
views a web page for an extended
period of time (up to 3 hours). The
purpose of logging
PageViewedExtended events is to
reduce the number of PageViewed
events that are logged when a page is
continually viewed. This helps reduce
the noise of multiple PageViewed
records for what is essentially the same
user activity, and lets you focus on the
initial (and more important)
PageViewed event.

Folder activities
The following table describes the folder activities in SharePoint Online and OneDrive for Business.

FRIENDLY NAME OPERATION DESCRIPTION

Copied folder FolderCopied User copies a folder from a site to


another location in SharePoint or
OneDrive for Business.

Created folder FolderCreated User creates a folder on a site.

Deleted folder FolderDeleted User deletes a folder from a site.

Deleted folder from recycle bin FolderDeletedFirstStageRecycleBin User deletes a folder from the recycle
bin on a site.

Deleted folder from second-stage FolderDeletedSecondStageRecycleBin User deletes a folder from the second-
recycle bin stage recycle bin on a site.

Modified folder FolderModified User modifies a folder on a site. This


includes changing the folder metadata,
such as changing tags and properties.

Moved folder FolderMoved User moves a folder to a different


location on a site.

Renamed folder FolderRenamed User renames a folder on a site.

Restored folder FolderRestored User restores a deleted folder from the


recycle bin on a site.

Sharing and access request activities


The following table describes the user sharing and access request activities in SharePoint Online and OneDrive
for Business. For sharing events, the Detail column under Results identifies the name of the user or group the
item was shared with and whether that user or group is a member or guest in your organization. For more
information, see Use sharing auditing in the Office 365 audit log.

NOTE
Users can be either members or guests based on the UserType property of the user object. A member is usually an
employee, and a guest is usually a collaborator outside of your organization. When a user accepts a sharing invitation
(and isn't already part of your organization), a guest account is created for them in your organization's directory. Once the
guest user has an account in your directory, resources may be shared directly with them (without requiring an invitation).

FRIENDLY NAME OPERATION DESCRIPTION

Accepted access request AccessRequestAccepted An access request to a site, folder, or


document was accepted and the
requesting user has been granted
access.

Accepted sharing invitation SharingInvitationAccepted User (member or guest) accepted a


sharing invitation and was granted
access to a resource. This event
includes information about the user
who was invited and the email address
that was used to accept the invitation
(they could be different). This activity is
often accompanied by a second event
that describes how the user was
granted access to the resource, for
example, adding the user to a group
that has access to the resource.

Added permission level to site PermissionLevelAdded A permission level was added to a site
collection collection.

User added to secure link AddedToSecureLink A user was added to the list of entities
who can use this secure sharing link.

Blocked sharing invitation SharingInvitationBlocked A sharing invitation sent by a user in


your organization is blocked because
of an external sharing policy that either
allows or denies external sharing based
on the domain of the target user. In
this case, the sharing invitation was
blocked because:
The target user's domain isn't included
in the list of allowed domains.
Or
The target user's domain is included in
the list of blocked domains.
For more information about allowing
or blocking external sharing based on
domains, see Restricted domains
sharing in SharePoint Online and
OneDrive for Business.

Broke permission level inheritance PermissionLevelsInheritanceBroken An item was changed so that it no


longer inherits permission levels from
its parent.
FRIENDLY NAME OPERATION DESCRIPTION

Broke sharing inheritance SharingInheritanceBroken An item was changed so that it no


longer inherits sharing permissions
from its parent.

Created a company shareable link CompanyLinkCreated User created a company-wide link to a


resource. company-wide links can only
be used by members in your
organization. They can't be used by
guests.

Created access request AccessRequestCreated User requests access to a site, folder,


or document they don't have
permissions to access.

Created an anonymous link AnonymousLinkCreated User created an anonymous link to a


resource. Anyone with this link can
access the resource without having to
be authenticated.

Created secure link SecureLinkCreated A secure sharing link was created to


this item.

Created sharing invitation SharingInvitationCreated User shared a resource in SharePoint


Online or OneDrive for Business with a
user who isn't in your organization's
directory.

Deleted secure link SecureLinkDeleted A secure sharing link was deleted.

Denied access request AccessRequestDenied An access request to a site, folder, or


document was denied.

Modified permission level on site PermissionLevelModified A permission level was changed on a


collection site collection.

Removed a company shareable link CompanyLinkRemoved User removed a company-wide link to


a resource. The link can no longer be
used to access the resource.

Removed an anonymous link AnonymousLinkRemoved User removed an anonymous link to a


resource. The link can no longer be
used to access the resource.

Removed permission level from site PermissionLevelRemoved A permission level was removed from a
collection site collection.

Restored sharing inheritance SharingInheritanceReset A change was made so that an item


inherits sharing permissions from its
parent.
FRIENDLY NAME OPERATION DESCRIPTION

Shared file, folder, or site SharingSet User (member or guest) shared a file,
folder, or site in SharePoint or
OneDrive for Business with a user in
your organization's directory. The value
in the Detail column for this activity
identifies the name of the user the
resource was shared with and whether
this user is a member or a guest. This
activity is often accompanied by a
second event that describes how the
user was granted access to the
resource; for example, adding the user
to a group that has access to the
resource.

Updated access request AccessRequestUpdated An access request to an item was


updated.

Updated an anonymous link AnonymousLinkUpdated User updated an anonymous link to a


resource. The updated field is included
in the EventData property when you
export the search results.

Updated sharing invitation SharingInvitationUpdated An external sharing invitation was


updated.

Used an anonymous link AnonymousLinkUsed An anonymous user accessed a


resource by using an anonymous link.
The user's identity might be unknown,
but you can get other details such as
the user's IP address.

Unshared file, folder, or site SharingRevoked User (member or guest) unshared a


file, folder, or site that was previously
shared with another user.

Used a company shareable link CompanyLinkUsed User accessed a resource by using a


company-wide link.

Used secure link SecureLinkUsed A user used a secure link.

User added to secure link AddedToSecureLink A user was added to the list of entities
who can use a secure sharing link.

User removed from secure link RemovedFromSecureLink A user was removed from the list of
entities who can use a secure sharing
link.

Withdrew sharing invitation SharingInvitationRevoked User withdrew a sharing invitation to a


resource.

Synchronization activities
The following table lists file synchronization activities in SharePoint Online and OneDrive for Business.
FRIENDLY NAME OPERATION DESCRIPTION

Allowed computer to sync files ManagedSyncClientAllowed User successfully establishes a sync


relationship with a site. The sync
relationship is successful because the
user's computer is a member of a
domain that's been added to the list of
domains (called the safe recipients list
) that can access document libraries in
your organization.
For more information about this
feature, see Use Windows PowerShell
cmdlets to enable OneDrive sync for
domains that are on the safe recipients
list.

Blocked computer from syncing files UnmanagedSyncClientBlocked User tries to establish a sync
relationship with a site from a
computer that isn't a member of your
organization's domain or is a member
of a domain that hasn't been added to
the list of domains (called the safe
recipients list ) that can access
document libraries in your
organization. The sync relationship is
not allowed, and the user's computer is
blocked from syncing, downloading, or
uploading files on a document library.
For information about this feature, see
Use Windows PowerShell cmdlets to
enable OneDrive sync for domains that
are on the safe recipients list.

Downloaded files to computer FileSyncDownloadedFull User establishes a sync relationship


and successfully downloads files for the
first time to their computer from a
document library.

Downloaded file changes to computer FileSyncDownloadedPartial User successfully downloads any


changes to files from a document
library. This activity indicates that any
changes that were made to files in the
document library were downloaded to
the user's computer. Only changes
were downloaded because the
document library was previously
downloaded by the user (as indicated
by the Downloaded files to
computer activity).

Uploaded files to document library FileSyncUploadedFull User establishes a sync relationship


and successfully uploads files for the
first time from their computer to a
document library.
FRIENDLY NAME OPERATION DESCRIPTION

Uploaded file changes to document FileSyncUploadedPartial User successfully uploads changes to


library files on a document library. This event
indicates that any changes made to
the local version of a file from a
document library are successfully
uploaded to the document library.
Only changes are unloaded because
those files were previously uploaded
by the user (as indicated by the **
Uploaded files to document library **
activity).

Site administration activities


The following table lists the events that result from site administration tasks in SharePoint Online.

FRIENDLY NAME OPERATION DESCRIPTION

Added exempt user agent ExemptUserAgentSet A SharePoint or global administrator


adds a user agent to the list of exempt
user agents in the SharePoint admin
center.

Added site collection admin SiteCollectionAdminAdded Site collection administrator or owner


adds a person as a site collection
administrator for a site. Site collection
administrators have full control
permissions for the site collection and
all subsites.

Added user or group to SharePoint AddedToGroup User added a member or guest to a


group SharePoint group. This might have
been an intentional action or the result
of another activity, such as a sharing
event.

Allowed user to create groups AllowGroupCreationSet Site administrator or owner adds a


permission level to a site that allows a
user assigned that permission to
create a group for that site.

Cancelled site geo move SiteGeoMoveCancelled A SharePoint or global administrator


successfully cancels a SharePoint or
OneDrive site geo move. The Multi-
Geo capability lets an Office 365
organization span multiple Office 365
datacenter geographies, which are
called geos. For more information, see
Multi-Geo Capabilities in OneDrive
and SharePoint Online in Office 365.
FRIENDLY NAME OPERATION DESCRIPTION

Changed a sharing policy SharingPolicyChanged A SharePoint or global administrator


changed a SharePoint sharing policy
by using the Office 365 admin portal,
SharePoint admin portal, or SharePoint
Online Management Shell. Any change
to the settings in the sharing policy in
your organization will be logged. The
policy that was changed is identified in
the ModifiedProperties field in the
detailed properties of the event record.

Changed device access policy DeviceAccessPolicyChanged A SharePoint or global administrator


changed the unmanaged devices
policy for your organization. This policy
controls access to SharePoint,
OneDrive, and Office 365 from devices
that aren't joined to your organization.
Configuring this policy requires an
Enterprise Mobility + Security
subscription. For more information, see
Control access from unmanaged
devices.

Changed exempt user agents CustomizeExemptUsers A SharePoint or global administrator


customized the list of exempt user
agents in the SharePoint admin center.
You can specify which user agents to
exempt from receiving an entire web
page to index. This means when a user
agent you've specified as exempt
encounters an InfoPath form, the form
will be returned as an XML file, instead
of an entire web page. This makes
indexing InfoPath forms faster.

Changed network access policy NetworkAccessPolicyChanged A SharePoint or global administrator


changed the location-based access
policy (also called a trusted network
boundary) in the SharePoint admin
center or by using SharePoint Online
PowerShell. This type of policy controls
who can access SharePoint and
OneDrive resources in your
organization based on authorized IP
address ranges that you specify. For
more information, see Control access
to SharePoint Online and OneDrive
data based on network location.

Completed site geo move SiteGeoMoveCompleted A site geo move that was scheduled by
a global administrator in your
organization was successfully
completed. The Multi-Geo capability
lets an Office 365 organization span
multiple Office 365 datacenter
geographies, which are called geos. For
more information, see Multi-Geo
Capabilities in OneDrive and
SharePoint Online in Office 365.
FRIENDLY NAME OPERATION DESCRIPTION

Created group GroupAdded Site administrator or owner creates a


group for a site, or performs a task
that results in a group being created.
For example, the first time a user
creates a link to share a file, a system
group is added to the user's OneDrive
for Business site. This event can also be
a result of a user creating a link with
edit permissions to a shared file.

Created Sent To connection SendToConnectionAdded A SharePoint or global administrator


creates a new Send To connection on
the Records management page in the
SharePoint admin center. A Send To
connection specifies settings for a
document repository or a records
center. When you create a Send To
connection, a Content Organizer can
submit documents to the specified
location.

Created site collection SiteCollectionCreated A SharePoint or global administrator


creates a new site collection in your
SharePoint Online organization or a
user provisions their OneDrive for
Business site.

Deleted group GroupRemoved User deletes a group from a site.

Deleted Sent To connection SendToConnectionRemoved A SharePoint or global administrator


deletes a Send To connection on the
Records management page in the
SharePoint admin center.

Deleted site SiteDeleted Site administrator deletes a site.

Enabled document preview PreviewModeEnabledSet Site administrator enables document


preview for a site.

Enabled legacy workflow LegacyWorkflowEnabledSet Site administrator or owner adds the


SharePoint 2013 Workflow Task
content type to the site. Global
administrators can also enable work
flows for the entire organization in the
SharePoint admin center.

Enabled Office on Demand OfficeOnDemandSet Site administrator enables Office on


Demand, which lets users access the
latest version of Office desktop
applications. Office on Demand is
enabled in the SharePoint admin
center and requires an Office 365
subscription that includes full, installed
Office applications.
FRIENDLY NAME OPERATION DESCRIPTION

Enabled RSS feeds NewsFeedEnabledSet Site administrator or owner enables


RSS feeds for a site. Global
administrators can enable RSS feeds
for the entire organization in the
SharePoint admin center.

Modified access request setting WebRequestAccessModified The access request settings were
modified on a site.

Modified Members Can Share setting WebMembersCanShareModified The Members Can Share setting was
modified on a site.

Modified site permissions SitePermissionsModified Site administrator or owner (or system


account) changes the permission level
that are assigned to a group on a site.
This activity is also logged if all
permissions are removed from a
group.
> [!NOTE]> This operation has been
deprecated in SharePoint Online. To
find related events, you can search for
other permission-related activities such
as Added site collection admin,
Added user or group to SharePoint
group, Allowed user to create
groups, Created group, and Deleted
group.

Removed user or group from RemovedFromGroup User removed a member or guest


SharePoint group from a SharePoint group. This might
have been an intentional action or the
result of another activity, such as an
unsharing event.

Renamed site SiteRenamed Site administrator or owner renames a


site

Requested site admin permissions SiteAdminChangeRequest User requests to be added as a site


collection administrator for a site
collection. Site collection administrators
have full control permissions for the
site collection and all subsites.

Scheduled site geo move SiteGeoMoveScheduled A SharePoint or global administrator


successfully schedules a SharePoint or
OneDrive site geo move. The Multi-
Geo capability lets an Office 365
organization span multiple Office 365
datacenter geographies, which are
called geos. For more information, see
Multi-Geo Capabilities in OneDrive
and SharePoint Online in Office 365.

Set host site HostSiteSet A SharePoint or global administrator


changes the designated site to host
personal or OneDrive for Business
sites.
FRIENDLY NAME OPERATION DESCRIPTION

Updated group GroupUpdated Site administrator or owner changes


the settings of a group for a site. This
can include changing the group's
name, who can view or edit the group
membership, and how membership
requests are handled.

Exchange mailbox activities


The following table lists the activities that can be logged by mailbox audit logging. Mailbox activities performed
by the mailbox owner, a delegated user, or an administrator are logged. By default, mailbox auditing in Office
365 isn't turned on. Mailbox audit logging must be turned on for each mailbox before mailbox activity will be
logged. For more information, see Enable mailbox auditing in Office 365.

FRIENDLY NAME OPERATION DESCRIPTION

Added delegate mailbox permissions Add-MailboxPermission An administrator assigned the


FullAccess mailbox permission to a
user (known as a delegate) to another
person's mailbox. The FullAccess
permission allows the delegate to open
the other person's mailbox, and read
and manage the contents of the
mailbox.

Copied messages to another folder Copy A message was copied to another


folder.

Created mailbox item Create An item is created in the Calendar,


Contacts, Notes, or Tasks folder in the
mailbox; for example, a new meeting
request is created. Note that creating,
sending, or receiving a message isn't
audited. Also, creating a mailbox folder
is not audited.

Deleted messages from Deleted Items SoftDelete A message was permanently deleted
folder or deleted from the Deleted Items
folder. These items are moved to the
Recoverable Items folder. Messages are
also moved to the Recoverable Items
folder when a user selects it and
presses Shift+Delete.

Moved messages to another folder Move A message was moved to another


folder.

Moved messages to Deleted Items MoveToDeletedItems A message was deleted and moved to
folder the Deleted Items folder.

Modified folder permission UpdateFolderPermissions A folder permission was changed.


Folder permissions control which users
in your organization can access
mailbox folders and the messages in
the folder.
FRIENDLY NAME OPERATION DESCRIPTION

Purged messages from the mailbox HardDelete A message was purged from the
Recoverable Items folder (permanently
deleted from the mailbox).

Removed delegate mailbox Remove-MailboxPermission An administrator removed the


permissions FullAccess permission (that was
assigned to a delegate) from a person's
mailbox. After the FullAccess
permission is removed, the delegate
can't open the other person's mailbox
or access any content in it.

Sent message using Send As SendAs A message was sent using the SendAs
permissions permission. This means another user
sent the message as though it came
from the mailbox owner.

Sent message using Send On Behalf SendOnBehalf A message was sent using the
permissions SendOnBehalf permission. This means
another user sent the message on
behalf of the mailbox owner. The
message indicates to the recipient who
the message was sent on behalf of and
who actually sent the message.

Updated delegate access to calendar UpdateCalendarDelegation A calendar delegation was assigned to


folder a mailbox. Calendar delegation gives
someone else in the same organization
permissions to manage the mailbox
owner's calendar.

Updated message Update A message or its properties was


changed.

User signed in to mailbox MailboxLogin The user signed in to their mailbox.

(none) UpdateInboxRules An inbox rule has been added,


removed, or changed. Inbox rules are
used to process messages in the user's
Inbox based on the specified
conditions and take actions when the
conditions of a rule are met, such as
moving a message to a specified folder
or deleting a message.
To return entries for inbox rule
activities, you have to select Show
results for all activities in the
Activities list. Use the date range
boxes and the Users list to narrow the
search results.

Sway activities
The following table lists user and admin activities in Sway. Sway is an Office 365 app that helps users gather,
format, and share ideas, stories, and presentations on an interactive, web-based canvas. For more information,
see Frequently asked questions about Sway - Admin Help.
FRIENDLY NAME OPERATION DESCRIPTION

Changed Sway share level SwayChangeShareLevel User changes the share level of a Sway.
This event captures the user changing
the scope of sharing associated with a
Sway; for example, public versus inside
the organization.

Created Sway SwayCreate User creates a Sway.

Deleted Sway SwayDelete User deletes a Sway.

Disabled Sway duplication SwayDisableDuplication User disables duplication of a Sway.

Duplicated Sway SwayDuplicate User duplicates a Sway.

Edited Sway SwayEdit User edits a Sway.

Enabled Sway duplication EnableDuplication User enables duplication of a Sway; the


ability for a user to enable duplication
of a Sway is enabled by default.

Revoked Sway sharing SwayRevokeShare User stops sharing a Sway by revoking


access to it. Revoking access changes
the links associated with a Sway.

Shared Sway SwayShare User intends to share a Sway. This


event captures the user action of
clicking a specific share destination
within the Sway share menu. The event
doesn't indicate whether the user
completed the share action.

Turned off external sharing of Sway SwayExternalSharingOff Administrator disables external Sway
sharing for the entire organization by
using the Office 365 admin center.

Turned on external sharing of Sway SwayExternalSharingOn Administrator enables external Sway


sharing for the entire organization by
using the Office 365 admin center.

Turned off Sway service SwayServiceOff Administrator disables Sway for the
entire organization by using the Office
365 admin center.

Turned on Sway service SwayServiceOn Administrator enables Sway for the


entire organization by using the Office
365 admin center (Sway service is
enabled by default).

Viewed Sway SwayView User views a Sway.

User administration activities


The following table lists user administration activities that are logged when an admin adds or changes a user
account by using the Office 365 admin center or the Azure management portal.
ACTIVITY OPERATION DESCRIPTION

Added user Add user An Office 365 user account was


created.

Changed user license Change user license The license assigned to a user what
changed. To see what licenses were
changes, see the corresponding
Updated user activity.

Changed user password Change user password Administrator changed the password
the password for a user.

Deleted user Delete user An Office 365 user account was


deleted.

Reset user password Reset user password Administrator reset the password for a
user.

Set property that forces user to Set force change user password Administrator set the property that
change password forces a user to change their password
the next time the user sign in to Office
365.

Set license properties Set license properties Administrator modifies the properties
of a licensed assigned to a user.

Updated user Update user Administrator changes one or more


properties of a user account. For a list
of the user properties that can be
updated, see the "Update user
attributes" section in Azure Active
Directory Audit Report Events.

Azure AD group administration activities


The following table lists group administration activities that are logged when an admin or a user creates or
changes an Office 365 group or when an admin creates a security group by using the Office 365 admin center
or the Azure management portal. For more information about groups in Office 365, see View, create, and delete
Groups in the Office 365 admin center.

FRIENDLY NAME OPERATION DESCRIPTION

Added group Add group A group was created.

Added member to group Add member to group A member was added to a group.

Deleted group Delete group A group was deleted.

Removed member from group Remove member from group A member was removed from a group.

Updated group Update group A property of a group was changed.

Application administration activities


The following table lists application admin activities that are logged when an admin adds or changes an
application that's registered in Azure AD. Any application that relies on Azure AD for authentication must be
registered in the directory.

FRIENDLY NAME OPERATION DESCRIPTION

Added delegation entry Add delegation entry A authentication permission was


created/granted to an application in
Azure AD.

Added service principal Add service principal An application was registered in Azure
AD. An application is represented by a
service principal in the directory.

Added credentials to a service principal Add service principal credentials Credentials were added to a service
principal in Azure AD. A service
principle represents an application in
the directory.

Removed delegation entry Remove delegation entry A authentication permission was


removed from an application in Azure
AD.

Removed a service principal from the Remove service principal An application was
directory deleted/unregistered from Azure AD.
An application is represented by a
service principal in the directory.

Removed credentials from a service Remove service principal credentials Credentials were removed from a
principal service principal in Azure AD. A service
principle represents an application in
the directory.

Set delegation entry Set delegation entry An authentication permission was


updated for an application in Azure
AD.

Role administration activities


The following table lists Azure AD role administration activities that are logged when an admin manages admin
roles in the Office 365 admin center or in the Azure management portal.

FRIENDLY NAME OPERATION DESCRIPTION

Add member to Role Add role member to role Added a user to an admin role in
Office 365.

Removed a user from a directory role Remove role member from role Removed a user to from an admin role
in Office 365.

Set company contact information Set company contact information Updated the company-level contact
preferences for your Office 365
organization. This includes email
addresses for subscription-related
email sent by Office 365, as well as
technical notifications about Office 365
services.

Directory administration activities


The following table lists Azure AD directory and domain related activities that are logged when an administrator
manages their Office 365 organization in the Office 365 admin center or in the Azure management portal.

FRIENDLY NAME OPERATION DESCRIPTION

Added domain to company Add domain to company Added a domain to your Office 365
organization.

Added a partner to the directory Add partner to company Added a partner (delegated
administrator) to your Office 365
organization.

Removed domain from company Remove domain from company Removed a domain from your Office
365 organization.

Removed a partner from the directory Remove partner from company Removed a partner (delegated
administrator) from your Office 365
organization.

Set company information Set company information Updated the company information for
your Office 365 organization. This
includes email addresses for
subscription-related email sent by
Office 365, as well as technical
notifications about Office 365 services.

Set domain authentication Set domain authentication Changed the domain authentication
setting for your Office 365
organization.

Updated the federation settings for a Set federation settings on domain Changed the federation (external
domain sharing) settings for your Office 365
organization.

Set password policy Set password policy Changed the length and character
constraints for user passwords in your
Office 365 organization.

Turned on Azure AD sync Set DirSyncEnabled flag on company Set the property that enables a
directory for Azure AD Sync.

Updated domain Update domain Updated the settings of a domain in


your Office 365 organization.

Verified domain Verify domain Verified that your organization is the


owner of a domain.

Verified email verified domain Verify email verified domain Used email verification to verify that
your organization is the owner of a
domain.

eDiscovery activities
Content Search and eDiscovery-related activities that are performed in Office 365 Security & Compliance
Center or by running the corresponding Windows PowerShell cmdlets are logged in the Office 365 audit log.
This includes the following activities:
Creating and managing eDiscovery cases
Creating, starting, and editing Content Searches
Performing Content Search actions, such as previewing, exporting, and deleting search results
Configuring permissions filtering for Content Search
Managing the eDiscovery Administrator role
For a list and detailed description of the eDiscovery activities that are logged, see Search for eDiscovery
activities in the Office 365 audit log.

NOTE
It takes up to 30 minutes for events that result from the activities listed under eDiscovery activities in the Activities
drop-down list to be displayed in the search results. Conversely, it takes up to 24 hours for the corresponding events
from eDiscovery cmdlet activities to appear in the search results.

Power BI activities
You can search the audit log for activities in Power BI. For information about Power BI activities, see the
"Activities audited by Power Power BI" section in Using auditing within your organization.
Note that audit logging for Power BI isn't enabled by default. To search for Power BI activities in the Office 365
audit log, you have to enable auditing in the Power BI admin portal. For instructions, see the "Audit logs" section
in Power BI admin portal.
Microsoft Teams activities
The following table lists the user and admin activities in Microsoft Teams that are logged in the Office 365 audit
log. Microsoft Teams is a chat-centered workspace in Office 365. It brings a team's conversations, meetings, files
and notes together into a single place. For more information and links to help topics, see:
Frequently asked questions about Microsoft Teams - Admin Help
Microsoft Teams help

FRIENDLY NAME OPERATION DESCRIPTION

Added bot to team BotAddedToTeam A user adds a bot to a team.

Added channel ChannelAdded A user adds a channel to a team.

Added connector ConnectorAdded A user adds a connector to a channel.

Added members to team MemberAdded A team owner adds member(s) to a


team.

Added tab TabAdded A user adds a tab to a channel.


FRIENDLY NAME OPERATION DESCRIPTION

Changed channel setting ChannelSettingChanged The ChannelSettingChanged operation


is logged when the following activities
are performed by a team member. For
each of these activities, a description of
the setting that was changed (shown
in parenthesis below) is displayed in
the Item column in the audit log
search results.

- Changes the name of a team channel


( Channel name).

- Changes the description of a team


channel ( Channel description).

Changed organization setting TeamsTenantSettingChanged The TeamsTenantSettingChanged


operation is logged when the following
activities are performed by a global
admin (using the Office 365 admin
center); note that these activities affect
organization-wide Microsoft Teams
settings. For more information, see
Administrator settings for Microsoft
Teams.
For each of these activities, a
description of the setting that was
changed (shown in parenthesis below)
is displayed in the Item column in the
audit log search results.

- Enables or disables Microsoft Teams


for the organization ( Microsoft
Teams).

- Enables or disables interoperability


between Microsoft Teams and Skype
for Business for the organization (
Skype for Business
interoperability).

- Enables or disables the organizational


chart view in Microsoft Teams clients (
Org chart view).

- Enables or disables the ability for


team members to schedule private
meetings ( Private meeting
scheduling).

- Enables or disables the ability for


team members to schedule channel
meetings ( Channel meeting
scheduling).

- Enables or disables video calling in


Teams meetings ( Video for Skype
meetings).

- Enables or disables screen sharing in


Microsoft Teams meetups for the
organization ( Screen sharing for
Skype meetings).
FRIENDLY NAME OPERATION
-DESCRIPTION
Enables or disables that ability to add
animated images (called Giphys) to
Teams conversations ( Animated
images).

- Changes the content rating setting


for the organization ( Content rating).
The content rating restricts the type of
animated image that can be displayed
in conversations.

- Enables or disables the ability for


team members to add customizable
images (called custom memes) from
the Internet to team conversations (
Customizable images from the
Internet).

- Enables or disables the ability for


team members to add editable images
(called stickers) to team conversations (
Editable images).

- Enables or disables that ability for


team members to use bots in
Microsoft Teams chats and channels (
Org-wide bots).

- Enables specific bots for Microsoft


Teams; this doesn't include the T-Bot,
which is Teams help bot that's available
when bots are enabled for the
organization ( Individual bots).

- Enables or disables the ability for


team members to add extensions or
tabs ( Extensions or tabs).

- Enables or disables the side-loading


of proprietary Bots for Microsoft
Teams ( Side loading of Bots).

- Enables or disables the ability for


users to send email messages to a
Microsoft Teams channel ( Channel
email).

Changed role of members in team MemberRoleChanged A team owner changes the role of
member(s) in a team. The following
values indicate the Role type assigned
to the user.

1 - Indicates the Owner role.


2 - Indicates the Member role.
3 - Indicates the Guest role.
The Members property also includes
the name of your organization, and
the member's email address.
FRIENDLY NAME OPERATION DESCRIPTION

Changed team setting TeamSettingChanged The TeamSettingChanged operation is


logged when the following activities
are performed by a team owner. For
each of these activities, a description of
the setting that was changed (shown
in parenthesis below) is displayed in
the Item column in the audit log
search results.

- Changes the access type for a team.


Teams can be set as Private or Public (
Team access type). When a team is
private (the default setting), users can
access the team only by invitation.
When a team is public, it's discoverable
by anyone.

- Changes the information


classification of a team ( Team
classification).
For example, team data can be
classified as high business impact,
medium business impact, or low
business impact.

- Changes the name of a team ( Team


name).

- Changes the team description (


Team description).

- Changes made to any of the team


settings. A team owner can access
these settings in a Teams client by
right-clicking a team, clicking Manage
team, and then clicking the Settings
tab. For these activities, the name of
the setting that was changed is
displayed in the Item column in the
audit log search results.

Created team TeamCreated A user creates a new team.

Deleted channel ChannelDeleted A user deletes a channel from a team.

Deleted team TeamDeleted A team owner deletes a team.

Removed bot from team BotRemovedFromTeam A user removes a bot from a team.

Removed connector ConnectorRemoved A user removes connector from a


channel.

Removed members from team MemberRemoved A team owner removes member(s)


from a team.

Removed tab TabRemoved A user removes a tab from a channel.


FRIENDLY NAME OPERATION DESCRIPTION

Updated connector ConnectorUpdated A user modified a connector in a


channel.

Updated tab TabUpdated A user modified a tab in a channel.

User signed in to Teams TeamsSessionStarted A user signs in to a Microsoft Teams


client.

Yammer activities
The following table lists the user and admin activities in Yammer that are logged in the Office 365 audit log. To
return Yammer-related activities from the Office 365 audit log, you have to select Show results for all
activities in the Activities list. Use the date range boxes and the Users list to narrow the search results.

FRIENDLY NAME OPERATION DESCRIPTION

Changed data retention policy SoftDeleteSettingsUpdated Verified admin updates the setting for
the network data retention policy to
either Hard Delete or Soft Delete. Only
verified admins can perform this
operation.

Changed network configuration NetworkConfigurationUpdated Network or verified admin changes the


Yammer network's configuration. This
includes setting the interval for
exporting data and enabling chat.

Changed network profile settings ProcessProfileFields Network or verified admin changes the
information that appears on member
profiles for network users network.

Changed private content mode SupervisorAdminToggled Verified admin turns Private Content
Mode on or off. This mode lets an
admin view posts in private groups
and view private messages between
individual users (or groups of users).
Only verified admins only can perform
this operation.

Changed security configuration NetworkSecurityConfigurationUpdated Verified admin updates the Yammer


network's security configuration. This
includes setting password expiration
policies and restrictions on IP
addresses. Only verified admins can
perform this operation.

Created file FileCreated User uploads a file.

Created group GroupCreation User creates a new group.

Deleted group GroupDeletion A group is deleted from Yammer.

Deleted message MessageDeleted User deletes a message.

Downloaded file FileDownloaded User downloads a file.


FRIENDLY NAME OPERATION DESCRIPTION

Exported data DataExport Verified admin exports Yammer


network data. Only verified admins can
perform this operation.

Shared file FileShared User shares a file with another user.

Suspended network user NetworkUserSuspended Network or verified admin suspends


(deactivates) a user from Yammer.

Suspended user UserSuspension User account is suspended


(deactivated).

Updated file description FileUpdateDescription User changes the description of a file.

Updated file name FileUpdateName User changes the name of a file.

Viewed file FileVisited User views a file.

Microsoft Flow
You can search the audit log for activities in Microsoft Flow. These activities include creating, editing and
deleting flows, and changing flow permissions. For information about auditing for Flow activities, see the blog
Microsoft Flow audit events now available in Office 365 Security & Compliance Center.
Microsoft Stream
You can search the audit log for activities in Microsoft Stream. These activities include video activities performed
by users, group channel activities, and admin activities such as managing users, managing organization settings,
and exporting reports. For a description of these activities, see the "Activities logged in Microsoft Stream"
section in Audit Logs in Microsoft Stream.
Exchange admin audit log
Exchange administrator audit logging—which is enabled by default in Office 365—logs an event in the Office
365 audit log when an administrator (or a user who has been assigned administrative permissions) makes a
change in your Exchange Online organization. Changes made by using the Exchange admin center or by
running a cmdlet in Windows PowerShell are logged in the Exchange admin audit log. For more detailed
information about admin audit logging in Exchange, see Administrator audit logging.
Here are some tips for searching for activity in the Exchange admin audit log:
To return entries from the Exchange admin audit log, you have to select Show results for all activities
in the Activities list. Use the date range boxes and the Users list to narrow the search results for cmdlets
run by a specific Exchange administrator within a specific date range.
To display events from the Exchange admin audit log, filter the search results and type a - (dash) in the
Activity filter box. This will display cmdlet names, which are displayed in the Activity column for
Exchange admin events. Then you can sort the cmdlet names in alphabetical order.
To get information about what cmdlet was run, which parameters and parameter values were used, and
what objects were affected, you will have to export the search results and select the Download all
results option.
You can also view events in the Exchange admin audit log by using the Exchange admin center. For
instructions, see View the administrator audit log.

Frequently asked questions


Where can I find about the features offered by the auditing service in Office 365?
For more information about the auditing and reporting features available in Office 365, see Auditing and
Reporting in Office 365.
What are different Office 365 Services that are currently audited?
The most used Office 365 Services like Exchange Online, SharePoint, OneDrive, Azure Active Directory,
Microsoft Teams, CRM, Advanced Threat Protection, and Data Loss Prevention are audited. See the Intro
section in this article for a complete list.
What activities are audited by auditing service in Office 365?
See the Audited activities section in this article for a list and description of the activities that are audited in Office
365.
How long does it take for an auditing record to be available after an event has occurred?
Most auditing data is available within 30 minutes but it may take up to 24 hours after an event occurs for the
corresponding audit log entry to be displayed in the search results. See the table in the Before you begin section
of this article that shows the time it takes for events in the different Office 365 services to be available.
How long are the audit records retained for?
As previously explained, the retention period for audit records depends on your organization's Office 365
subscription.
Office 365 E3 - Audit records are retained for 90 days.
Office 365 E5 - Audit records are retained for 365 days (one year). Retaining audit records for one year
is also available for organizations that have an E3 subscription and an Office 365 Advanced Compliance
add-on subscription.
NOTE
As previously explained, the one-year retention period for audit records for E5 organizations (or E3 organizations
that have Advanced Compliance add-on licenses) is currently available only as part of a private preview program.
To enroll in this preview program, please file a request with Microsoft Support and include the following as the
description of what you need help with: "Long-term Office 365 audit log private preview".

Also note that the duration of the retention period for audit records is based on per-user licensing. For example,
if a user in your organization is assigned an Office 365 E3 license, then the audit records for activities performed
by that user are retained for 90 days. If a different user is assigned an Office 365 E5 license, their audit records
are retained for one year.
Can I access the auditing data programmatically?
Yes. The Office 365 Management Activity API is used to fetch the audit logs programmatically. To get started,
see Get started with Office 365 Management APIs.
Are there other ways to get auditing logs other than suing the Office 365 Security & Compliance
Center or the Office 365 Management Activity API?
No. These are the only two ways to get data from the Office 365 auditing service.
Do I need to individually enable auditing in each service that I want to capture audit logs for?
In most Office 365 services, auditing is enabled by default after you initially turn on auditing for your Office 365
organization (as described in the Before you begin section in this article). However, you have to enable mailbox
auditing in Exchange Online for each mailbox that you want to audit. We are working on enabling mailbox
auditing by default for all mailboxes in an Office 365 organization. For more information, see "Exchange
mailbox auditing will be enabled by default" in the Microsoft Security, Privacy, and Compliance blog.
Does the Office 365 auditing service support de-duplication of records?
No. The auditing service pipeline is near real time, and therefore can't support de-duplication.
Does Office 365 auditing data flow across geographies?
No. We currently have auditing pipeline deployments in the NA (North America), EMEA (Europe, Middle east
and Africa) and APAC (Asia Pacific) regions. However, we may flow the data across these regions for load-
balancing and only during live-site issues. When we do perform these activities, the data in transit is encrypted.
Is auditing data encrypted?
Auditing data is stored in Exchange mailboxes (data at rest) in the same region where the auditing pipeline is
deployed. This data is not encrypted. However, data in transit is always encrypted.
Turn Office 365 audit log search on or off
8/21/2018 • 3 minutes to read • Edit Online

You (or another admin) must turn on audit logging before you can start searching the Office 365 audit log.
When audit log search in the Office 365 Security & Compliance Center is turned on, user and admin activity
from your organization is recorded in the audit log and retained for 90 days. However, your organization might
not want to record and retain audit log data. Or you might be using a third-party security information and event
management (SIEM ) application to access your auditing data. In those cases, a global admin can turn off audit
log search in Office 365.

Before you begin


You have to be assigned the Audit Logs role in Exchange Online to turn audit log search on or off in your
Office 365 organization. By default, this role is assigned to the Compliance Management and
Organization Management role groups on the Permissions page in the Exchange admin center. Global
admins in Office 365 are members of the Organization Management role group in Exchange Online.

IMPORTANT
Users have to be assigned permissions in Exchange Online to turn audit log search on or off. If you assign users the
Audit Logs role on the Permissions page in the Security & Compliance Center, they won't be able to turn audit log
search on or off. This is because the underlying cmdlet is an Exchange Online cmdlet.

If you turn off audit log search in Office 365, you can still use the Office 365 Management Activity API to
access auditing data for your organization. Turning off audit log search by following the steps in this
article means that no results will be returned when you search the audit log using the Security &
Compliance Center or when you run the Search-UnifiedAuditLog cmdlet in Exchange Online
PowerShell. However, if you've authorized any application to access your organization's auditing data via
the Office 365 Management Activity API , those applications will continue to work.
For step-by-step instructions on searching the Office 365 audit log, see Search the audit log in the Office
365 Security & Compliance Center.

Turn on audit log search


You can use the Security & Compliance Center or PowerShell to turn on audit log search in Office 365. It might
take several hours after you turn on audit log search before you can return results when you search the audit log.
You have to be assigned the Audit Logs role in Exchange Online to turn on audit log search.
Use the Security & Compliance Center to turn on audit log search
1. In the Security & Compliance Center, go to Search & investigation > Audit log search.
2. Click Start recording user and admin activities.
A dialog box is displayed saying that user and admin activity in your organization will be recorded to the
Office 365 audit log and available to view in a report.
3. Click Turn on.
A message is displayed that says the audit log is being prepared and that you can run a search in a couple
of hours after the preparation is complete.
Use PowerShell to turn on audit log search
1. Connect to Exchange Online PowerShell
2. Run the following PowerShell command to turn on audit log search in Office 365.

Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true

A message is displayed saying that it might take up to 60 minutes for the change to take effect.

Turn off audit log search


You have to use remote PowerShell connected to your Exchange Online organization to turn off audit log search.
Similar to turning on audit log search, you have to be assigned the Audit Logs role in Exchange Online to turn
off audit log search.
1. Connect to Exchange Online PowerShell
2. Run the following PowerShell command to turn off audit log search in Office 365.
Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $false

3. After a while, verify that audit log search is turned off (disabled). There are two ways to do this:
In PowerShell, run the following command:

Get-AdminAuditLogConfig | FL UnifiedAuditLogIngestionEnabled

The value of False for the UnifiedAuditLogIngestionEnabled property indicates that audit log
search is turned off.
In the Security & Compliance Center, go to Search & investigation > Audit log search, and
then click Search.
A message is displayed saying that audit log search isn't turned on.
Enable mailbox auditing in Office 365
10/18/2018 • 8 minutes to read • Edit Online

In Office 365, you can turn on mailbox audit logging to log mailbox access by mailbox owners, delegates, and
administrators. By default, mailbox auditing in Office 365 isn't turned on. That means mailbox auditing events
won't appear in the results when you search the Office 365 audit log for mailbox activity. But after you turn on
mailbox audit logging for a user mailbox, you can search the audit log for mailbox activity. Additionally, when
mailbox audit logging is turned on, some actions performed by administrators, delegates, and owners are logged
by default. To log (and then search for) additional actions, see Step 3.

Before you begin


You have to use Exchange Online PowerShell to enable mailbox audit logging. You can't use the Office 365
Security & Compliance Center or the Exchange admin center.
You can't enable mailbox audit logging for the mailbox that's associated with an Office 365 Group or a
team in Microsoft Teams.
An administrator who has been assigned the Full Access permission to a user's mailbox is considered a
delegate user.

Step 1: Connect to Exchange Online PowerShell


1. On your local computer, open Windows PowerShell and run the following command.

$UserCredential = Get-Credential

2. In the Windows PowerShell Credential Request dialog box, type user name and password for an Office
365 global admin account, and then click OK.
3. Run the following command:

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri


https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -
AllowRedirection

4. Run the following command.

Import-PSSession $Session

5. To verify that you're connected to your Exchange Online organization, run the following command to get a
list of all the mailboxes in your organization.

Get-Mailbox

For more information or if you have problems connecting to your Exchange Online organization, see Connect to
Exchange Online using remote PowerShell.
Step 2: Enable mailbox audit logging
After you connect to your Exchange Online organization, use PowerShell to enable mailbox audit logging for a
mailbox. Alternatively, you can enable mailbox auditing for all mailboxes in your organization.
This example enables mailbox audit logging for Pilar Pinilla's mailbox.

Set-Mailbox -Identity "Pilar Pinilla" -AuditEnabled $true

This example enables mailbox audit logging for all user mailboxes in your organization.

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | Set-Mailbox -AuditEnabled


$true

Step 3: Specify owner actions to audit


When you enable auditing for a mailbox, some actions performed by the mailbox owner are audited by default.
You have to specify other owner actions to audit. See the table in the Mailbox auditing actions section for a list and
description of owner actions that are logged by default and the other actions that can be audited.
This example adds the MailboxLogin and HardDelete owner actions to mailbox auditing for Pilar Pinilla's
mailbox. This example assumes that mailbox auditing has already been enabled for this mailbox.

Set-Mailbox "Pilar Pinilla" -AuditOwner @{Add="MailboxLogin","HardDelete"}

This example enables mailbox audit logging for Don Hall's mailbox and specifies that only the MailboxLogin
action performed by the mailbox owner will be logged. Note that this example overwrites the default
UpdateFolderPermissions action.

Set-Mailbox "Don Hall" -AuditEnabled $true -AuditOwner MailboxLogin

This example adds the MailboxLogin, HardDelete, and SoftDelete owner actions to all mailboxes in the
organization. This example assumes that mailbox auditing has already been enabled for all mailboxes.

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | Set-Mailbox -AuditOwner


@{Add="MailboxLogin","HardDelete","SoftDelete"}

How do you know this worked?


To verify that you have successfully enabled mailbox audit logging for a mailbox, use the Get-Mailbox cmdlet to
retrieve the auditing settings for that mailbox.
This example retrieves the auditing settings for Pilar Pinilla.

Get-Mailbox "Pilar Pinilla"| FL Audit*

This example retrieves the auditing settings for all user mailboxes in your organization.

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | FL Name,Audit*


A value of True for the AuditEnabled property verifies that mailbox audit logging is enabled.

Mailbox auditing actions


The following table lists the actions that can be logged by mailbox audit logging. The table includes which action
can be logged for the different user logon types. In the table, a No indicates that an action can't be logged for that
logon type. An asterisk ( * ) indicates that the action is logged by default when mailbox audit logging is enabled
for the mailbox.

ACTION DESCRIPTION ADMIN DELEGATE*** OWNER

Copy A message was Yes No No


copied to another
folder.

Create An item is created in Yes* Yes* Yes


the Calendar,
Contacts, Notes, or
Tasks folder in the
mailbox; for example,
a new meeting
request is created.
Note that creating,
sending, or receiving
a message isn't
audited. Also, creating
a mailbox folder is not
audited.

FolderBind A mailbox folder was Yes Yes** No


accessed. This action
is also logged when
the admin or delegate
opens the mailbox.

HardDelete A message was Yes* Yes* Yes


purged from the
Recoverable Items
folder.

MailboxLogin The user signed in to No No Yes


their mailbox.

MessageBind A message was Yes No No


viewed in the preview
pane or opened.

Move A message was Yes Yes Yes


moved to another
folder.

MoveToDeletedIte A message was Yes* Yes* Yes


ms deleted and moved to
the Deleted Items
folder.
ACTION DESCRIPTION ADMIN DELEGATE*** OWNER

SendAs A message was sent Yes* Yes* No


using the SendAs
permission. This
means another user
sent the message as
though it came from
the mailbox owner.

SendOnBehalf A message was sent Yes* Yes* No


using the
SendOnBehalf
permission. This
means another user
sent the message on
behalf of the mailbox
owner. The message
indicates to the
recipient who the
message was sent on
behalf of and who
actually sent the
message.

SoftDelete A message was Yes* Yes* Yes


permanently deleted
or deleted from the
Deleted Items folder.
Soft-deleted items are
moved to the
Recoverable Items
folder.

Update A message or its Yes* Yes* Yes


properties was
changed.

UpdateCalendarDel A calendar delegation Yes* No Yes*


egation was assigned to a
mailbox. Calendar
delegation gives
someone else in the
same organization
permissions to
manage the mailbox
owner's calendar.

UpdateFolderPermi A folder permission Yes* Yes* Yes*


ssions was changed. Folder
permissions control
which users in your
organization can
access folders in a
mailbox and the
messages located in
those folders.
ACTION DESCRIPTION ADMIN DELEGATE*** OWNER

UpdateInboxRules An inbox rule has Yes* Yes* Yes*


been added,
removed, or changed.
Inbox rules are used
to process messages
in the user's Inbox
based on the
specified conditions
and take actions
when the conditions
of a rule are met,
such as moving a
message to a
specified folder or
deleting a message.

NOTE
*Audited by default if auditing is enabled for a mailbox.

**Entries for folder bind actions performed by delegates are consolidated. One log entry is generated for individual folder
access within a time span of 24 hours.

*** An administrator who has been assigned the Full Access permission to a user's mailbox is considered a delegate user.

If you no longer require certain types of mailbox actions to be audited, you should modify the mailbox's audit
logging configuration to disable those actions. Existing log entries aren't purged until the retention age limit for
audit log entries is reached. For more information about the retention age for audit log entries, see the "Before
you begin" section in Search the audit log in the Office 365 Security & Compliance Center.

More info
Use the Office 365 audit log to search for mailbox activity that have been logged. You can search for
activity for a specific user mailbox. The following screenshot shows a list of mailbox activities that you can
search for in the Office 365 audit log. Note that these activities are the same actions that are described in
the "Mailbox auditing actions" section in this topic.
The following table describes each mailbox activity that you can search for and shows the corresponding
mailbox auditing action.

ACTIVITY IN THE AUDIT LOG MAILBOX AUDITING ACTION

Created mailbox item Create

Copied messages to another folder Copy

User signed in to mailbox MailboxLogin

Sent message using Send On Behalf permissions SendOnBehalf

Purged messages from the mailbox HardDelete

Moved messages to Deleted Items folder MoveToDeletedItems

Moved messages to another folder Move

Sent message using Send As permissions SendAs

Updated message Update

Deleted messages from Deleted Items folder SoftDelete

Added permissions to folder UpdateFolderPermissions

Modified permissions of folder UpdateFolderPermissions

Removed permissions from folder UpdateFolderPermissions

Added or removed user with delegate access to calendar UpdateCalendarDelegation


folder

Note that the Added delegate mailbox permissions and Removed delegate mailbox permissions
activities shown in the previous screenshot aren't related to mailbox auditing actions. They indicate whether
an administrator assigned or removed the FullAccess mailbox permission.
For information about the Office 365 audit log, see Search the audit log in the Office 365 Security &
Compliance Center.
Mailboxes are considered to be accessed by an administrator only in the following scenarios:
In-Place eDiscovery in Exchange Online or Content Search in Office 365 is used to search a mailbox.
Microsoft Exchange Server MAPI Editor is used to access the mailbox.
When you enable audit logging for a mailbox, you can also specify which user actions (for example,
accessing, moving, or deleting a message) will be logged for each logon type (admin, delegate, or owner).
To disable mailbox audit logging, run the following command:

Set-Mailbox -Identity <identity of mailbox> -AuditEnabled $false

The actions that are audited for each type of user aren't displayed when you run the Get-Mailbox cmdlet.
But you can run the following commands to display all the audited actions for a specific user logon type.

Get-Mailbox <identity of mailbox> | Select-Object -ExpandProperty AuditAdmin

Get-Mailbox <identity of mailbox> | Select-Object -ExpandProperty AuditDelegate

Get-Mailbox <identity of mailbox> | Select-Object -ExpandProperty AuditOwner

You can also export a mailbox audit log and specify the entries to include for one or more users. Each entry
in the report and the audit log includes information about who performed the action and when, the action
performed , and whether the action was successful. For more information, see Export mailbox audit logs.
Detailed properties in the Office 365 audit log
8/21/2018 • 11 minutes to read • Edit Online

When you export the results of an audit log search from the Office 365 Security & Compliance Center, you have
the option to download all the results that meet your search criteria. You do this by selecting Export results >
Download all results on the Audit log search page in the Security & Compliance Center. For more
information, see Search the audit log in the Office 365 Security & Compliance Center.
When your export all results for an audit log search, the raw data from the Office 365 unified audit log is copied to
a comma separated value (CSV ) file this is downloaded to your local computer. This file contains additional
information from the audit log entry in a column named Detail. This column contains a multi-value property for
multiple properties from the audit log record. Each of the property:value pairs in this multi-value property are
separated by a comma.
The following table describes the properties that are included—depending on the Office 365 service in which an
event occurs—in the multi-property Detail column. The Office 365 service that has this property column
indicates the service and type of activity (user or admin) that includes the property. For more detailed information
about these properties or about properties that might not be listed in this topic, see Office 365 Management
Activity API Schema.

TIP
You can use the Power Query in Excel to split this column into multiple columns so that each property will have its own
column. This will let you sort and filter on one or more of these properties. To learn how to do this, see the "Split a column
by delimiter" section in Split a column of text (Power Query).

OFFICE 365 SERVICE THAT HAS THIS


PROPERTY DESCRIPTION PROPERTY

Actor The user or service account that Azure Active Directory


performed the action.

AddOnName The name of an add-on that was Microsoft Teams


added, removed, or updated in a team.
The type of add-ons in Microsoft Teams
are a bot, a connector, or a tab.

AddOnType The type of an add-on that was added, Microsoft Teams


removed, or updated in a team. The
following values indicate the type of
add-on.
1 - Indicates a bot.
2 - Indicates a connector.
3 - Indicates a tab.

AzureActiveDirectoryEventType The type of Azure Active Directory Azure Active Directory


event. The following values indicate the
type of event.
0 - Indicates an account login event.
1 - Indicates an Azure application
security event.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

ChannelGuid The ID of a Microsoft Teams channel. Microsoft Teams


The team that the channel is located in
is identified by the TeamName and
TeamGuid properties.

ChannelName The name of a Microsoft Teams Microsoft Teams


channel. The team that the channel is
located in is identified by the
TeamName and TeamGuid properties.

Client The client device, the device OS, and Azure Active Directory
the device browser used for the login
event (for example, Nokia Lumia 920;
Windows Phone 8; IE Mobile 11).

ClientInfoString Information about the email client that Exchange (mailbox activity)
was used to perform the operation,
such as a browser version, Outlook
version, and mobile device information

ClientIP The IP address of the device that was Exchange and Azure Active Directory
used when the activity was logged. The
IP address is displayed in either an IPv4
or IPv6 address format.

ClientIPAddress Same as ClientIP. SharePoint

CreationTime The date and time in Coordinated All


Universal Time (UTC) when the user
performed the activity.

DestinationFileExtension The file extension of a file that is copied SharePoint


or moved. This property is displayed
only for the FileCopied and FileMoved
user activities.

DestinationFileName The name of the file is copied or moved. SharePoint


This property is displayed only for the
FileCopied and FileMoved actions.

DestinationRelativeUrl The URL of the destination folder where SharePoint


a file is copied or moved. The
combination of the values for the
SiteURL, the DestinationRelativeURL,
and the DestinationFileName
properties is the same as the value for
the ObjectID property, which is the full
path name for the file that was copied.
This property is displayed only for the
FileCopied and FileMoved user
activities.

EventSource Identifies that an event occurred in SharePoint


SharePoint. Possible values are
SharePoint and ObjectModel.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

ExternalAccess For Exchange admin activity, specifies Exchange


whether the cmdlet was run by a user
in your organization, by Microsoft
datacenter personnel or a datacenter
service account, or by a delegated
administrator. The value False indicates
that the cmdlet was run by someone in
your organization. The value True
indicates that the cmdlet was run by
datacenter personnel, a datacenter
service account, or a delegated
administrator.
For Exchange mailbox activity, specifies
whether a mailbox was accessed by a
user outside your organization.

ExtendedProperties The extended properties for an the Azure Active Directory


Azure Active Directory event.

ID The ID of the report entry. The ID All


uniquely identifies the report entry.

InternalLogonType Reserved for internal use. Exchange (mailbox activity)

ItemType The type of object that was accessed or SharePoint


modified. Possible values include File,
Folder, Web, Site, Tenant, and
DocumentLibrary.

LoginStatus Identifies login failures that might have Azure Active Directory
occurred.

LogonType The type of mailbox access. The Exchange (mailbox activity)


following values indicate the type of
user who accessed the mailbox.

0 - Indicates a mailbox owner.


1 - Indicates an administrator.
2 - Indicates a delegate.
3 - Indicates the transport service in
the Microsoft datacenter.
4 - ndicates a service account in the
Microsoft datacenter.
6 - Indicates a delegated administrator.

MailboxGuid The Exchange GUID of the mailbox that Exchange (mailbox activity)
was accessed.

MailboxOwnerUPN The email address of the person who Exchange (mailbox activity)
owns the mailbox that was accessed.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

Members Lists the users that have been added or Microsoft Teams
removed from a team. The following
values indicate the Role type assigned
to the user.

1 - Indicates the Owner role.


2 - Indicates the Member role.
3 - Indicates the Guest role.

The Members property also includes


the name of your organization, and the
member's email address.

ModifiedProperties (Name, NewValue, The property is included for admin All (admin activity)
OldValue) events, such as adding a user as a
member of a site or a site collection
admin group. The property includes the
name of the property that was
modified (for example, the Site Admin
group) the new value of the modified
property (such the user who was added
as a site admin, and the previous value
of the modified object.

ObjectID For Exchange admin audit logging, the All


name of the object that was modified
by the cmdlet.
For SharePoint activity, the full URL
path name of the file or folder accessed
by a user.
For Azure AD activity, the name of the
user account that was modified.

Operation The name of the user or admin activity. All


The value of this property corresponds
to the value that was selected in the
Activities drop down list. If Show
results for all activities was selected,
the report will included entries for all
user and admin activities for all services.
For a description of the
operations/activities that are logged in
the Office 365 audit log, see the
Audited activities tab in Search the
audit log in the Office 365 Security &
Compliance Center.
For Exchange admin activity, this
property identifies the name of the
cmdlet that was run.

OrganizationID The GUID for your Office 365 All


organization.

Path The name of the mailbox folder where Exchange (mailbox activity)
the message that was accessed is
located. This property also identifies the
folder a where a message is created in
or copied/moved to.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

Parameters For Exchange admin activity, the name Exchange (admin activity)
and value for all parameters that were
used with the cmdlet that is identified
in the Operation property.

RecordType The type of operation indicated by the All


record. The following values indicate the
record type.

1 - Indicates a record from the


Exchange admin audit log.
2 - Indicates a record from the
Exchange mailbox audit log for an
operation performed on a singled
mailbox item.
3 - Also indicates a record from the
Exchange mailbox audit log. This record
type indicates the operation was
performed on multiple items in the
source mailbox (such as moving
multiple items to the Deleted Items
folder or permanently deleting multiple
items).
4 - Indicates a site admin operation in
SharePoint, such as an administrator or
user assigning permissions to a site.
6 - Indicates a file or folder-related
operation in SharePoint, such as a user
viewing or modifying a file.
8 - Indicates an admin operation
performed in Azure Active Directory.
9 - Indicates OrgId logon events in
Azure Active Directory. This record type
is being deprecated.
10 - Indicates security cmdlet events
that were performed by Microsoft
personnel in the data center.
11 - Indicates Data loss protection
(DLP) events in SharePoint.
12 - Indicates Sway events.
14 - Indicates sharing events in
SharePoint.
15 - Indicates Secure Token Service
(STS) logon events in Azure Active
Directory.
18 - Indicates Security & Compliance
Center events.
20 - Indicates Power BI events.
22 - Indicates Yammer events.
24 - Indicates eDiscovery events. This
record type indicates activities that
were performed by running content
searches and managing eDiscovery
cases in the Security & Compliance
Center. For more information, see
Search for eDiscovery activities in the
Office 365 audit log.
25, 26, or 27 - Indicates Microsoft
Teams events.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

ResultStatus Indicates whether the action (specified All


in the Operation property) was
successful or not.
For Exchange admin activity, the value
is either True (successful) or False
(failed).

SecurityComplianceCenterEventType Indicates that the activity was a Security Office 365 Security & Compliance
& Compliance Center event. All Security Center
& Compliance Center activities will have
a value of 0 for this property.

SharingType The type of sharing permissions that SharePoint


was assigned to the user that the
resource was shared with. This user is
identified in the UserSharedWith
property.

Site The GUID of the site where the file or SharePoint


folder accessed by the user is located.

SiteUrl The URL of the site where the file or SharePoint


folder accessed by the user is located.

SourceFileExtension The file extension of the file that was SharePoint


accessed by the user. This property is
blank if the object that was accessed is
a folder.

SourceFileName The name of the file or folder accessed SharePoint


by the user.

SourceRelativeUrl The URL of the folder that contains the SharePoint


file accessed by the user. The
combination of the values for the
SiteURL, the SourceRelativeURL, and
the SourceFileName properties is the
same as the value for the ObjectID
property, which is the full path name
for the file accessed by the user.

Subject The subject line of the message that Exchange (mailbox activity)
was accessed.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

TabType The type of tab added, removed, or Microsoft Teams


updated in a team. The possible values
for this property are:

Excelpin - An Excel tab.


Extension - All first-party and third-
party apps; such as Planner, VSTS, and
Forms.
Notes - OneNote tab.
Pdfpin - A PDF tab.
Powerbi - A PowerBI tab.
Powerpointpin - A PowerPoint tab.
Sharepointfiles - A SharePoint tab.
Webpage - A pinned website tab.
Wiki-tab - A wiki tab.
Wordpin - A Word tab.

Target The user that the action (identified in Azure Active Directory
the Operation property) was
performed on. For example, if a guest
user is added to SharePoint or a
Microsoft Team, that user would be
listed in this property.

TeamGuid The ID of a team in Microsoft Teams. Microsoft Teams

TeamName The name of a team in Microsoft Teams. Microsoft Teams

UserAgent Information about the user's browser. SharePoint


This information is provided by the
browser.

UserDomain Identity information about the tenant Azure Active Directory


organization of the user (actor) who
performed the action.

UserID The user who performed the action All


(specified in the Operation property)
that resulted in the record being
logged. Note that records for activity
performed by system accounts (such as
SHAREPOINT\system or NT
AUTHORITY\SYSTEM) are also included
in the audit log.

UserKey An alternative ID for the user identified All


in the UserID property. For example,
this property is populated with the
passport unique ID (PUID) for events
performed by users in SharePoint. This
property also might specify the same
value as the UserID property for events
occurring in other services and events
performed by system accounts.
OFFICE 365 SERVICE THAT HAS THIS
PROPERTY DESCRIPTION PROPERTY

UserSharedWith The user that a resource was shared SharePoint


with. This property is included if the
value for the Operation property is
SharingSet. This user is also listed in
the Shared with column in the report.

UserType The type of user that performed the All


operation. The following values indicate
the user type.

0 - A regular user.
2 - An administrator in your Office 365
organization.
3 - A Microsoft datacenter
administrator or datacenter system
account.
4 - A system account.
5 - An application.
6 - A service principal.

Version Indicates the version number of the All


activity (identified by the Operation
property) that's logged.

Workload The Office 365 service where the All


activity occurred. The possible values
for this property are:

SharePoint
OneDrive
Exchange
AzureActiveDirectory
DataCenterSecurity
Compliance
Sway
SecurityComplianceCenter
PowerBI
MicrosoftTeams
ThreatIntelligence

Note that the properties described above are also displayed when you click More information when viewing the
details of a specific event.
Search the Office 365 audit log to troubleshoot
common scenarios
11/30/2018 • 11 minutes to read • Edit Online

This article describes how to use the Office 365 audit log search tool to help you troubleshoot common support
scenarios. This includes using the audit log to:
Find the IP address of the computer used to access a compromised account
Determine who set up email forwarding for a mailbox
Determine if a user deleted email items in their mailbox
Determine if a user created an inbox rule

Using the Office 365 audit log search tool


Each of the troubleshooting scenarios described in this article are based on using the audit log search tool in the
Office 365 Security & Compliance Center. This section lists the permissions required to search the audit log and
describes the steps to access and run audit log searches. Each scenario section provides specific guidance about
how to configure an audit log search query and what to look for in the detailed information in the audit records
that match the search criteria.
Permissions required to use the audit log search tool
You have to be assigned the View -Only Audit Logs or Audit Logs role in Exchange Online to search the Office 365
audit log. By default, these roles are assigned to the Compliance Management and Organization Management role
groups on the Permissions page in the Exchange admin center. For more information, see Manage role groups in
Exchange Online.
Running audit log searches
This section describes the basics for creating and running audit log searches. Use these instructions as a starting
point for each troubleshooting scenario in this article. For more detailed step-by-step instructions, see Search the
audit log in the Office 365 Security & Compliance Center .
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Search & investigation > Audit log search.
The Audit log search page is displayed.
4. You can configure the following search criteria. Note that each troubleshooting scenario in this article will
recommend specific guidance for configuring these fields.
a. Activities - Click the drop-down list to display the activities that you can search for. After you run the
search, only the audit records for the selected activities are displayed. Selecting Show results for all
activities will display results for all activities that meet the other search criteria. You'll also have to leave this
field blank in some of the troubleshooting scenarios.
b. Start date and End date - Select a date and time range to display the events that occurred within that
period. The last seven days are selected by default. The date and time are presented in Coordinated
Universal Time (UTC ) format. The maximum date range that you can specify is 90 days.
c. Users - Click in this box and then select one or more users to display search results for. Audit records for
the selected activity performed by the users you select in this box are displayed in the list of results. Leave
this box blank to return entries for all users (and service accounts) in your organization.
d. File, folder, or site - Type some or all of a file or folder name to search for activity related to the file of
folder that contains the specified keyword. You can also specify a URL of a file or folder. If you use a URL, be
sure the type the full URL path or if you just type a portion of the URL, don't include any special characters
or spaces. Leave this box blank to return entries for all files and folders in your organization. Note that this
field is left blank in all the troubleshooting scenarios in this article.
5. Click Search to run the search using your search criteria.
The search results are loaded, and after a few moments they are displayed under Results on the Audit log
search page. Each to the following sections will provide guidance about things to look for the specific
troubleshooting scenario.
For more information about viewing, filtering, or exporting audit log search results, see:
View search results
Filter search results
Export search results

Finding the IP address of the computer used to access a compromised


account
The IP address corresponding to an activity performed by any user is included in most audit records. Information
about the client used is also included in the audit record.
Here's how to configure an audit log search query for this scenario:
Activities - If relevant to your case, select a specific activity to search for. For troubleshooting compromised
accounts, consider selecting the User signed in to mailbox activity under Exchange mailbox activities. This
will return auditing records showing the IP address that was use when signing in to the mailbox. Otherwise, leave
this field blank to return audit records for all activities.

TIP
Leaving this field blank will return UserLoggedIn activities, which is an Azure Active Directory activity that indicates that
someone has signed in to an Office 365 user account. Use filtering in the search results to display the UserLoggedIn audit
records.

Start date and End date - Select a date range that's applicable to your investigation.
Users - If you're investigating a compromised account, select the user whose account was compromised. This will
return audit records for activities performed by that user account.
File, folder, or site - Leave this field blank.
After you run the search, the IP address for each activity is displayed in the IP address column in the search
results. Click the record in the search results to view more detailed information on the flyout page.

Determining who set up email forwarding for a mailbox


When email forwarding is configured for a mailbox, email messages that are sent to the mailbox are forwarded to
another mailbox. Messages can be forwarded to users inside or outside of your organization. When email
forwarding is set up on a mailbox, the underlying Exchange Online cmdlet that's used is Set-Mailbox.
Here's how to configure an audit log search query for this scenario:
Activities - Leave this field blank so that the search returns audit records for all activities. This is necessary to
return any audit records related to the Set-Mailbox cmdlet.
Start date and End date - Select a date range that's applicable to your investigation.
Users - Unless you're investigating a email forwarding issue for a specific user, leave this field blank. This will help
you identify if email forwarding was set up for any user.
File, folder, or site - Leave this field blank.
After you run the search, click Filter results on the search results page. In the box under Activity column header,
type Set-Mailbox so that only audit records related to the Set-Mailbox cmdlet are displayed.
At this point, you have to look at the details of each audit record to determine if the activity is related to email
forwarding. Click the audit record to display the Details flyout page, and then click More information. The
following screenshot and descriptions highlights the information that indicates email forwarding was set on the
mailbox.

a. In the ObjectId field, the alias of the mailbox that email forwarding was set on is displayed. This mailbox is also
displayed on the Item column in the search results page.
b. In the Parameters field, The value ForwardingSmtpAddress indicates that email forward has been set on the
mailbox. In this example, mail is being forwarded to the email address mike@contoso.com, which is outside of the
alpinehouse.onmicrosoft.com organization.
c. The True value for the DeliverToMailboxAndForward parameter indicates that a copy of message delivered to
sarad@alpinehouse.onmicrosoft.com and is forwarded to the email address specified by the
ForwardingSmtpAddress parameter, which in this example is mike@contoso.com. If the value for the
DeliverToMailboxAndForward parameter is set to False, then email is only forwarded to the address specified by
the ForwardingSmtpAddress parameter. It's not delivered to the mailbox specified in the ObjectId field.
d. The UserId field indicates the user who set email forwarding on the mailbox specified in the ObjectId field field.
This user is also displayed in the User column on the search results page. In this case, it seems that the owner of
the mailbox set email forwarding on her mailbox.
If you determine that email forwarding shouldn't be set on the mailbox, you can remove it by running the following
command in Exchange Online PowerShell:

Set-Mailbox <mailbox alias> -ForwardingSmtpAddress $null

See the Set-Mailbox article for more information about the parameters related to email forwarding.

Determining if a user deleted email items


Before audit log records about deleted email items are saved to the Office 365 audit log, mailbox auditing has to be
enabled for each user mailbox in your organization. Additionally, the SoftDelete and HardDelete mailbox actions
have to be enabled for auditing. For instructions, see Enable mailbox auditing in Office 365. If mailbox auditing is
already enabled for users, use the following steps to search the audit log for events related to deleted email items.
Here's how to configure an audit log search query for this scenario:
Activities - Under Exchange mailbox activities, select one or both of the following activities:
Deleted messages from Deleted Items folder - This activity corresponds to the SoftDelete mailbox
auditing action. This activity is also logged when a user permanently deletes an item by selecting it and
pressing Shift+Delete. After an item is permanently deleted, the user can recover it until the deleted item
retention period expires.
Purged messages from mailbox - This activity corresponds to the HardDelete mailbox auditing action.
This is logged when a user purges an item from the Recoverable Items folder. Admins can use the Content
Search tool in the Office 365 Security & Compliance Center to search for and recover purged items until the
deleted item retention period expires or longer if the user's mailbox is on hold.
Start date and End date - Select a date range that's applicable to your investigation.
Users - If you select a user in this field, the audit log search tool will return audit records for email items that were
deleted (SoftDeleted or HardDeleted) by the user you specify. In some cases, the user who deletes an email might
not be the mailbox owner.
File, folder, or site - Leave this field blank.
After you run the search, you can filter the search results to display the audit records for soft-deleted items or for
hard-deleted items. Click the audit record to display the Details flyout page, and then click More information.
Additional information about the deleted item, such as the subject line and the location of the item when it was
deleted, is displayed in the AffectedItems field. The following screenshots show an example of the
AffectedItems field from a soft-deleted item and a hard-deleted item.
Example of AffectedItems field for soft-deleted item
Example of AffectedItems field for hard-deleted item

Recovering deleted email items


Users can recover soft-deleted items if the deleted items retention period has not expired. In Exchange Online, the
default deleted items retention period is 14 days, but admins can increase this setting to a maximum of 30 days.
Point users to the Recover deleted items or email in Outlook Web App article for instructions on recovering deleted
items.
As previously explained, admins might be able to recover hard-deleted items if the deleted item retention period
has not expired or if the mailbox is on hold, in which case items are retained until the hold duration expires. When
you run a content search, soft-deleted and hard-deleted items in the Recoverable Items folder are returned in the
search results if they match the search query. For more information about running content searches, see Content
Search in Office 365.

TIP
To search for deleted email items, search for all or part of the subject line that's displayed in the AffectedItems field in the
audit record.

Determining if a user created an inbox rule


When users create an inbox rule for their Exchange Online mailbox, a corresponding audit record is saved to the
audit log. For more information about inbox rules, see:
Use inbox rules in Outlook on the web
Manage email messages in Outlook by using rules
Here's how to configure an audit log search query for this scenario:
Activities - Under Exchange mailbox activities, select New-InboxRule Create/modify/enable/disable
inbox rule.
Start date and End date - Select a date range that's applicable to your investigation.
Users - Unless you're investigating a specific user, leave this field blank. This will help you identify new inbox rules
set up by any user.
File, folder, or site - Leave this field blank.
After you run the search, any audit records for this activity are displayed in the search results. Click an audit record
to display the Details flyout page, and then click More information. Information about the inbox rule settings are
displayed in the Parameters field. The following screenshot and descriptions highlights the information about
inbox rules.
a. In the ObjectId field, the full name of the inbox rule is displayed. This name includes the alias of the user's
mailbox (for example, SaraD ) and the name of the inbox rule (for example, "Move messages from admin").
b. In the Parameters field, the condition of the inbox rule is displayed. In this example, the condition is specified by
the From parameter. The value defined for the From parameter indicates that the inbox rule acts on email sent by
admin@alpinehouse.onmicrosoft.com. For a complete list of the parameters that can be used to define conditions
of inbox rules, see the New -InboxRule article.
c. The MoveToFolder parameter specifies the action for the inbox rule; in this example, messages received from
admin@alpinehouse.onmicrosoft.com are moved to the folder named AdminSearch. Also see the New -InboxRule
article for a complete list of parameters that can used to define the action of an inbox rule.
d. The UserId field indicate the user who created the inbox rule specified in the ObjectId field. This user is also
displayed in the User column on the search results page.
Use sharing auditing in the Office 365 audit log
8/21/2018 • 6 minutes to read • Edit Online

Sharing is a key activity in SharePoint Online and OneDrive for Business, and it's widely used in Office 365
organizations. Administrators can now use sharing auditing in the Office 365 audit log to determine how sharing is
being used in their organization.

The SharePoint Sharing schema


Sharing events (excluding sharing policy and sharing link events) are different from file- and folder-related events
in one primary way: one user is taking an action that has some effect on another user. For example, User A gives
User B access to a file. In this example, User A is the acting user and User B is the target user. In the SharePoint
File schema, the acting user's action only affects the file itself. When User A opens a file, the only information
needed in the FileAccessed event is the acting user. To address this difference, there is a separate schema, called
the SharePoint Sharing schema, that captures more information about sharing events. This ensures that
administrators have more insight into who shared a resource and the user the resource was shared with.
The Sharing schema provides two additional fields in the audit log related to sharing events:
TargetUserOrGroupName - Stores the UPN or name of the target user or group that a resource was
shared with (User B in the previous example).
TargetUserOrGroupType - Identifies whether the target user or group is a Member, Guest, Group, or
Partner.
These two fields, in addition to other properties from the Office 365 audit log schema such as User, Operation, and
Date can tell the full story about which user shared what resource with whom and when.
There's another schema property that's important to the sharing story. The EventData property stores additional
information about sharing events. For example, when a user shares a site with another user, this is accomplished by
adding the target user to a SharePoint group. The EventData property captures this additional information to
provide context for administrators.

The SharePoint Sharing model and sharing events


Sharing is actually defined by three separate events: SharingSet, SharingInvitationCreated, and
SharingInvitaitonAccepted. Here's the work flow for how sharing events are logged in the Office 365 audit log.
When a user (the acting user) wants to share a resource with another user (the target user), SharePoint (or
OneDrive for Business) first checks if the email address of the target user is already associated with a user account
in the organization's directory. If the target user is in the organization's directory, SharePoint does the following:
Immediately assigns the target user permissions to access the resource.
Sends a sharing notification to the email address of the target user.
Logs a SharingSet event.
If a user account for the target user isn't in the organization's directory, SharePoint does the following:
Creates a sharing invitation and sends it to the email address of the target user.
Logs a SharingInvitationCreated event.

NOTE
The SharingInvitationCreated event is most always associated with external or guest sharing when the target user
doesn't have access to the resource that was shared.

When the target user accepts the sharing invitation that's sent to them (by clicking the link in the invitation),
SharePoint logs a SharingInvitationAccepted event and assigns the target user permissions to access the
resource. Additional information about the target user is also logged, such as the identity of the user that the
invitation was sent to and the user who actually accepted the invitation. In some case, these users (or email
addresses) might be different.
How to identify resources shared with external users
A common requirement for administrators is creating a list of all resources that have been shared with users
outside of the organization. By using sharing auditing in Office 365, administrators can now generate this list.
Here's how.
Step 1: Search for sharing events and export the results to a CSV file
The first step is to search the Office 365 audit log for sharing events. For more details (including the required
permissions) about searching the audit log, see Search the audit log in the Office 365 Security & Compliance
Center.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane of the Security & Compliance Center, click Search & investigation, and then click Audit
log search.
The Audit log search page is displayed.
4. Under Activities, click Sharing activities to search only for sharing events.

5. Select a date and time range to find the sharing events that occurred within that period.
6. Click Search to run the search.
7. When the search is finished running and the results are displayed , click Export results > Download all
results.
After you select the export option, a message is displayed at the bottom of the window that prompts you to
open or save the CSV file.
8. Click Save > Save as and save the CSV file to a folder on your local computer.
Step 2: Filter the CSV file for resources shared with external users
The next step is to filter the CSV for the SharingSet and SharingInvitationCreated events, and to display those
events where the TargetUserOrGroupType property is Guest. You'll use the Power Query feature in Excel to do
this. The following procedure is performed in Excel 2016.
1. In Excel 2016, open a blank workbook.
2. Click the Data tab.
3. Click New Query > From file > From CSV.

4. Open the CSV file that you downloaded in Step 1.


The CSV file is opened in the Query Editor. Note that there are four columns: Time, User, Action, and
Detail. The Detail column is a multi-property field. The next step is to create a new column for each of the
properties in the Detail column.
5. Select the Detail column, and then on the Home tab, click Split Column > By Delimiter.

6. In the Split Column by Delimiter window, do the following:


Under Select or enter delimiter, select Comma.
Under Split, select At each occurrence of the delimiter.
7. Click OK.
The Detail column is split into multiple columns. Each new column is named Detail.1, Detail.2, Detail.3,
and so on. You'll notice the values in each cell in the Detail.n columns are prefixed with the name of the
property; for example, Operation:SharingSet, Operation:SharingInvitationAccepted, and
Operation:SharingInvitationCreated.
8. On the File tab, click Close & Load to close the Query Editor and open the file in an Excel workbook.
The next step is to filter the file to only display the SharingSet and SharingInvitationCreated events.
9. Go to the Home tab, and then select the Action column.
10. In the Sort & Filter drop-down list, clear all selections, then select SharingSet and
SharingInvitationCreated, and click OK.
Excel displays the rows for the SharingSet and SharingInvitationCreated events.
11. Go to the column named Detail.17 (or whichever column contains the TargetUserOrGroupType
property) and select it.
12. In the Sort & Filter drop-down list, clear all selections, then select TargetUserOrGroupType:Guest, and
click OK.
Now Excel displays the rows for SharingInvitationCreated and SharingSet events AND where the target
user is outside of your organization, because external users are identified by the value
TargetUserOrGroupType:Guest.
The following table shows all users in the organization who shared resources with a guest user within a specified
date range.

Although it's not included in the previous table, the Detail.10 column (or whichever column contains the ObjectId
property) identifies the resource that was shared with the target user; for example
ObjectId:https:\/\/contoso-my.sharepoint.com\/personal\/sarad_contoso_com\/Documents\/Southwater Proposal.docx .

TIP
If you want to identify when a guest user was actually assigned permissions to access a resource (as opposed to just the
resources that where shared with them), repeat Steps 10, 11, and 12, and filter on the SharingInvitationAccepted and
SharingSet events in Step 10.
Search for eDiscovery activities in the Office 365
audit log
10/22/2018 • 15 minutes to read • Edit Online

Content Search and eDiscovery-related activities that are performed in Office 365 Security & Compliance Center
or by running the corresponding Windows PowerShell cmdlets are logged in the Office 365 audit log. Events are
logged when administrators or compliance administrators (or any user that's assigned eDiscovery permissions)
perform the following Content Search and eDiscovery-related tasks in the Office 365 Security & Compliance
Center:
Creating and managing eDiscovery cases
Creating, starting, and editing Content Searches
Performing Content Search actions, such as previewing, exporting, and deleting search results
Configuring permissions filtering for Content Search
Managing the eDiscovery Administrator role

IMPORTANT
The activities described in this article are only the result of eDiscovery tasks performed by using the Security & Compliance
Center. eDiscovery tasks that were performed by using the In-Place eDiscovery tool in Exchange Online or the eDiscovery
Center in SharePoint Online aren't included.

For more information about searching the Office 365 audit log, the permissions that are required, and exporting
search results, see Search the audit log in the Office 365 Security & Compliance Center.

How to search for and view eDiscovery activities


Currently, you have to do a few specific things to view eDiscovery activities in the Office 365 audit log. Here's how.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane, click Search & investigation, and then click Audit log search.
4. In the Activities drop-down list, under eDiscovery activities, click one or more activities to search for. Or
you can click eDiscovery activities to search for all eDiscovery-related activities.

NOTE
The Activities drop-down list also includes a group of activities named eDiscovery cmdlet activities that will return
records from the cmdlet audit log.

5. Select a date and time range to display eDiscovery events that occurred within that period.
6. In the Users box, select one or more users to display search results for. Leave this box blank to return
entries for all users.
7. Click Search to run the search using your search criteria.
8. After the search results are displayed, you can click Filter results to filter or sort the resulting activity
records. Unfortunately, you can't use filtering to explicitly exclude certain activities.
9. To view details about an activity, click the activity record in the list of search results.
A Details fly out page is displayed that contains the detailed properties from the event record. To display
additional details, click More information. For a description of these properties, see the Detailed
properties for eDiscovery activities section.

eDiscovery activities
The following table describes the Content Search and eDiscovery-related activities that are logged when an
administrator or user performs an eDiscovery-related activity by using the Security & Compliance Center or by
running the corresponding cmdlet in remote PowerShell that's connected to your organization's Security &
Compliance Center.

NOTE
The eDiscovery activities described in this section provide similar information to the eDiscovery cmdlet activities described in
the next section. We recommend that you use the eDiscovery activities described in this section because they will appear in
the audit log search results within 30 minutes. It takes up to 24 hours for the eDiscovery cmdlet activities to appear in audit
log search results.

FRIENDLY NAME OPERATION CORRESPONDING CMDLET DESCRIPTION

Added member to CaseMemberAdded Add- A user was added as a


eDiscovery case ComplianceCaseMember member of an eDiscovery
case. As a member of a case,
a user can perform various
case-related tasks
depending on whether they
have been assigned the
necessary permissions.

Changed content search SearchUpdated Set-ComplianceSearch An existing content search


was changed. Changes can
include adding or removing
content locations or editing
the search query.

Changed eDiscovery CaseAdminUpdated Update- The list of eDiscovery


administrator membership eDiscoveryCaseAdmin Administrators in your
organization was changed.
This activity is logged when
the list of eDiscovery
Administrators is replaced
with a group of new users. If
a single user is added or
removed, the
CaseAdminAdded operation
is logged.

Changed eDiscovery case CaseUpdated Set-ComplianceCase An eDiscovery case was


changed. Changes include
closing an open case or re-
opening a closed case.
FRIENDLY NAME OPERATION CORRESPONDING CMDLET DESCRIPTION

Changed eDiscovery case CaseMemberUpdated Update- The membership list of an


membership ComplianceCaseMember eDiscovery case was
changed. This activity is
logged when all members
are replaced with a group of
new users. If a single
member is added or
removed,
CaseMemberAdded or
CaseMemberRemoved
operation is logged.

Changed search permissions SearchPermissionUpdated Set-ComplianceSecurityFilter A search permissions filter


filter was changed.

Changed search query for HoldUpdated Set-CaseHoldRule A query-based hold


eDiscovery case hold associated with an
eDiscovery case was
changed. Possible changes
include editing the query or
date range for a query-
based hold.

Content search preview item PreviewItemDownloaded N/A A user downloaded an item


downloaded to their local computer (by
clicking the Download
original item link) when
previewing search results.

Content search preview item PreviewItemListed N/A A user clicked Preview


listed search results to display the
preview search results page,
which lists up to 1000 items
from the results of a
Content Search.

Content search preview item PreviewItemRendered N/A An eDiscovery manager


viewed viewed an item by clicking it
when previewing search
results.

Created content search SearchCreated New-ComplianceSearch A new content search was


created.

Created eDiscovery CaseAdminAdded Add-eDiscoveryCaseAdmin A user was added as an


administrator eDiscovery Administrator in
the organization.

Created eDiscovery case CaseAdded New-ComplianceCase An eDiscovery case was


created. When a case is
created, you only have to
give it a name. Other case-
related tasks such as adding
members, creating holds,
and creating content
searches associated with the
case result in additional
events being logged.
FRIENDLY NAME OPERATION CORRESPONDING CMDLET DESCRIPTION

Created search permissions SearchPermissionCreated New- A search permissions filter


filter ComplianceSecurityFilter was created.

Created search query for HoldCreated New-CaseHoldRule A query-based hold


eDiscovery case hold associated with an
eDiscovery case was created.

Deleted content search SearchRemoved Remove-ComplianceSearch An existing content search


was deleted.

Deleted eDiscovery CaseAdminRemoved Remove- An eDiscovery Administrator


administrator eDiscoveryCaseAdmin was deleted from your
organization.

Deleted eDiscovery case CaseRemoved Remove-ComplianceCase An eDiscovery case was


deleted. Note that any hold
associated with the case has
to be removed before the
case can be deleted.

Deleted search permissions SearchPermissionRemoved Remove- A search permissions filter


filter ComplianceSecurityFilter was deleted.

Deleted search query for HoldRemoved Remove-CaseHoldRule A query-based hold


eDiscovery case hold associated with an
eDiscovery case was deleted.
Removing the query from
the hold is often the result
of deleting a hold. When a
hold or a hold query are
deleted, the content
locations that were on hold
are released.

Downloaded export of SearchExportDownloaded N/A A user downloaded the


content search results of a content search
to their local computer. Note
that a Started export of
content search activity has
to be initiated before search
results can be downloaded.

Previewed results of content SearchPreviewed N/A A user previewed the results


search of a content search.

Purged results of content SearchResultsPurged New- A user purged the results of


search ComplianceSearchAction a Content Search by running
the New-
ComplianceSearchAction -
Purge command.
FRIENDLY NAME OPERATION CORRESPONDING CMDLET DESCRIPTION

Removed analysis of content RemovedSearchResultsSentT Remove- A content search prepare


search oZoom ComplianceSearchAction action (to prepare search
results for Office 365
Advanced eDiscovery) was
deleted. If the preparation
action was less than two
weeks old, the search results
that were prepared for
Advanced eDiscovery were
deleted from the Microsoft
Azure storage area. If the
preparation action was older
than 2 weeks, then this
event indicates that only the
corresponding preparation
action was deleted.

Removed export of content RemovedSearchExported Remove- A content search export


search ComplianceSearchAction action was deleted. If the
export action was less than
two weeks old, the search
results that were uploaded
to the Microsoft Azure
storage area were deleted. If
the export action was older
than 2 weeks, then this
event indicates that only the
corresponding export action
was deleted.

Removed member from CaseMemberRemoved Remove- A user was removed as a


eDiscovery case ComplianceCaseMember member of an eDiscovery
case.

Removed preview results of RemovedSearchPreviewed Remove- A content search preview


content search ComplianceSearchAction action was deleted.

Removed purge action RemovedSearchResultsPurge Remove- A content search purge


performed on content d ComplianceSearchAction action was deleted.
search

Removed search report SearchReportRemoved Remove- A content search export


ComplianceSearchAction report action was deleted.

Started analysis of content SearchResultsSentToZoom New- The results of a content


search ComplianceSearchAction search were prepared for
analysis in Advanced
eDiscovery.
FRIENDLY NAME OPERATION CORRESPONDING CMDLET DESCRIPTION

Started content search SearchStarted Start-ComplianceSearch A content search was


started. When you create or
change a content search by
using the Security &
Compliance Center GUI, the
search is automatically
started. If you create or
change a search by using
the New-
ComplianceSearch or Set-
ComplianceSearch cmdlet,
you have to run the Start-
ComplianceSearch cmdlet
to start the search.

Started export of content SearchExported New- A user exported the results


search ComplianceSearchAction of a content search.

Started export report SearchReport New- A user exported a content


ComplianceSearchAction search report.

Stopped content search SearchStopped Stop-ComplianceSearch A user stopped a content


search.

eDiscovery cmdlet activities


The following table lists the cmdlet audit log records that are logged when an administrator or user performs an
eDiscovery-related activity by using the Security & Compliance Center or by running the corresponding cmdlet in
remote PowerShell that's connected to your organization's Security & Compliance Center. Note that the detailed
information in the audit log record is different for the cmdlet activities listed in this table and the eDiscovery
activities described in the previous section.
As previously stated, it takes up to 24 hours for eDiscovery cmdlet activities to appear in the audit log search
results.

TIP
The cmdlets in the Operation column in the following table are linked to the corresponding cmdlet help topic on TechNet.
Go to the cmdlet help topic for a description of the available parameters for each cmdlet. The parameter and the parameter
value that were used with a cmdlet are included in the audit log entry for each eDiscovery cmdlet activity that's logged.

FRIENDLY NAME OPERATION (CMDLET) DESCRIPTION

Created hold in eDiscovery case New-CaseHoldPolicy A hold was created for an eDiscovery
case. A hold can be created with or
without specifying a content source. If
content sources are specified, they'll be
identified in the audit log entry.
FRIENDLY NAME OPERATION (CMDLET) DESCRIPTION

Deleted hold from eDiscovery case Remove-CaseHoldPolicy A hold that is associated with an
eDiscovery case was deleted. Deleting a
hold releases all of the content locations
from the hold. Deleting the hold also
results in deleting the case hold rules
associated with the hold (see Remove-
CaseHoldRule below).

Changed hold in eDiscovery case Set-CaseHoldPolicy A hold that is associated with an


eDiscovery was changed. Possible
changes include adding or removing
content locations or turning off
(disabling) the hold.

Created search query for eDiscovery New-CaseHoldRule A query-based hold associated with an
case hold eDiscovery case was created.

Deleted search query for eDiscovery Remove-CaseHoldRule A query-based hold associated with an
case hold eDiscovery case was deleted. Removing
the query from the hold is often the
result of deleting a hold. When a hold
or a hold query are deleted, the content
locations that were on hold are
released.

Changed search query for eDiscovery Set-CaseHoldRule A query-based hold associated with an
case hold eDiscovery case was changed. Possible
changes include editing the query or
date range for a query-based hold.

Created eDiscovery case New-ComplianceCase An eDiscovery case was created. When


a case is created, you only have to give
it a name. Other case-related tasks such
as adding members, creating holds, and
creating content searches associated
with the case result in additional events
being logged.

Deleted eDiscovery case Remove-ComplianceCase An eDiscovery case was deleted. Note


that any hold associated with the case
has to be removed before the case can
be deleted.

Changed eDiscovery case Set-ComplianceCase An eDiscovery case was changed.


Changes include closing an open case
or re-opening a closed case.

Added member to eDiscovery case Add-ComplianceCaseMember A user was added as a member of an


eDiscovery case. As a member of a case,
a user can perform various case-related
tasks depending on whether they have
been assigned the necessary
permissions.

Removed member from eDiscovery Remove-ComplianceCaseMember A user was removed as a member of an


case eDiscovery case.
FRIENDLY NAME OPERATION (CMDLET) DESCRIPTION

Changed eDiscovery case membership Update-ComplianceCaseMember The membership list of an eDiscovery


case was changed. This activity is
logged when all members are replaced
with a group of new users. If a single
member is added or removed, the
Add-ComplianceCaseMember or
Remove-ComplianceCaseMember
operation is logged.

Created content search New-ComplianceSearch A new content search was created.

Deleted content search Remove-ComplianceSearch An existing content search was deleted.

Changed content search Set-ComplianceSearch An existing content search was


changed. Changes can include adding
or removing content locations that are
searched and editing the search query.

Started content search Start-ComplianceSearch A content search was started. When


you create or change a content search
by using the Security & Compliance
Center GUI, the search is automatically
started. If you create or change a
search by using the New-
ComplianceSearch or Set-
ComplianceSearch cmdlet, you have
to run the Start-ComplianceSearch
cmdlet to start the search.

Stopped content search Stop-ComplianceSearch A content search that was running was
stopped.

Created content search action New-ComplianceSearchAction A content search action was created.
Content search actions include
previewing search results, exporting
search results, preparing search results
for analysis in Office 365 Advanced
eDiscovery, and permanently deleting
items that match the search criteria of a
content search.

Deleted content search action Remove-ComplianceSearchAction A content search action was deleted.

Created search permissions filter New-ComplianceSecurityFilter A search permissions filter was created.

Deleted search permissions filter Remove-ComplianceSecurityFilter A search permissions filter was deleted.

Changed search permissions filter Set-ComplianceSecurityFilter A search permissions filter was changed.

Created eDiscovery administrator Add-eDiscoveryCaseAdmin A user was added as an eDiscovery


Administrator in your organization.

Deleted eDiscovery administrator Remove-eDiscoveryCaseAdmin An eDiscovery Administrator was


deleted from your organization.
FRIENDLY NAME OPERATION (CMDLET) DESCRIPTION

Changed eDiscovery administrator Update-eDiscoveryCaseAdmin The list of eDiscovery Administrators in


membership your organization was changed. This
activity is logged when the list of
eDiscovery Administrators is replaced
with a group of new users. If a single
user is added or removed, the Add-
eDiscoveryCaseAdmin or Remove-
eDiscoveryCaseAdmin operation is
logged.

Detailed properties for eDiscovery activities


The following table describes the properties that are included when you click More information on the Details
page for an eDiscovery activity listed in the search results. These properties are also included in the CSV file when
you export the audit log search results. Note that an audit log record for an eDiscovery activity won't include every
detailed property listed below.

TIP
When you export the search results, the CSV file contains a column named Detail, which contains the detailed properties
described in the following table in a multi-value property. You can use the Power Query feature in Excel to split this column
into multiple columns so that each property will have its own column. This will let you sort and filter on one or more of these
properties. For more information, see the "Export the search results to a file" section in Search the audit log in the Office 365
Security & Compliance Center .

PROPERTY DESCRIPTION

Case The identity (GUID) of the eDiscovery case that was created,
changed, or deleted.

ClientApplication eDiscovery cmdlet activities have a value of EMC for this


property. This indicates the activity was performed by using
the Security & Compliance Center GUI or running the cmdlet
in PowerShell.

ClientIP The IP address of the device that was used when the activity
was logged. The IP address is displayed in either an IPv4 or
IPv6 address format.

ClientRequestId For eDiscovery activities, this property is typically blank.

CmdletVersion The build number for the version of the Security &
Compliance Center running in your organization.

CreationTime The date and time in Coordinated Universal Time (UTC) when
the eDiscovery activity was completed.

EffectiveOrganization The name of the your Office 365 organization.

ExchangeLocations The Exchange Online mailboxes that are included in a content


search or placed on hold in an eDiscovery case.
PROPERTY DESCRIPTION

Exclusions Mailbox or site locations that are excluded from a content


search or a hold in an eDiscovery case.

ExtendedProperties Additional properties from a content search, a content search


action, or hold in an eDiscovery case, such as the object GUID
and the corresponding cmdlet and cmdlet parameters that
were used when the activity was performed.

Id The ID of the report entry. The ID uniquely identifies the audit


log entry.

NonPIIParameters A list of the parameters (without any values) that were used
with the cmdlet identified in the Operation property. The
parameters listed in this property are the same as those listed
in the Parameters property.

ObjectId The GUID or name of the object (for example, a Content


Search or an eDiscovery case) that was created, changed, or
deleted by the activity listed in the Operation property. This
object is also identified in the Item column in the audit log
search results.

ObjectType The type of eDiscovery object that the user created, deleted,
or modified; for example a content search action (preview,
export, or purge), an eDiscovery case, or a content search.

Operation The name of the operation that corresponds to the


eDiscovery activity that was performed.

OrganizationId The GUID for your Office 365 organization.

Parameters The name and value for the parameters that were used with
the corresponding cmdlet.

PublicFolderLocations The public folder locations in Exchange Online that are


included in a content search or placed on hold in an
eDiscovery case.

Query The search query associated with the activity, such as a


content search or a query-based hold.

RecordType The type of operation indicated by the record. The value of 18


indicates an event related to an activity listed in the
eDiscovery cmdlet activities section. A value of 24 indicates an
event related to an activity listed in the How to search for and
view eDiscovery activities section.

ResultStatus Indicates whether the action (specified in the Operation


property) was successful or not.

SecurityComplianceCenterEventType Indicates that the activity was a Security & Compliance Center
event. All eDiscovery activities will have a value of 0 for this
property.
PROPERTY DESCRIPTION

SharepointLocations The SharePoint Online sites that are included in a content


search or placed on hold in an eDiscovery case.

StartTime The date and time in Coordinated Universal Time (UTC) when
the eDiscovery activity was started.

UserId The user who performed the activity (specified in the


Operation property) that resulted in the record being logged.
Note that records for eDiscovery activity performed by system
accounts (such as NT AUTHORITY\SYSTEM) are also included
in the audit log.

UserKey An alternative ID for the user identified in the UserId property.


For eDiscovery activities, the value for this property is typically
the same as the UserId property.

UserServicePlan The Office 365 subscription used by your organization. For


eDiscovery activities, this property is typically blank.

UserType The type of user that performed the operation. The following
values indicate the user type.
0 A regular user. 2 An administrator in your Office 365
organization. 3 A Microsoft datacenter administrator or
datacenter system account. 4 A system account. 5 An
application. 6 A service principal.

Version Indicates the version number of the activity (identified by the


Operation property) that's logged.

Workload The Office 365 service where the activity occurred. For
eDiscovery activities, the value is
SecurityComplianceCenter.
Alert policies in the Office 365 Security & Compliance
Center
11/29/2018 • 17 minutes to read • Edit Online

You can use the new alert policy and alert dashboard tools in the Office 365 Security & Compliance Center to
create alert policies and then view the alerts that are generated when users perform activities that match the
conditions of an alert policy. Alert policies build on and expand the functionality of activity alerts by letting you
categorize the alert policy, apply the policy to all users in your organization, set a threshold level for when an alert
is triggered, and decide whether or not to receive email notifications. There's also a View alerts page in the
Security & Compliance Center where you can view and filter alerts, set an alert status to help you manage alerts,
and then dismiss alerts after you've addressed or resolved the underlying incident. We've also expanded the type
of events that you can create alerts for. For example, you can create alert policies to track malware activity and data
loss incidents. Finally, we've also included a number of default alert policies that help you monitor assigning admin
privileges in Exchange Online, malware attacks, and unusual levels of file deletions and external sharing.

NOTE
Alert policies are available for organizations with an Office 365 Enterprise or Office 365 US Government E1/G1, E3/G3, or
E5/G5 subscription. However, some advanced functionality is only available for organizations with an E5/G5 subscription, or
for organizations that have an E1/G1 or E3/G3 subscription and an Office 365 Threat Intelligence or Office 365 Advanced
Compliance add-on subscription. The functionality that requires an E5/G5 or add-on subscription is highlighted in this topic.
Also note that alert policies are available in Office 365 GCC, GCC High, and DoD US government environments.

How alert policies work


Here's a quick overview of how alert policies work and the alerts that are triggers when user or admin activity
match the conditions of an alert policy.

1. An admin in your organization creates, configures, and turns on an alert policy by using the Alert policies
page in the Security & Compliance Center. You can also create alert policies by using the New-
ProtectionAlert cmdlet in PowerShell.
2. A user performs an activity that matches the conditions of an alert policy. In the case of malware attacks,
infected email messages sent to users in your organization will trigger an alert.
3. Office 365 generates an alert that's displayed on the View alerts page in the Security & Compliance
Center. Also, if email notifications are enabled for the alert policy, Office 365 sends an notification to a list
recipients.
4. An admin manages alerts in the Security & Compliance Center. Managing alerts consists of assigning an
alert status to help track and manage any investigation.

Alert policy settings


An alert policy consists of a set of rules and conditions that define the user or admin activity that will generate an
alert, a list of users who will trigger the alert if they perform the activity, and threshold that defines how many
times the activity has to occur before an alert is triggered. You also categorize the policy and assign it a severity
level. These two settings help you manage alert policies (and the alerts that are triggered when the policy
conditions are matched) because you can filter on these settings when managing policies and viewing alerts in the
Security & Compliance Center. For example, you can view alerts that match the conditions from the same category
or view alerts with the same severity level.
To view and create alert policies, go to Alerts > Alert policies in the Security & Compliance Center.

An alert policy consists of the following settings and conditions.


Activity the alert is tracking - You create a policy to track an activity or in some case a few related
activities, such a sharing a file with an external user by sharing it, assigning access permissions, or creating
an anonymous link. When a user performs the activity defined by the policy, an alert is triggered based on
the alert threshold settings.

NOTE
The activities that you can track depend on your organization's Office 365 Enterprise or Office 365 US Government
plan. In general, activities related to malware campaigns and phishing attacks require an E5/G5 subscription or an
E1/G1 or E3/G3 subscription with a Threat Intelligence add-on subscription.

Activity conditions - For most activities, you can define additional conditions that must be met for an alert
to be triggered. Common conditions include IP addresses (so that an alert is triggered when the user
performs the activity on a computer with a specific IP address or within an IP address range), whether an
alert is triggered if a specific user or users perform that activity, and whether the activity is performed on a
specific file name or URL. You can also configure a condition that triggers an alert when the activity is
performed by any user in your organization. Note that the available conditions are dependent on the
selected activity.
When the alert is triggered - You can configure a setting that defines how often an activity can occur
before an alert is triggered. This allows you to set up a policy to generate an alert every time an activity
matches the policy conditions, when a certain threshold is exceeded, or when the occurrence of the activity
the alert is tracking becomes unusual for our organization.

If you select the setting based on unusual activity, Office 365 establishes a baseline value that defines the
normal frequency for the selected activity; it takes up to 7 days to establish this baseline, during which alerts
won't be generated. After the baseline is established, an alert will be triggered when the frequency of the
activity tracked by the alert policy greatly exceeds the baseline value. For auditing-related activities (such as
file and folder activities), you can establish a baseline based on a single user or based on all users in your
organization; for malware-related activities, you can establish a baseline based on a single malware family, a
single recipient, or all messages in your organization.

NOTE
The ability to configure alert policies based on a threshold or based on unusual activity requires an E5/G5
subscription, or an E1/G1 or E3/G3 subscription with a Threat Intelligence or Advanced Compliance add-on
subscription. Organizations with an E1/G1 and E3/G3 subscription can only create an alert policy where an alert is
triggered every time that an activity occurs.

Alert category - To help with tracking and managing the alerts generated by a policy, you can assign one
of the following categories to a policy.
Data governance
Data loss prevention
Mail flow
Permissions
Threat management
Others
When an activity occurs that matches the conditions of the alert policy, the alert that's generated is
tagged with the category defined in this setting. This allows you to track and manage alerts that have
the same category setting on the View alerts page in the Security & Compliance Center because
you can sort and filter alerts based on category.
Alert severity - Similar to the alert category, you assign a severity attribute ( Low, Medium, or High) to
alert policies. Like the alert category, when an activity occurs that matches the conditions of the alert policy,
the alert that's generated is tagged with the same severity level that's set for the alert policy. Again, this
allows you to track and manage alerts that have the same severity setting on the View alerts page. For
example, you can filter the list of alerts so that only alerts with a High severity are displayed.

TIP
When setting up an alert policy, consider assigning a higher severity to activities that can result in severely negative
consequences, such as detection of malware after delivery to users, viewing of sensitive or classified data, sharing
data with external users, or other activities that can result in data loss or security threats. This can help you prioritize
alerts and the actions you take to investigate and resolve the underlying causes.

Email notifications - You can set up the policy so that email notifications are sent (or not sent) to a list of
users when an alert is triggered. You can also set a daily notification limit so that once the maximum
number of notifications has been reached, no more notifications are sent for the alert during that day. In
additional to email notifications, you or other administrators can view the alerts that are triggered by a
policy on the View alerts page. Consider enabling email notifications for alert policies of a specific category
or that have a higher severity setting.

Default alert policies


Office 365 provides built-in alert policies that help identify Exchange admin permissions abuse, malware activity,
and data governance risks. On the Alert policies page, the name of these built-in policies are in bold and the
policy type is defined as System. These policies are turned on by default. You can turn these policies off (or back on
again), set up a list of recipients to send email notifications to, and set a daily notification limit. The other settings
for these policies can't be edited.
The following table lists and describes the available default alert policies and indicates the Office 365 Enterprise
and Office 365 US Government plans required for each one. Note that some default alert policies are available if
your organization has the appropriate add-on subscription in addition to an E1/G1 or E3/G3 subscription.

DEFAULT ALERT POLICY DESCRIPTION OFFICE 365 ENTERPRISE SUBSCRIPTION

Creation of forwarding/redirect rule Generates an alert when someone in E1/G1, E3/G3, or E5/G5
your organization creates an inbox rule
for their mailbox that forwards or
redirects messages to another email
account. This policy only tracks inbox
rules that are created using Outlook
Web App or Exchange Online
PowerShell. This policy has a Low
severity setting. For more information
using inbox rules to forward and
redirect email in Outlook Web App, see
Use rules in Outlook Web App to
automatically forward messages to
another account.
DEFAULT ALERT POLICY DESCRIPTION OFFICE 365 ENTERPRISE SUBSCRIPTION

eDiscovery search started or Generates an alert when someone uses E1/G1, E3/G3, or E5/G5
exported the Content search tool in the Security
& Compliance Center. An alert is
triggered when the following content
search activities are performed:

• A content search is started


• The results of a content search are
exported
• A content search report is exported

Alerts are also trigged when the


previous content search activities are
performed in association with an
eDiscovery case. This policy has a
Medium severity setting. For more
information about content search
activities, see Search for eDiscovery
activities in the Office 365 audit log.

Elevation of Exchange admin Generates an alert when someone is E1/G1, E3/G3, or E5/G5
privilege assigned administrative permissions in
your Exchange Online organization; for
example, if a user is added to the
Organization Management role group
in Exchange Online. This policy has a
Low severity setting.

Messages have been delayed Generates an alert when Office 365 E1/G1, E3/G3, or E5/G5
can't deliver email messages to your
on-premises organization or a partner
servers by using a connector. When this
happen, the message is queued in
Office 365. This alert is triggered when
there are 2,000 messages or more that
have been queued for more than an
hour. This policy has a High severity
setting.

Malware campaign detected after Generates an alert when an unusually E5/G5 or Office 365 Threat Intelligence
delivery large number of messages containing add-on subscription
malware are delivered to mailboxes in
your organization. If this event occurs,
Office 365 removes the infected
messages from Exchange Online
mailboxes. This policy has a High
severity setting.

Malware campaign detected and Generates an alert when someone has E5/G5 or Office 365 Threat Intelligence
blocked attempted to send an unusually large add-on subscription
number of email messages containing a
certain type of malware to users in your
organization. If this event occurs, the
infected messages are blocked by Office
365 and not delivered to mailboxes.
This policy has a Low severity setting.
DEFAULT ALERT POLICY DESCRIPTION OFFICE 365 ENTERPRISE SUBSCRIPTION

Malware campaign detected in Generates an alert when an unusually E5/G5 or Office 365 Threat Intelligence
SharePoint and OneDrive high volume of malware or viruses are add-on subscription
detected in files located in SharePoint
sites or OneDrive accounts in your
organization. This policy has a High
severity setting.

Unusual external user file activity Generates an alert when an usually E5/G5, or Office 365 Threat Intelligence
large number of activities are performed or Advanced Compliance add-on
on files in SharePoint or OneDrive by subscription
users outside of your organization. This
includes activities such as accessing files,
downloading files, and deleting files.
This policy has a High severity setting.

Unusual volume of external file Generates an alert when an usually E5/G5, or Office 365 Threat Intelligence
sharing large number of files in SharePoint or or Advanced Compliance add-on
OneDrive are shared with users outside subscription
of your organization. This policy has a
Medium severity setting.

Unusual volume of file deletion Generates an alert when an unusually E5/G5, or Office 365 Threat Intelligence
large number of files are deleted in or Advanced Compliance add-on
SharePoint or OneDrive within a short subscription
time frame. This policy has a Medium
severity setting.

Unusual increase in email reported Generates an alert when there is a E5/G5 or Office 365 Threat Intelligence
as phish significant increase in the number of add-on subscription
people in your organization using the
Report Message add-in in Outlook to
report messages as phishing mail. This
policy has a High severity setting. For
more information about this add-in, see
Use the Report Message add-in.

Note that the unusual activity monitored by some of the built-in policies is based on the same process as the alert
threshold setting that was previously described. Office 365 establishes a baseline value that defines the normal
frequency for "usual" activity. Alerts are then triggered when the frequency of activities tracked by the built-in alert
policy greatly exceeds the baseline value.

Viewing alerts
When an activity performed by users in your organization match the settings of an alert policy, an alert is
generated and displayed on the View alerts page in the Security & Compliance Center. Depending on the settings
of an alert policy, an email notification is also sent to a list of specified users when an alert is triggered. For each
alert, the dashboard on the View alerts page displays the name of the corresponding alert policy, the severity and
category for the alert (defined in the alert policy) and the number of times an activity has occurred that resulted in
the alert being generated; this value is based on the threshold setting of the alert policy. The dashboard also shows
the status for each alert. See the Managing alerts section for more information about using the status property to
manage alerts.
To view alerts, go to Alerts > View alerts in the Security & Compliance Center.
You can use the following filters to view a subset of all the alerts on the View alerts page.
Status - Use this filter to show alerts that are assigned a particular status; the default status is Active. You
or other administrators can change the status value.
Policy - Use this filter to show alerts that match the setting of one or more alert policies. Or, you can just
display all alerts for all alert policies.
Time range - Use this filter to show alerts that were generated within a specific date and time range.
Severity - Use this filter to show alerts that are assigned a specific severity.
Category - Use this filter to show alerts from one or more alert categories.
Source - Use this filter to show alerts triggered by alert policies in the Security & Compliance Center or
alerts triggered by Office 365 Cloud App Security policies, or both. For more information about Office 365
Cloud App Security alerts, see the Viewing Cloud App Security alerts section.

Managing alerts
After alerts have been generated and displayed on the View alerts page in the Security & Compliance Center, you
can triage, investigate, and resolve them. Here are some tasks you can perform to manage alerts.
Assign a status to alerts - You can assign one of the following statuses to alerts: Active (the default value),
Investigating, Resolved, or Dismissed. Then, you can filter on this setting to display alerts with the same
status setting. This status setting can help track the process of managing alerts.
View alert details - You can click an alert to display a flyout page with details about the alert. The detailed
information depends on the corresponding alert policy, but it typically includes the following: name of the
actual operation that triggered the alert (such as a cmdlet), a description of the activity that triggered the
alert, the user (or list of users) who triggered the alert, and the name (and link to ) of the corresponding
alert policy.
The name of the actual operation that triggered the alert, such as a cmdlet or an audit log operation.
A description of the activity that triggered the alert.
The user who triggered the alert; this is included only for alert policies that are set up to track a single
user or a single activity.
The number of times the activity tracked by the alert was performed. Note that this number might
not match that actual number of related alerts listed on the View alerts page because additional
alerts might have been triggered.
A link to an activity list that includes an item for each activity that was performed that triggered the
alert. Each entry in this list identifies when the activity occurred, the name of actual operation, (such
as "FileDeleted") and the user who performed the activity, the object (such as a file, an eDiscovery
case, or a mailbox) that the activity was performed on, and the IP address of the user's computer. For
malware related alerts, this links to a message list.
The name (and link to ) of the corresponding alert policy.
Suppress email notifications - You can turn off (or suppress) email notifications from the flyout page for
an alert. When you suppress email notifications, Office 365 won't send notifications when activities or
events that match the conditions of the alert policy. However, alerts will continue to be trigger when
activities performed by users match the conditions of the alert policy. You can also turn off email
notifications by editing the alert policy.
Resolve alerts - You can mark an alert as resolved on the flyout page for an alert (which sets the status of
the alert to Resolved). Unless you change the filter, resolved alerts aren't displayed on the View alerts
page.

Viewing Cloud App Security alerts


Alerts that are triggered by Office 365 Cloud App Security policies are now displayed on the View alerts page in
the Security & Compliance Center. This includes alerts that are triggered by activity policies and alerts that are
triggered by anomaly detection policies in Office 365 Cloud App Security. This means you can view all alerts in the
Security & Compliance Center. Note that Office 365 Cloud App Security is only available for organizations with an
Office 365 Enterprise E5 or Office 365 US Government G5 subscription. For more information, see Overview of
Office 365 Cloud App Security.
Additionally, organizations that have Microsoft Cloud App Security as part of an Enterprise Mobility + Security E5
subscription or as a standalone service can also view Cloud App Security alerts that are related to Office 365 apps
and services in the Security & Compliance Center.
To display only Cloud App Security alerts in the Security & Compliance Center, use the Source filter and select
Cloud App Security.
Similar to an alert triggered by a Security & Compliance Center alert policy, you can click a Cloud App Security
alert to display a flyout page with details about the alert. The alert includes a link to view the details and manage
the alert in the Cloud App Security portal and a link to the corresponding Cloud App Security policy that triggered
the alert. See Review and take action on alerts in Office 365 Cloud App Security.
IMPORTANT
Changing the status of a Cloud App Security alert in the Security & Compliance Center won't update the resolution status for
the same alert in the Cloud App Security portal. For example, if you mark the status of the alert as Resolved in the Security
& Compliance Center, the status of the alert in the Cloud App Security portal is unchanged. To resolve or dismiss a Cloud
App Security alert, manage the alert in the Cloud App Security portal.
Smart reports and insights in the Office 365 Security
& Compliance Center
8/24/2018 • 3 minutes to read • Edit Online

If you are part of your organization's Office 365 security team and have the necessary permissions assigned in
the Office 365 Security & Compliance Center, you can access a variety of reports, including smart reports and
insights. Read this article to get an overview of these reports and insights, and where to go to learn more about
specific reports.

Smart reports and insights overview


Monitoring capabilities available in the Office 365 Security & Compliance Center include smart reports and
insights that enable your security and compliance administrators to focus on high-priority issues, such as
security attacks or increased suspicious activity. In a dashboard, smart reports and insights resemble the
following image:

In addition to highlighting problem areas, smart reports and insights include recommendations and links to
view and explore data and also take quick actions. For example, if your organization suddenly has a high number
of email messages being marked as spam by end users, you might be advised to revisit your anti-spam policies
to ensure the right level of protection is in place.
The following walkthroughs illustrate how you can navigate between insights, detailed reports, and dashboards
in the Security & Compliance Center:
Walkthrough: From a dashboard to an insight
Walkthrough: From a detailed report to an insight
Walkthrough: From an insight to a detailed report

Types of reports in the Security & Compliance Center


A wide variety of reports are available in the Security & Compliance Center. (Go to Reports > Dashboard to
get an all-up view.) The following table lists available reports with links to learn more:
TYPE OF INFORMATION HOW TO GET THERE WHERE TO GO TO LEARN MORE

Security & Compliance Center In the Security & Compliance Center, Monitor security and compliance in
reports (all up) go to Reports > Dashboard Office 365
Top insights and recommendations,
and links to Security & Compliance
reports, including data loss prevention
reports, labels, email security reports,
Advanced Threat Protection reports,
and more

Data loss prevention In the Security & Compliance Center, View the reports for data loss
Data loss prevention policy matches, go to Data loss prevention > Policy prevention
false positives and overrides, and links
to create or edit policies

Data governance In the Security & Compliance Center, View the data governance reports
Information about how labels are go to Data governance >
applied, labels classified as records, Dashboard
label trends, and more

Threat management dashboard In the Security & Compliance Center, Security dashboard overview
(this is also referred to as the Security go to Threat management >
dashboard and the Threat Intelligence Dashboard
dashboard)
Threat detections, malware trends, top
targeted users, details about sent and
received email messages, and more

Threat explorer (also referred to as In the Security & Compliance Center, Use Explorer in the Security &
Explorer) go to Threat management > Compliance Center
Suspected malware detected in email Explorer
and files in Office 365

Advanced Threat Protection and In the Security & Compliance Center, View reports for Office 365 Advanced
email security reports go to Reports > Dashboard Threat Protection
Email security and threat protection
reports (including malware, spam, View email security reports in the
phishing, and spoofing reports) Security & Compliance Center

Mail flow In the Security & Compliance Center, Mail flow insights in the Office 365
Information about sent and received go to Mail flow > Dashboard Security & Compliance Center
email messages, recent alerts, top
senders and recipients, email
forwarding reports, and more

GDPR compliance In the Security & Compliance Center, Office 365 Information Protection for
Information about GDPR compliance, go to Data privacy > GDPR GDPR
including links to data subjects, label dashboard
trends, and active & closed cases

Audit log In the Security & Compliance Center, Search the audit log in the Office 365
Information about Office 365 activities, go to Search & investigation > Security & Compliance Center
users, files or folders, and more Audit log search
TYPE OF INFORMATION HOW TO GET THERE WHERE TO GO TO LEARN MORE

Compliance reports In the Security & Compliance Center, Plan for security & compliance in Office
FedRAMP reports, governance, risk go to Service assurance > 365
and compliance reports, ISO Compliance reports
information security management
reports, and Service Organization
Controls audit and assessment reports

Next steps
Now that you have an overview of reports and insights, your next step is to learn how to customize, manage,
and download reports. See the following articles:
Create a schedule for a report in the Security & Compliance Center
Manage schedules for multiple reports in the Security & Compliance Center
Download a custom report in the Security & Compliance Center
Download existing reports in the Security & Compliance Center

Related topics
Monitor security and compliance in Office 365
Protect against threats in Office 365
View email security reports in the Security &
Compliance Center
11/27/2018 • 6 minutes to read • Edit Online

A variety of email security reports are available in the Security & Compliance Center to help you see how anti-
spam and anti-malware features in Office 365 are protecting your organization. If you have the necessary
permissions, you can view these reports in the Security & Compliance Center by going to Reports > Dashboard.

Your email security reports include the following:


Threat Protection Status report (new!)
Malware Detections report
Top Malware report
Top Senders and Recipients report
Spoof Mail report
Spam Detections report
Sent and received email report
User-reported messages report (new!)

Threat Protection Status report (new!)


The new Threat Protection Status report is a smart report that shows malicious email that was detected and
blocked by Exchange Online Protection. This report shows information about email identified as malware or a
phishing attempt.

NOTE
A Threat Protection Status report is available to customers who have either Office 365 ATP or Exchange Online Protection
(EOP); however, the information that is displayed in the Threat Protection Status report for ATP customers will likely contain
different data than what EOP customers might see. For example, EOP customers can view information about malware
detected in email, but not information about malicious files detected in SharePoint Online, OneDrive, or Microsoft Teams, an
ATP-specific capability. (Learn more about ATP reports.)

To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Threat Protection
Status.

When you first open the Threat Protection Status report, the report shows data for the past seven days by default;
however, you can click Filters and change the date range for up to 90 days of detail. This report is useful for
viewing the effectiveness and impact of your organization's Exchange Online Protection features, and for longer-
term trending.

You can also choose whether to view data for email identified as malicious, email identified as a phishing attempts,
or email identified as containing malware.

Malware Detections report


The Malware Detections report shows how many incoming and outgoing messages were detected as
containing malware for your organization.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Malware Detections.

Similar to other reports, like the Threat Protection Status report, the report displays data for the past seven days
by default. However, you can choose Filters to change the date range.

Top Malware report


The Top Malware report shows the various kinds of malware that was detected by Exchange Online.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Top Malware.

When you hover over a wedge in the pie chart, you can see the name of a kind of malware and how many
messages were detected as having that malware.
Click (or tap) the report to open it in a new browser window, where you can get a more detailed view of the report.

Below the chart, you'll see a list of detected malware and how many messages were detected as having that
malware.
Top Senders and Recipients report
The Top Senders and Recipients report is a pie chart showing your top email senders.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Top Senders and
Recipients.

When you hover over a wedge in the pie chart, you can see a count of messages sent or received.
Click (or tap) the report to open it in a new browser window, where you can get a more detailed view of the report.
Use the Show data for list to choose whether to view data for top senders, receivers, spam recipients, and
malware recipients. You can also see who received malware that was detected by Advanced Threat Protection.

Below the chart, you'll see who the top email senders or recipients were, along with a count of messages sent or
received for the given time period.

Spoof Mail report


The Spoof Mail report shows how many spoof mail messages were detected, and of those, which ones were
considered "good" (spoof mail done for legitimate business reasons).
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Spoof Mail.
When you hover over a day in the chart, you can see how many spoof mail messages came through.
Click (or tap) the report to open it in a new browser window, where you can get a more detailed view of the report.

Spam Detections report


The Spam Detections report shows all the spam content blocked by Exchange Online.
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Spam Detections.

When you hover over a day in the chart, you can see how many items were blocked that day, as well as how those
items are categorized. For example, you can see how many spam messages were filtered, and how many items
came from a blocked Internet Protocol (IP ) address.
Click (or tap) the report to open it in a new browser window, where you can get a more detailed view of the report.

Below the chart, you'll see a list of spam items that were detected. Select an item to view additional information,
such as whether the spam item was inbound or outbound, its message ID, and its recipient.
Sent and received email report
The Sent and received email report is a smart report that shows information about incoming and outgoing
email, including spam detections, malware, and email identified as "good."
To view this report, in the Security & Compliance Center, go to Reports > Dashboard > Sent and received
email.

When you hover over a day in the chart, you can see how many messages came in, and how those messages are
categorized. For example, you can see how many messages were detected as containing malware, and how many
were identified as spam.
Click (or tap) the report to open it in a new browser window, where you can get a more detailed view of the report.
You can use the Break down by list to view information by type or by direction (incoming and outgoing).

Below the chart, you'll see a list of email categories, such as GoodMail, SpamContentFiltered, and so on. Select
a category to view additional information, such as actions that were taken for malware, and whether email was
incoming or outgoing.
User-reported messages report (new!)
The User-reported messages report shows information about email messages that users have reported as junk,
phishing attempts, or good mail by using the Report Message add-in.
Details are available for each message, including the delivery reason, such a spam policy exception or mail flow
rule configured for your organization. To view details, select an item in the user-reports list, and then view the
information on the Summary and Details tabs.

To view this report, in the Security & Compliance Center, do one of the following:
Go to Threat management > Dashboard > User-reported messages.
Go to Threat management > Review > User-reported messages.

IMPORTANT
In order for the User-reported messages report to work correctly, audit logging must be turned on for your Office 365
environment. This is typically done by someone who has the Audit Logs role assigned in Exchange Online. For more
information, see Turn Office 365 audit log search on or off.

What permissions are needed to view these reports?


In order to view and use the reports described in this article, you must have an appropriate role assigned in both
the Security & Compliance Center and the Exchange Admin Center.
For the Security & Compliance Center, you must have one of the following roles assigned:
Organization Management
Security Administrator
Security Reader
For Exchange Online, you must have one of the following roles assigned:
Organization Management
View -only Organization Management
View -Only Recipients role
Compliance Management
To learn more, see the following resources:
Permissions in the Office 365 Security & Compliance Center
Feature permissions in Exchange Online

What if the reports aren't showing data?


If you are not seeing data in your reports, double-check that your policies are set up correctly. To learn more, see
Anti-spam and anti-malware protection in Office 365.

Related topics
Office 365 Email Anti-Spam Protection
Reports and insights in the Office 365 Security & Compliance Center
Create a schedule for a report in the Security & Compliance Center
Set up and download a custom report in the Security & Compliance Center
Walkthrough - From a detailed report to an insight
11/27/2018 • 2 minutes to read • Edit Online

If you're new to reports and insights in the Office 365 Security & Compliance Center, it might help to see how you
can easily navigate from a detailed report to an insight and recommended actions.
This is one of several walkthroughs for the Security & Compliance Center. To see additional walkthroughs, see the
Related topics section.

Walkthrough: From a detailed report to an insight


Let's walk through the flow from a detailed report to an insight and actions. (This is a brief anti-spam and anti-
malware example.)
1. We begin with Security & Compliance Center reports. (Go to Reports > Dashboard.)

2. We choose a report to get a more detailed view. (Choose a report, such as the Threat Protection Status
report.)

3. We notice an insights indicator in the chart as well as below the report. Positioning the mouse pointer on
the insights marker gives some additional details. (Hover over the insights marker to see additional details.)
4. Clicking either the insights marker in the chart or the insights widget about malware below the chart opens
a details pane. (Below the chart, select the insights widget.)
The details pane provides information and recommendations to consider, including reviewing policies,
conducting further exploration, and editing status. (Learn more about anti-spam and anti-malware
protection in Office 365.)
In this way, we can move from a detailed report to an insight and recommended actions.

Related topics
Walkthrough: From an insight to a detailed report
Walkthrough: From a dashboard to an insight
Walkthrough - From an insight to a detailed report
11/27/2018 • 2 minutes to read • Edit Online

If you're new to reports and insights in the Office 365 Security & Compliance Center, it might help to see how you
can easily navigate from an insight to a detailed report.
This is one of several walkthroughs for the Security & Compliance Center. To see additional walkthroughs, see the
Related topics section.

From an insight to a detailed report


Let's walk through the flow from the dashboard to an insight to a detailed report for data exploration. (This is a
brief data loss prevention example.)
1. We begin with a dashboard in the Security & Compliance Center. (Go to Reports > Dashboard.)

2. In the upper left corner of the dashboard, next to Top insights & recommendations, we have a link. (Click
View all.)

This takes us to a list of insights for our organization.

3. Selecting an item in the list opens a pane where we can view more details about that item. (Click an item.)
We see recommended actions we should consider, such as reviewing policies. (Learn more about data loss
prevention policies.)
4. We also have a link to view more details. (Click See related activity in Explorer.)
This takes us to a report type called Explorer (also referred to as Threat explorer), where we can apply filters
and drill into specific details.

In this way, we can move easily from an insight into its underlying details, and make more informed decisions
about data loss prevention for an organization.

Related topics
Walkthrough: From a detailed report to an insight
Walkthrough: From a dashboard to an insight
Walkthrough - From a dashboard to an insight
11/27/2018 • 2 minutes to read • Edit Online

If you're new to reports and insights in the Office 365 Security & Compliance Center, it might help to see how you
can easily navigate from a dashboard to an insight and recommended actions.
This is one of several walkthroughs for the Security & Compliance Center. To see additional walkthroughs, see the
Related topics section.

Walkthrough: From a dashboard to an insight


Let's walk through the flow from a dashboard to a report to an insight and action. (This is a brief spoof intelligence
example.)
1. We begin with the Security dashboard in the Security & Compliance Center. (Go to Threat management
> Dashboard.)

2. In the Insights row, we notice an insight indicating we need to review some domains that might be
suspicious. (In the Insights row, click Domain pairs.)

3. We get a list of activities related to spoof intelligence. These are instances where email messages were sent
that look like they came from our organization but were, in fact, sent from another organization. The goal is
to determine whether the spoofed messages are authorized or not.
In this list, we can sort the information by message count, date the spoofing was last detected, and more.
(Click column headings, such as Message count or Last seen to see how sorting works.)
4. Selecting an item in the list opens a details pane where we can see additional information, including similar
email messages that were detected. (Click an item in the list, and review the information and
recommendations.)

5. Notice that at the top of the pane, we have the option to add the sender to our organization's allowed
senders list. (Do not select Add to 'AllowedtoSpoof' sender allow list until you are sure you want to do
this. Learn more about spoof intelligence.)

In this way, we can move from a dashboard to insights and recommended actions.

Related topics
Walkthrough: From an insight to a detailed report
Walkthrough: From a detailed report to an insight
Create a schedule for a report in the Security &
Compliance Center
11/27/2018 • 2 minutes to read • Edit Online

In the Security & Compliance Center, several reports and insights are available to help your organization's
security team mitigate and address threats to your organization. If you're a member of your organization's security
team, you can create a schedule for a report. The schedule you create can include a custom date ranges to suit
your organization.

Create a schedule for a report


IMPORTANT
Make sure that you have the necessary permissions to perform this task. In general, Office 365 global administrators,
security administrators, and security readers can access reports in the Security & Compliance Center. To learn more about
permissions, see Permissions in the Office 365 Security & Compliance Center.

1. In the Security & Compliance Center, go to Reports > Dashboard.


2. Choose a report. For this example, we'll choose the Threat Protection Status report.
3. In the upper left corner of the report, choose + Create schedule.

The Create schedule dialog box opens.


4. Keep the default settings and choose Create schedule, or choose Customize schedule.
If you choose to customize your report schedule, you can specify the report's frequency, a sender's email
address, and a recipient's email address.
Once you have created a schedule for a report, that report will be delivered via email to recipients' emali
addresses automatically.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Manage schedules for reports in the Security & Compliance Center
Download existing reports in the Security & Compliance Center
Download a custom report in the Security & Compliance Center
Manage schedules for multiple reports in the Security
& Compliance Center
7/18/2018 • 2 minutes to read • Edit Online

In the Security & Compliance Center, several reports and insights are available to help your organization's
security team mitigate and address threats to your organization. If you're a member of your organization's security
team, you can manage schedules for one or more reports.

Manage schedules for reports


IMPORTANT
Make sure that you have the necessary permissions assigned in the Office 365 Security & Compliance Center. In general,
Office 365 global administrators, security administrators, and security readers can access reports in the Security &
Compliance Center.

1. In the Security & Compliance Center, go to Reports > Manage schedules.


2. Select an item in the list.
3. Review the information for the report's schedule.
4. As appropriate, edit or delete the schedule, and then click Close.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Create a schedule for a report in the Security & Compliance Center
Download a custom report in the Security & Compliance Center
Download existing reports in the Security & Compliance Center
Set up and download a custom report in the Security
& Compliance Center
11/27/2018 • 2 minutes to read • Edit Online

In the Security & Compliance Center, several reports and insights are available to help your organization's
security team mitigate and address threats to your organization. If you're a member of your organization's
security team, you can configure a report with custom date ranges and filters, and then download your custom
report.

Download a custom report


IMPORTANT
Make sure that you have the necessary permissions for the Office 365 Security & Compliance Center. In general, Office 365
global administrators, security administrators, and security readers can access reports in the Security & Compliance Center.

1. In the Security & Compliance Center, go to Reports > Dashboard.


2. Choose a report. (For this example, we'll use the Message Disposition Report.)

3. In the upper left corner of the report, choose Request report.


4. In the Request report dialog box, specify a name, start date, and end date for the report. Then choose
Next.

5. Specify any filters you want to use for the report. (For example, you might specify a client IP address for
the Message Disposition Report.) Then choose Next.
6. Specify email recipients for the report, and then choose Save.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Create a schedule for a report in the Security & Compliance Center
Manage schedules for reports in the Security & Compliance Center
Download existing reports in the Security & Compliance Center
Download existing reports in the Security &
Compliance Center
11/27/2018 • 2 minutes to read • Edit Online

In the Security & Compliance Center, several reports and insights are available to help your organization's
security team mitigate and address threats to your organization. If you're a member of your organization's security
team, you can download one or more existing reports.

Download existing reports


IMPORTANT
Make sure that you have the necessary permissions assigned in the Office 365 Security & Compliance Center. In general,
Office 365 global administrators, security administrators, and security readers can access reports in the Security &
Compliance Center.

1. In the Security & Compliance Center, go to Reports > Reports for download.
2. Select one or more items in the list.
3. Click Download report, and then click Close.

Related topics
Reports and insights in the Office 365 Security & Compliance Center
Create a schedule for a report in the Security & Compliance Center
Manage schedules for reports in the Security & Compliance Center
Download a custom report in the Security & Compliance Center
Enable or disable safety tips in Office 365
12/5/2018 • 2 minutes to read • Edit Online

Exchange Online Protection (EOP ) adds, or stamps, a safety tip to email messages that it delivers. These safety tips
provide recipients with a quick, visual way to determine if a message is from a safe, verified sender, if the message
has been marked as spam by Office 365, if the message contains something suspicious such as a phishing scam, or
if external images have been blocked. Office 365 and EOP -standalone admins can edit a spam policy setting to
enable or disable safety tips from being displayed in email in Outlook and other desktop email clients.
Office 365 enables safety tips by default for your organization and we recommend that you leave them enabled to
help combat spam and phishing attacks. You can't disable safety tips for Outlook on the web.
To see examples and to learn about the information displayed in safety tips, see Safety tips in email messages in
Office 365.
In this topic:
To enable or disable safety tips by using the Office 365 Security & Compliance Center
To enable or disable safety tips by using PowerShell

To enable or disable safety tips by using the Office 365 Security &
Compliance Center
1. Go to https://protection.office.com.
2. Sign in to Office 365 with your work or school account.
3. Choose Threat Management > Policy.
4. On the Policy page, choose Anti-Spam.

5. On the Anti-spam settings page choose the Custom tab.


6. If necessary, choose the Custom settings switch to turn on custom settings. If the custom settings switch is
set to Off, you won't be able to modify spam filter policies.

7. Expand the spam policy you want to modify and then choose Edit policy. For example, choose the down
arrow next to Default spam filter policy. Or, if you want, you can create a new policy by choosing Add a
policy.
8. Expand Spam and bulk actions.
9. To enable safety tips, under Safety Tips, check the On checkbox. To disable safety tips, clear the On
checkbox.
10. Choose Save.

To enable or disable safety tips by using PowerShell


Admins can use Exchange Online PowerShell to enable or disable safety tips. Use the Set-
HostedContentFilterPolicy cmdlet to enable or disable safety tips in a spam filter policy.
1. Connect to Exchange Online PowerShell. For information, see Connect to Exchange Online PowerShell.
2. Run the Set-HostedContentFilterPolicy cmdlet to enable or disable safety tips:

Set-HostedContentFilterPolicy -Identity "policy name " -InlineSafetyTipsEnabled <$true|$false>

Where:
policy name is the name of the policy you want to modify, for example default.
$true enables safety tips for the spam filter policy.
$false disables safety tips for the spam filter policy.
For example, to disable safety tips for the default spam filter policy, run the following command:

PS C:\> Set-HostedContentFilterPolicy -Identity "default" -InlineSafetyTipsEnabled $false

For more information about this cmdlet, see Set-HostedContentFilterPolicy.

Still need help?


If you disabled safety tips but are still seeing them in your email messages, check these things:
You can't disable safety tips for Outlook on the web. Try viewing the same email in another client, such as
Outlook.
Safety tips are on by default for every one who uses EOP, this includes everyone who has Office 365. In
order to disable safety tips from showing up in email, you must disable them by using a spam filter policy as
described in this topic. Once you've set up the policy, ensure that it is enabled. For information on enabling
spam filter policies, see Configure your spam filter policies.
For more ways to combat spam and phishing, see Office 365 Email Anti-Spam Protection.
Enable the Report Message add-in
11/27/2018 • 4 minutes to read • Edit Online

Overview
The Report Message add-in for Outlook and Outlook on the Web enables people to easily report misclassified
email, whether safe or malicious, to Microsoft and its affiliates for analysis. Microsoft uses these submissions to
improve the effectiveness of email protection technologies. In addition, if your organization is using Office 365
Advanced Threat Protection or Office 365 Threat Intelligence, the Report Message add-in provides your
organization's security team with useful information they can use to review and update security policies.
For example, suppose that people are reporting a lot of messages as phishing. This information surfaces in the
Security Dashboard and other reports. Your organization's security team can use this information as an indication
that anti-phishing policies might need to be updated. Or, if people are reporting a lot of messages that were
flagged as junk mail as Not Junk by using the Report Message add-in, your organization's security team might
need to adjust anti-spam policies.
The Report Message add-in works with your Office 365 subscription and the following products:
Outlook on the Web
Outlook 2013 SP1
Outlook 2016
Outlook 2016 for Mac
Outlook included with Office 365 ProPlus
If you're an individual user, you canenable the Report Message add-in for yourself.
If you're an Office 365 global administrator or an Exchange Online administrator, and Exchange is configured to
use OAuth authentication, you can enable the Report Message add-in for your organization. The Report Message
Add-In is now available through Centralized Deployment.

Get the Report Message add-in for yourself


1. In Microsoft AppSource, search for the Report Message add-in.
2. Choose GET IT NOW.

3. Review the terms of use and privacy policy. Then choose Continue.
4. Sign in to your Office 365 email using your work or school account (for business use) or your Microsoft
account (for personal use).
After the add-in is installed and enabled, you'll see the following icons:
In Outlook the icon looks like this:

In Outlook Web App the icon looks like this:

As a next step, learn how to Use the Report Message add-in.

Get and enable the Report Message add-in for your organization
IMPORTANT
You must be an Office 365 global administrator or an Exchange Online Administrator to complete this task. In addition,
Exchange must be configured to use OAuth authentication To learn more, see Exchange requirements (Centralized
Deployment of add-ins).

1. Go to the Services & add-ins page in the new Microsoft 365 admin center.

2. Choose + Deploy Add-in.

3. In the New Add-In screen, review the information, and then choose Next.
4. Select I want to add an Add-In from the Office Store, and then choose Next.

5. Search for Report Message, and in the list of results, next to the Report Message Add-In, choose Add.
6. On the Report Message screen, review the information, and then choose Next.

7. Specify the user default settings for Outlook, and then choose Next.

8. Specify who gets the Report Message Add-in, and then choose Save.
TIP
We recommend setting up a rule to get a copy of email messages reported by your users

Depending on what you selected using the wizard, people in your organization will have the Report Message add-
in available. People in your organization will see the following icons:
In Outlook the icon looks like this:

In Outlook Web App the icon looks like this:

Set up a rule to get a copy of email messages reported by your users


IMPORTANT
You must be an Exchange Online Administrator to perform this task.

You can set up a rule to get a copy of email messages reported by users in your organization. You do this after
you have downloaded and enabled the Report Message add-in for your organization.
1. In the Exchange Admin Center, choose mail flow > rules.
2. Choose + > Create a new rule.
3. In the Name box, type a name, such as Submissions.
4. In the Apply this rule if list, choose The recipient address includes....
5. In the specify words or phrases screen, add junk@office365.microsoft.com and
phish@office365.microsoft.com , and then choose OK.
6. In the Do the following... list, choose Bcc the message to....
7. Add a global administrator, security administrator, and/or security reader who should receive a copy of
each email message that people report to Microsoft, and then choose OK.

8. Select Audit this rule with severity level, and choose Medium.
9. Under Choose a mode for this rule, choose Enforce.
10. Choose Save.
With this rule in place, whenever someone in your organization reports an email message using the Report
Message add-in, your global administrator, security administrator, and/or security reader will receive a copy of
that message. This information can enable you to set up or adjust policies, such as Office 365 ATP Safe Links
policies.

Review or edit settings for the Report Message add-in


You can review and edit the default settings for the Report Message Add-In in the Services & Add-Ins page.

IMPORTANT
You must be an Office 365 global administrator or an Exchange Online Administrator to complete this task.

1. Go to the Services & add-ins page in the new Microsoft 365 admin center.

2. Find and select the Report Message Add-In.


3. On the Report Message screen, review and edit settings as appropriate for your organization.

Learn how to use the Report Message add-in


See Use the Report Message add-in.

Related topics
Use the Report Message add-in
View email security reports in the Security & Compliance Center
View reports for Office 365 Advanced Threat Protection
Use Explorer in the Security & Compliance Center
Microsoft Security Guidance for Political Campaigns,
Nonprofits, and Other Agile Organizations
8/28/2018 • 2 minutes to read • Edit Online

Summary: Planning and implementation guidance for fast-moving organizations that have an increased threat
profile.
If your organization is agile, you have a small IT team, and your threat profile is higher than average, this
guidance is designed for you. This solution demonstrates how to quickly build an environment with essential
cloud services that include secure controls from the start. This guidance includes prescriptive security
recommendations for protecting data, identities, email, and access from mobile devices.

Security solution guidance


This guidance describes how to implement a secure cloud environment. The solution guidance can be used by any
organization. It includes extra help for agile organizations with BYOD access and guest accounts. You can use this
guidance as a starting-point for designing your own environment. We welcome your feedback at
CloudAdopt@microsoft.com.

Item Description

Microsoft Security Guidance for Political Campaigns This guidance uses a political campaign organization as an
example. Use this guidance as a starting point for any
environment.

PDF | Visio

Microsoft Security Guidance for Nonprofits This guide is slightly revised for nonprofit organizations. For
example, it references Office 365 Nonprofit plans. The
technical guidance is the same as the political campaign
solution guide.

PDF | Visio

Test Lab Guides


To create a dev/test environment for this solution, use the following test lab guides:
Configure groups and users for a political campaign dev/test environment
Create trial subscriptions for Office 365 and EMS and then create groups and users for a representative
political campaign.
Create team sites in a political campaign dev/test environment
Create four SharePoint Online team sites with Internal, Private, Sensitive, and Highly Confidential levels of
security.
For additional security features for demonstration or proof of concept, see Office 365 Test Lab Guides.

See Also
Cloud adoption Test Lab Guides (TLGs)
Microsoft Cloud IT architecture resources
Configure groups and users for a political campaign
dev/test environment
9/27/2018 • 5 minutes to read • Edit Online

Summary: Create Office 365 and Enterprise Mobility + Security (EMS ) trial subscriptions with users and groups
for a political campaign dev/test environment.
Use the instructions in this article to create a dev/test environment that includes simplified user accounts and
groups for the Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
solution.

Phase 1: Create your Office 365 dev/test environment


In this phase, you obtain trial subscriptions for Office 365 E5 and Enterprise Mobility + Security (EMS ) E5 for a
fictional organization that represents a political campaign.
First, follow the instructions in Phase 2 of the Office 365 dev/test environment.
Next, sign up for the EMS E5 trial subscription and add it to the same organization as your Office 365 trial
subscription.
1. If needed, sign in to the Office 365 portal with the credentials of the global administrator account of your
trial subscription. For help, see Where to sign in to Office 365.
2. Click the Admin tile.
3. On the Office Admin center tab in your browser, in the left navigation, click Billing > Purchase services.
4. On the Purchase services page, find the Enterprise Mobility + Security E5 item. Hover your mouse
pointer over it and click Start free trial.
5. On the Confirm your order page, click Try now.
6. On the Order receipt page, click Continue.
Next, enable the EMS E5 license for your global administrator account.
1. On the Office 365 Admin center tab in your browser, in the left navigation, click Users > Active users.
2. Click your global administrator account, and then click Edit for Product licenses.
3. On the Product licenses pane, turn the product license for Enterprise Mobility + Security E5 to On,
click Save, and then click Close twice.

Phase 2: Create and configure your Azure Active Directory (AD) groups
In this phase, you create and configure the Azure AD groups for your campaign.
First, create a set of groups for a typical political campaign with the Azure portal.
1. On a separate tab in your browser, go to the Azure portal at https://portal.azure.com. If needed, sign in with
the credentials of the global administrator account for your Office 365 E5 trial subscription.
2. In the Azure portal, click Azure Active Directory > Users and groups > All groups.
3. Do the following steps for each group name in this list:
Senior and strategic staff
IT staff
Analytics staff
Regular core staff
Operations staff
Field staff
1. On the All groups blade, click + New group.
2. Type the group name from the list in Name.
3. Select Dynamic user in Membership.
4. Click Yes for Enable Office features.
5. Click Add dynamic query.
6. In Add users where, select department.
7. In the next field, select Equals.
8. In the next field, type the group name from the list.
9. Click Add query, and then click Create.
10. Click Users and groups - All groups.
Next, you configure the groups so that members are automatically assigned Office 365 E5 and EMS E5 licenses.
1. In the Azure portal, click Azure Active Directory > Licenses > All products.
2. In the list, select Enterprise Mobility + Security E5 and Office 365 Enterprise E5, and then click +
Assign.
3. In the Assign license blade, click Users and groups.
4. In the list of groups, select the following:
Analytics staff
Field staff
IT staff
Operations staff
Regular core staff
Senior and strategic staff
5. Click Select, and then click Assign.
6. Close the Azure portal tab in your browser.

Phase 3: Add your user accounts


In this phase, you add the example user accounts for your political campaign.
First, you Connect with the Azure Active Directory V2 PowerShell module.
Next, you fill in your organization name, your location, and a common password, and then run these commands
from the PowerShell command prompt or Integrated Script Environment (ISE ):

$orgName="<organization name, such as contoso for the contoso.onmicrosoft.com trial subscription domain name>"
$location="<the ISO ALPHA2 country code, such as US for the United States>"
$commonPassword="<common password for all the new accounts>"

$PasswordProfile=New-Object -TypeName Microsoft.Open.AzureAD.Model.PasswordProfile


$PasswordProfile.Password=$commonPassword

$deptName="Senior and strategic staff"


$userNames=@("Candidate","ChiefOfStaff","Strategic1")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }
$deptName="IT staff"
$userNames=@("ITAdmin1","ITAdmin2")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }
$deptName="Analytics staff"
$userNames=@("DataScientist1")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }
$deptName="Regular core staff"
$userNames=@("Regular1","Regular2")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }
$deptName="Operations staff"
$userNames=@("Operations1")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }
$deptName="Field staff"
$userNames=@("FieldConsultant1")
foreach ($element in $userNames){ New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -
UserPrincipalName ($element + "@" + $orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName
$element -Department $deptName -UsageLocation $location }

IMPORTANT
The use of a common password here is for automation and ease of configuration for a dev/test environment. This is not
recommended for production subscriptions. As you sign in with each of these new user accounts, you will be prompted to
change the password.

Use these steps to verify that dynamic group membership and group-based licensing are working correctly.
1. From the Microsoft Office Home tab of your browser, click the Admin tile.
2. From the new Office Admin center tab of your browser, click Users.
3. In the list of users, click Candidate.
4. In the pane that lists the properties of the Candidate user account, verify that:
It is a member of the Senior and strategic staff group (in Group memberships).
It has been assigned the Enterprise Mobility + Security E5 and Office 365 Enterprise E5 licenses (in
Product licenses).
5. Close the Candidate user account pane.

Record values for future reference


Record these values for working with the Office 365 and EMS trial subscriptions for this dev/test environment:

Your trial subscription organization name:


For example, for the trial subscription domain name of contoso.onmicrosoft.com, the organization name is
"contoso".

The Office 365 global administrator name: .onmicrosoft.com


Record the password for this account and the common initial password for the other user accounts in a
secure location.

Next step
Build the four different types of SharePoint Online team sites in this dev/test environment with Create team sites
in a political campaign dev/test environment.

See also
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Create team sites in a political campaign dev/test environment
Cloud adoption Test Lab Guides (TLGs)
Cloud adoption and hybrid solutions
Create team sites in a political campaign dev/test
environment
9/27/2018 • 14 minutes to read • Edit Online

Summary: Create public, private, sensitive, and highly confidential SharePoint Online team sites in your political
campaign dev/test environment.
Use the instructions in this article to create a dev/test environment that includes the four different types of
SharePoint Online team sites for the Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other
Agile Organizations solution. These sites are described in detail on Topic 10, titled SharePoint and OneDrive for
Business.

Phase 1: Create your political campaign dev/test environment


First, follow the instructions in Configure groups and users for a political campaign dev/test environment to create
your subscriptions, users, and groups.

Phase 2: Create Office 365 labels


In this phase, you create the labels for the different levels of security for SharePoint Online team site document
folders.
1. If needed, sign in to the Office 365 portal with the credentials of the global administrator account of your
trial subscription. For help, see Where to sign in to Office 365.
2. From the Microsoft Office Home tab, click the Admin tile.
3. From the new Office Admin center tab of your browser, click Admin centers > Security & Compliance.
4. From the new Home - Security & Compliance tab of your browser, click Classifications > Labels.
5. From the Home > Labels pane, click Create a label.
6. On the Name your label pane, type Internal, and then click Next.
7. On the Label settings pane, click Next.
8. On the Review your settings pane, click Create this label, and then click Close.
9. Repeat steps 5-8 for these additional labels:
Private
Sensitive
Highly Confidential
10. From the Home > Labels pane, click Publish labels.
11. On the Choose labels to publish pane, click Choose labels to publish.
12. On the Choose labels pane, click Add and select all four labels.
13. Click Done.
14. On the Choose labels to publish pane, click Next.
15. On the Choose locations pane, click Next.
16. On the Name your policy pane, type Campaign in Name, and then click Next.
17. On the Review your settings pane, click Publish labels, and then click Close.

Phase 3: Create your SharePoint Online team sites


In this phase, you create and configure SharePoint Online team sites for your political campaign corresponding to
the four types of SharePoint Online team sites.
Campaign wide team site
To create a baseline public SharePoint Online team site, do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal
(https://portal.office.com) using your global administrator account.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type Campaign wide.
6. In Team site description, type SharePoint site for the entire campaign.
7. In Privacy settings, select Public - anyone in the organization can access this site, and then click
Next.
8. On the Who do you want to add? pane, click Finish.
Next, configure the documents folder of the Campaign wide team site for the Internal label.
1. In the Campaign wide-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Internal, and then click Save.
Campaign project 1 team site
To create a baseline private SharePoint Online team site for a project within the campaign, do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal
(https://portal.office.com) using your global administrator account.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type Campaign project 1.
6. In Team site description, type SharePoint site for Campaign project 1.
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
Next, configure the documents folder of the Campaign project 1 team site for the Private label.
1. In the Campaign project 1-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Private, and then click Save.
Campaign marketing team site
To create a sensitive-level isolated SharePoint Online team site for campaign marketing resources, do the
following:
1. Using a browser on your local computer, sign in to the Office 365 portal (https://portal.office.com) using
your global administrator account.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Team site name, type Campaign marketing.
6. In Team site description, type SharePoint site for campaign marketing (sensitive).
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
9. On the new Campaign marketing tab in your browser, in the tool bar, click the settings icon, and then click
Site permissions.
10. In the Site permissions pane, click Advanced permissions settings.
11. In the new Permissions tab in your browser, click Access Request Settings.
12. In the Access Request Settings dialog box, clear the Allow members to share the site and individual
files and folders and Allow members to invite others to the site members group check boxes, type
ITAdmin1@ .onmicrosoft.com in Send all requests for access, and then click OK.
13. Click Campaign marketing Members in the list.
14. On the People and Groups page, click New.
15. In the Share dialog box, type Senior and strategic staff, select it, and then click Share.
16. Repeat steps 14 and 15 for the Analytics staff group and the Regular1 user account.
17. Click the back button on your browser.
18. Click Campaign marketing Owners in the list.
19. On the People and Groups page, click New.
20. In the Share dialog box, type IT staff, select it, and then click Share.
21. Click the back button on your browser.
22. Close the People and Groups tab in your browser, click the Campaign marketing-Home tab in your
browser, and then close the Site permissions pane.
Here are the results of configuring permissions:
The Campaign marketing-Members SharePoint group contains only the Senior and strategic staff
group (which contains the Candidate, ChiefOfStaff, and Strategic1 user accounts), the Campaign
marketing group (which contains the global administrator user account), the Analytics staff group (which
contains the DataScientist1 user account), and the Regular1 user account.
The Campaign marketing-Owners SharePoint group contains only the IT staff group (which contains
only the ITAdmin1 and ITAdmin2 user accounts).
The Campaign marketing-Visitors SharePoint group contains no groups or user accounts.
Members cannot modify site-level permissions (this can only be done by members of the Campaign
marketing-Owners group).
Other user accounts cannot access the site or its resources, but can request access to the site, which will
send an email to the ITAdmin1 user account mailbox.
Next, configure the documents folder of the Campaign marketing team site for the Sensitive label.
1. In the Campaign marketing-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Sensitive, and then click Save.
Next, configure a data loss prevention (DLP ) policy that notifies users when they share a document on a
SharePoint Online team site with the Sensitive label outside the organization. This DLP policy will apply to
resources in the Campaign marketing site.
1. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
2. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
3. In the Data loss prevention pane, click + Create a policy.
4. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
5. In the Name your policy pane, type Sensitive label SharePoint Online team sites in Name, and then
click Next.
6. In the Choose locations pane, click Let me choose specific locations, and then click Next.
7. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
8. In the Customize the types of sensitive info you want to protect pane, click Edit.
9. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
10. In the Labels pane, click + Add, select the Sensitive label, click Add, and then click Done.
11. In the Choose the types of content to protect pane, click Save.
12. In the Customize the types of sensitive info you want to protect pane, click Next.
13. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
14. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
15. In the text box, type or paste in the following:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
16. Click OK.
17. In the What do you want to do if we detect sensitive info? pane, clear the Block people from
sharing, and restrict access to shared content check box, and then click Next.
18. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
19. In the Review your settings pane, click Create, and then click Close.
Campaign strategy team site
To create an isolated SharePoint Online team site at the highly confidential level for campaign strategy resources,
do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal
(https://portal.office.com) using your global administrator account.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Team site name, type Campaign strategy.
6. In Team site description, type SharePoint site for campaign strategy (highly confidential).
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
9. On the new Campaign strategy tab in your browser, in the tool bar, click the settings icon, and then click
Site permissions.
10. In the Site permissions pane, click Advanced permissions settings.
11. In the new Permissions tab in your browser, click Access Request Settings.
12. In the Access Request Settings dialog box, clear Allow members to share the site and individual files
and folders and Allow members to invite others to the site members group (so that all three check
boxes are cleared), and then click OK.
13. Click Campaign strategy Members in the list.
14. On the People and Groups page, click New.
15. In the Share dialog box, type Senior and strategic staff, select it, and then click Share.
16. Click Campaign strategy Owners in the list.
17. On the People and Groups page, click New.
18. In the Share dialog box, type IT staff, select it, and then click Share.
19. Click the back button on your browser.
20. Close the People and Groups tab in your browser, click the Campaign strategy-Home tab in your
browser, and then close the Site permissions pane.
Here are the results of configuring permissions:
The Campaign strategy-Members SharePoint group contains only the Senior and strategic staff group
(which contains only the Candidate, ChiefOfStaff, and Strategic1 user accounts) and the Campaign
strategy group (which contains only the global administrator user account).
The Campaign strategy-Owners SharePoint group contains only the IT staff group (which contains only
the ITAdmin1 and ITAdmin2 user accounts).
The Campaign strategy-Visitors SharePoint group contains no groups or user accounts.
Members cannot modify site-level permissions (this can only be done by members of the Campaign
strategy-Owners group).
Other user accounts cannot access the site or its resources or request access to the site. Additional
permissions to the site must be done by the global administrator or by a member of the Campaign
strategy-Owners group.
Next, configure the documents folder of the Campaign strategy team site for the Highly Confidential label.
1. In the Campaign strategy-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Highly Confidential, and then click Save.
Next, configure a DLP policy that blocks users when they share a document on a SharePoint Online team site with
the Highly Confidential label outside the organization. This DLP policy will apply to resources in the Campaign
strategy site.
1. If needed, use a browser on your local computer and sign in to the Office 365 portal
(https://portal.office.com) with an account that has the Security Administrator or Company Administrator
role.
2. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
3. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
4. In the Data loss prevention pane, click + Create a policy.
5. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
6. In the Name your policy pane, type Highly Confidential label SharePoint Online team sites in
Name, and then click Next.
7. In the Choose locations pane, click Let me choose specific locations, and then click Next.
8. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
9. In the Customize the types of sensitive info you want to protect pane, click Edit.
10. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
11. In the Labels pane, click + Add, select the Highly Confidential label, click Add, and then click Done.
12. In the Choose the types of content to protect pane, click Save.
13. In the Customize the types of sensitive info you want to protect pane, click Next.
14. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
15. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
16. In the text box, type or paste in the following:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
17. Click OK.
18. In the What do you want to do if we detect sensitive info? pane, select Require a business
justification to override, and then click Next.
19. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
20. In the Review your settings pane, click Create, and then click Close.
Use the instructions in Activate Azure RMS with the Office 365 admin center.
Next, configure Azure Information Protection with a new scoped policy and sub-label for protection and
permissions with the following steps:
1. Sign in to the Office 365 portal with an account that has the Security Administrator or Company
Administrator role. For help, see Where to sign in to Office 365.
2. In a separate tab of your browser, go to the Azure portal (https://portal.azure.com).
3. If this is the first time you are configuring Azure Information Protection, see these instructions.
4. In the list pane, click All services, type information, and then click Azure Information Protection.
5. Click Labels.
6. Right-click the Highly Confidential label, and then click Add a sub-label.
7. Type CampaignStrategy in Name and Label for documents in the Campaign strategy team site in
Description.
8. In Set permissions for documents and emails containing this label, click Protect.
9. In the Protection section, click Azure (cloud key).
10. On the Protection blade, under Protection settings, click + Add permissions.
11. On the Add permissions blade, under Specify users and groups, click + Browse directory.
12. On the AAD Users and Groups pane, select Senior and strategic staff, and then click Select.
13. Under Choose permissions from the preset or set custom, click Custom, and then click the View
Rights, Edit Content, Save, Reply, and Reply all check boxes.
14. Click OK twice.
15. On the Sub-label blade, click Save, and then click OK.
16. On the Azure Information protection blade, click Policies > + Add a new policy.
17. Type CampaignStrategy in Name and Documents in the Campaign strategy team site in
Description.
18. Click Select which users or groups get this policy > User/Groups, and then select Senior and
strategic staff.
19. Click Select > OK.
20. Click Add or remove labels. In the Policy: Add or remove labels pane, click CampaignStrategy, and
then click OK.
21. Click Save, and then click OK.
You are now ready to begin creating documents in these four sites and test access to them with various user
accounts.
To protect a document with Azure Information Protection and this new label, you must install the Azure
Information Protection client on a test machine, install Office from the Office 365 portal, and then sign in from
Microsoft Word with an account in the Senior and strategic staff group of your trial subscription.

See Also
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Configure groups and users for a political campaign dev/test environment
Cloud adoption Test Lab Guides (TLGs)
Cloud adoption and hybrid solutions
Secure SharePoint Online sites and files
9/27/2018 • 9 minutes to read • Edit Online

Summary: Configuration recommendations for protecting files in SharePoint Online and Office 365.
This article provides recommendations for configuring SharePoint Online team sites and file protection that
balances security with ease of collaboration. This article defines four different configurations, starting with a
public site within your organization with the most open sharing policies. Each additional configuration represents
a meaningful step up in protection, but the ability to access and collaborate on resources is reduced to the relevant
set of users. Use these recommendations as a starting point and adjust the configurations to meet the needs of
your organization.
The configurations in this article align with Microsoft's recommendations for three tiers of protection for data,
identities, and devices:
Baseline protection
Sensitive protection
Highly confidential protection
For more information about these tiers and capabilities recommended for each tier, see the following resources.
Identity and Device Protection for Office 365
File Protection Solutions in Office 365

Capability overview
Recommendations for SharePoint Online team sites draw on a variety of Office 365 capabilities. For highly
confidential sites, Azure Information Protection is recommended. This is included in Enterprise Mobility +
Security (EMS ).
The following illustration shows the recommended configurations for four SharePoint Online team sites.

As illustrated:
Baseline protection includes two options for SharePoint Online team sites — a public site and private site.
Public sites can be discovered and accessed by anybody in the organization. Private sites can only be
discovered and accessed by members of the site. Both of these site configurations allow for sharing outside
the group.
Sites for sensitive and highly confidential protection are private sites with access limited only to members
of specific groups.
Office 365 labels provide a way to classify data with a needed protection level. Each of the SharePoint
Online team sites are configured to automatically label files in document libraries with a default label for
the site. Corresponding to the four site configurations, the labels in this example are Internal Public, Private,
Sensitive, and Highly Confidential. Users can change the labels, but this configuration ensures all files
receive a default label.
Data loss prevention (DLP ) policies are configured for the Sensitive and Highly Confidential Office 365
labels to either warn or prevent users when they attempt to send these types of files outside the
organization.
If needed for your scenario, you can use Azure Information Protection to encrypt and grants permissions
to files that are highly confidential. This is not recommended for all customers.

Tenant-wide settings for SharePoint Online and OneDrive for Business


SharePoint Online and OneDrive for Business include tenant-wide settings that affect all sites and users. Some of
these settings can also be adjusted at the site level to be more restrictive (but not less). This section discusses
tenant-wide settings that affect security and collaboration.
Sharing
For this solution, we recommend the following tenant-wide settings:
Keep the default sharing policy that allows all sharing with all account types, including anonymous sharing.
Set anonymous links to expire, if desired.
Change the default link type for sharing to Internal. This helps prevent accidental data leakage outside your
organization.
While it might seem counterintuitive to allow external sharing, this approach provides more control over file
sharing compared to sending files in email. SharePoint Online and Outlook work together to provide secure
collaboration on files.
By default, Outlook shares a link to a file instead of sending the file in email.
SharePoint Online and OneDrive for Business make it easy to share links to files with contributors who are
both inside and outside your organization
You also have controls to help govern external sharing. For example, you can:
Disable an anonymous guest link.
Revoke user access to a site.
See who has access to a specific site or document.
Set anonymous sharing links to expire (tenant setting).
Limit who can share outside your organization (tenant setting).
Use external sharing together with data loss prevention (DLP)
If you don't allow external sharing, users with a business need will find alternate tools and methods. Microsoft
recommends you combine external sharing with DLP policies to protect sensitive and highly confidential files.
Device access settings
Device access settings for SharePoint Online and OneDrive for Business let you determine whether access is
limited to browser only (files can't be downloaded) or if access is blocked. These settings are currently in First
Release and apply tenant-wide. Coming soon is the ability to configure device access policies at the site level. For
this solution, we recommend not using device access settings that apply tenant-wide.
To use device access settings while these are in first release: Set up the Standard or First Release Options in Office
365.
OneDrive for Business
Visit these settings to decide if you want to change the default settings for OneDrive for Business sites. Currently,
the sharing and device access settings are duplicated from the SharePoint Online admin center and apply to both
environments.

SharePoint team site configuration


The following table summarizes the configuration for each of the team sites described earlier in this article. Use
these configurations as starting point recommendations and adjust the site types and configurations to meet the
needs of your organization. Not every organization needs every type of site. Only a small number of
organizations require highly confidential protection.

Baseline protection Baseline protection Sensitive protection Highly confidential


#1 #2

Description Open discovery and Private site and group Isolated site, in which Isolated site + file
collaboration within with sharing allowed levels of access are encryption and
the organization. outside the group. defined by permissions with
membership in Azure Information
specific groups. Protection. DLP
Sharing is only prevents users from
allowed to members sending files outside
of the site. DLP warns the organization.
users when
attempting to send
files outside the
organization.

Private or public team Public Private Private Private


site

Who has access? Everybody in the Members of the site Members of the site Members only.
organization, only. Others can only. Others can Others cannot
including B2B users request access. request access. request access.
and guest users.
Site-level sharing Sharing allowed with Sharing allowed with Members cannot Members cannot
controls anybody. Default anybody. Default share access to the share access to the
settings. settings. site. site.
Non-members can Non-members cannot
request access to the request access to the
site, but these site or contents.
requests need to be
addressed by a site
administrator.

Site-level device No additional No additional Site-level controls are Site-level controls are
access controls controls. controls. coming soon, which coming soon, which
prevents users from blocks downloading
downloading files to of files to non-
non-compliant or compliant or non-
non-domain joined domain joined
devices. This allows devices.
browser-only access
from all other devices.

Office 365 labels Internal Public Private Sensitive Highly Confidential

DLP policies Warn users when Block users from


sending files that are sending files that are
labeled as Sensitive labeled as highly
outside the confidential outside
organization. organization. Allow
To block external users to override this
sharing of sensitive by providing
data types, such as justification, including
credit card numbers who they are sharing
or other personal the file with.
data, you can
configure additional
DLP policies for these
data types (including
custom data types
you configure).
Azure Information Use Azure
Protection Information
Protection to
automatically encrypt
and grant
permissions to files.
This protection travels
with the files in case
they are leaked.
Office 365 cannot
read files encrypted
with Azure
Information
Protection.
Additionally, DLP
policies can only work
with the metadata
(including labels) but
not the contents of
these files (such as
credit card numbers
within files).

For the steps to deploy the four different types of SharePoint Online team sites in this solution, see Deploy
SharePoint Online sites for three tiers of protection. For the steps to create a dev/test environment, see Secure
SharePoint Online sites in a dev/test environment.

Office 365 classification and labels


Using Office 365 labels is recommended for environments with sensitive data. After you configure and publish
Office 365 labels:
You can apply a default label to a document library in a SharePoint Online team site, so that all documents
in that library get the default label.
You can apply labels to content automatically if it matches specific conditions.
You can apply DLP policies that are based on Office 365 labels.
People in your organization can apply a label manually to content in Outlook on the web, Outlook 2010
and later, OneDrive for Business, SharePoint Online, and Office 365 groups. Users often know best what
type of content they're working with, so they can classify it and have the appropriate DLP policy applied.
As illustrated, this solution includes creating the following labels:
Highly Confidential
Sensitive
Private
Internal Public
These labels are mapped to the recommended sites in the illustrations and charts earlier in this article. This
solution recommends configuring DLP policies to help prevent the leakage of files labeled as Sensitive and Highly
Confidential.
For the steps to configure Office 365 labels and DLP policies in this solution, see Protect SharePoint Online files
with Office 365 labels and DLP.

Azure Information Protection


If warranted for your security scenario, you can use Azure Information Protection to apply labels and protections
that follow the files wherever they go. Azure Information Protection labels are different than Office 365 labels. For
this solution, we recommend you use a scoped Azure Information Protection policy and a sub-label of the Highly
Confidential label to encrypt and grant permissions to files that need to be protected with the highest level of
security.
Be aware that when Azure Information Protection encryption is applied to files stored in Office 365, the service
cannot process the contents of these files. Co-authoring, eDiscovery, search, Delve, and other collaborative
features do not work. DLP policies can only work with the metadata (including Office 365 labels) but not the
contents of these files (such as credit card numbers within files).
As illustrated:
You configure Azure Information Protection policies and labels in the Microsoft Azure portal. Configuring a
sub-label of a scoped Azure Information Protection policy is recommended.
Azure Information Protection labels show up as an Information protection bar in Office applications.
Adding permissions for external users
There are two ways you can grant external users access to files protected with Azure Information Protection. In
both these cases, external users must have an Azure AD account. If external users aren't members of an
organization that uses Azure AD, they can obtain an Azure AD account as an individual by using this sign-up
page: https://aka.ms/aip-signup.
Add external users to an Azure AD group that is used to configure protection for a label
You'll need to first add the account as a B2B user in your directory. It can take a couple of hours for group
membership caching by Azure Rights Management. With this method, permissions are granted to all
existing files protected with the label (even files protected before a user is added to the Azure AD group).
Add external users directly to the label protection
You can add all users from an organization (e.g. Fabrikam.com), an Azure AD group (such as a finance
group within an organization), or an individual user. For example, you can add an external team of
regulators to the protection for a label. With this method, permissions are granted only to files protected
with the label after the external entity is added to the protection.
Deploying and using Azure Information Protection
For the steps to configure Azure Information Protection in this solution, see Protect SharePoint Online files with
Azure Information Protection.

See Also
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Cloud adoption and hybrid solutions
Secure SharePoint Online sites in a dev/test environment
Deploy SharePoint Online sites for three tiers of
protection
9/27/2018 • 8 minutes to read • Edit Online

Summary: Create and configure SharePoint Online team sites for various levels of information protection.
Use the steps in this article to design and deploy baseline, sensitive, and highly confidential SharePoint Online
team sites. For more information about these three tiers of protection, see Secure SharePoint Online sites and files.

Baseline SharePoint Online team sites


Baseline protection includes both public and private team sites. Public team sites can be discovered and accessed
by anybody in the organization. Private sites can only be discovered and accessed by members of the Office 365
group associated with the team site. Both of these types of team sites allow members to share the site with others.
Public
To create a baseline SharePoint Online team site with public access and permissions, do the following:
1. Sign in to the Office 365 portal with an account that will also be used to administer the SharePoint Online
team site (a SharePoint Online administrator). For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type a name for the public team site.
6. In Team site description, type a description of the purpose of the site.
7. In Privacy settings, select Public - anyone in the organization can access this site, and then click
Next.
8. On the Who do you want to add? pane, click Finish.
Here is your resulting configuration.
Private
To create a baseline SharePoint Online team site with private access and permissions, do the following:
1. Sign in to the Office 365 portal with an account that will also be used to administer the SharePoint Online
team site (a SharePoint Online administrator). For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type a name for the private team site.
6. In Team site description, type a description of the purpose of the site.
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, in Add members, type the names of user accounts that have
access to this private team site.
9. When you are done adding the initial set of members to the site, click Finish
Here is your resulting configuration.
Sensitive SharePoint Online team sites
A sensitive SharePoint Online team site is an isolated team site, which means that permissions are controlled
through membership in SharePoint groups instead of membership in the Office 365 group associated with the
team site.
To create an isolated team site, there are two main steps.
Step 1: Design your isolated site
To design your isolated team site, you need to determine:
Your SharePoint groups and permission levels.
The set of access groups that will be members of your SharePoint groups.
The recommended set of access groups is one for site members, one for site viewers, and one for site
administrators.
Whether you will use nested groups within your access groups.
For example, the recommended group structure and permission levels look like this:

SHAREPOINT GROUP PERMISSION LEVEL ACCESS GROUP (EXAMPLES)

[site name] Members Edit [site name] Members

[site name] Visitors Read [site name] Viewers

[site name] Owners Full control [site name] Admins

The SharePoint groups and permission levels are created by default for a team site. You need to determine the
names of your access groups.
For the details of the design process, see Design an isolated SharePoint Online team site.
Step 2: Deploy your isolated site
To deploy your isolated site, you first need to:
Determine the user accounts and groups to add to each of your access groups.
Create the access groups and add the user and group members.
For the detailed steps, see Phase 1 of Deploy an isolated SharePoint Online team site.
Next, you create the SharePoint Online team site with these steps.
1. Sign in to the Office 365 portal with an account that will also be used to administer the SharePoint Online
team site (a SharePoint Online administrator). For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. In the new SharePoint tab of your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type a name for the private team site.
6. In Team site description, type an optional description.
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
Next, from the new SharePoint Online team site, configure permissions with these steps.
1. Determine the User Principal Name (UPN ) of the IT administrator or other person who will be responsible
for responding to and addressing requests for access to the site (belindan@contoso.com is an example of a
UPN ). Write that UPN here: .
2. In the tool bar, click the settings icon, and then click Site permissions.
3. In the Site permissions pane, click Advanced permissions settings.
4. On the new Permissions tab of your browser, click Access Request Settings.
5. In the Access Requests Settings dialog box:
Clear the Allow members to share the site and individual files and folders and Allow members to
invite others to the site members group check boxes.
Type the UPN of your IT administrator from step 1 in Send all requests for access.
Click OK.
6. On the Permissions tab of your browser, click [site name] Members in the list.
7. In People and Groups, click New.
8. In the Share dialog box, type the name of your site members access group for this site, select it, and then
click Share.
9. Click the back button on your browser.
10. Click [site name] Owners in the list.
11. In People and Groups, click New.
12. In the Share dialog box, type the name of the site administrators access group for this site, select it, and
then click Share.
13. Click the back button on your browser.
14. Click [site name] Visitors in the list.
15. In People and Groups, click New.
16. In the Share dialog box, type the name of the site viewers access group for this site, select it, and then click
Share.
17. Close the Permissions tab of your browser.
The results of these permission settings are:
The [site name] Owners SharePoint group contains the site administrators access group, in which all the
members have the Full control permission level.
The [site name] Members SharePoint group contains the site members access group, in which all the
members have the Edit permission level.
The [site name] Visitors SharePoint group contains the site viewers access group, in which all the
members have the Read permission level.
The ability for members to invite other members is disabled.
The ability for non-members to request access is enabled.
Here is your resulting configuration.

The members of the site, through group membership in one of the access groups, can now securely collaborate on
the resources of the site.

Highly confidential SharePoint Online team sites


A highly confidential SharePoint Online team site is an isolated team site, which means that permissions are
controlled through membership in SharePoint groups instead of membership in the Office 365 group associated
with the team site.
To create an isolated team site for highly confidential information and collaboration, there are two main steps.
Step 1: Design your isolated site
To design your isolated team site, you need to determine:
Your SharePoint groups and permission levels.
The set of access groups that will be members of your SharePoint groups.
The recommended set of access groups is one for site members, one for site viewers, and one for site
administrators.
Whether you will use nested groups within your access groups.
For example, the recommended group structure and permission levels look like this:

SHAREPOINT GROUP PERMISSION LEVEL ACCESS GROUP (EXAMPLES)

[site name] Members Edit [site name] Members

[site name] Visitors Read [site name] Viewers

[site name] Owners Full control [site name] Admins

The SharePoint groups and permission levels are created by default for a team site. You need to determine the
names of your access groups.
For the details of the design process, see Design an isolated SharePoint Online team site.
Step 2: Deploy your isolated site
To deploy your isolated site, you first need to:
Determine the user and group members of each of your access groups
Create the access groups and add the user and group members
Create an isolated team site that uses your access groups
For the detailed steps, see Deploy an isolated SharePoint Online team site.
The results of the permission settings are:
The [site name] Owners SharePoint group contains the site administrators access group, in which all the
members have the Full control permission level.
The [site name] Members SharePoint group contains the site members access group, in which all the
members have the Edit permission level.
The [site name] Visitors SharePoint group contains the site viewers access group, in which all the
members have the Read permission level.
The ability for members to invite other members is disabled.
The ability for non-members to request access is disabled.
Here is your resulting configuration.
The members of the site, through group membership in one of the access groups, can now securely collaborate on
the resources of the site.

Next step
Protect SharePoint Online files with Office 365 labels and DLP

See also
Secure SharePoint Online sites and files
Secure SharePoint Online sites in a dev/test environment
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Cloud adoption and hybrid solutions
Protect SharePoint Online files with Office 365 labels
and DLP
9/27/2018 • 8 minutes to read • Edit Online

Summary: Apply Office 365 labels and data loss prevention (DLP ) policies for SharePoint Online team sites with
various levels of information protection.
Use the steps in this article to design and deploy Office 365 labels and DLP policies for baseline, sensitive, and
highly confidential SharePoint Online team sites. For more information about these three tiers of protection, see
Secure SharePoint Online sites and files.

How this works


1. Create the desired labels and publish these. It can take up to 12 hours for these to be published.
2. For the desired SharePoint sites, edit the document library settings to apply a label to items in the library.
3. Create DLP policies to take action based on the labels.
When users add a document to the library, the document will receive the assigned label by default. Users can
change the label, if needed. When a user shares a document outside the organization, DLP will check to see if a
label is assigned and take action if a DLP policy matches the label. DLP will look for other policy matches as well,
such as protecting files with credit card numbers if this type of policy is configured.

Office 365 labels for your SharePoint Online sites


There are three phases to creating and then assigning Office 365 labels to SharePoint Online team sites.
Phase 1: Determine the Office 365 label names
In this phase, you determine the names of your Office 365 labels for the four levels of information protection
applied to SharePoint Online team sites. The following table lists the recommended names for each level.

SHAREPOINT ONLINE TEAM SITE PROTECTION LEVEL LABEL NAME

Baseline-Public Internal public

Baseline-Private Private

Sensitive Sensitive

Highly Confidential Highly Confidential

Phase 2: Create the Office 365 labels


In this phase, you create and then publish your determined labels for the different levels of information protection.
To create the labels, you can use the Office 365 Admin center or Microsoft PowerShell.
Create Office 365 labels with the Office 365 Admin center
1. Sign in to the Office 365 portal with an account that has the Security Administrator or Company
Administrator role. For help, see Where to sign in to Office 365.
2. From the Microsoft Office Home tab, click the Admin tile.
3. From the new Office Admin center tab of your browser, click Admin centers > Security & Compliance.
4. From the new Home - Security & Compliance tab of your browser, click Classifications > Labels.
5. From the Home > Labels pane, click Create a label.
6. On the Name your label pane, type the name of the label, and then click Next.
7. On the Label settings pane, click Next.
8. On the Review your settings pane, click Create this label, and then click Close.
9. Repeat steps 5-8 for your additional labels.
Create Office 365 labels with PowerShell
1. Connect to the Office 365 Security & Compliance Center using remote PowerShell and specify the
credentials of an account that has the Security Administrator or Company Administrator role.
2. Fill out the list of label names, and then run these commands at the PowerShell command prompt:

$labelNames=@(<list of label names, each enclosed in quotes and separated by commas>)


ForEach ($element in $labelNames){ New-ComplianceTag -Name $element }

Next, use these steps to publish the new Office 365 labels.
1. From the Home > Labels pane the Security & Compliance Center, click Publish labels.
2. On the Choose labels to publish pane, click Choose labels to publish.
3. On the Choose labels pane, click Add and select all four labels.
4. Click Done.
5. On the Choose labels to publish pane, click Next.
6. On the Choose locations pane, click Next.
7. On the Name your policy pane, type a name for your set of labels in Name, and then click Next.
8. On the Review your settings pane, click Publish labels, and then click Close.
Phase 3: Apply the Office 365 labels to your SharePoint Online sites
Use these steps to apply the Office 365 labels to the documents folders of your SharePoint Online team sites.
1. From the Microsoft Office Home tab of your browser, click the SharePoint tile.
2. On the new SharePoint tab in your browser, click a site that needs an Office 365 label assigned.
3. In the new SharePoint site tab of your browser, click Documents.
4. Click the settings icon, and then click Library settings.
5. Under Permissions and Management, click Apply label to items in this library.
6. In Settings-Apply Label, select the appropriate label, and then click Save.
7. Close the tab for the SharePoint Online site.
8. Repeat steps 3-8 to assign Office 365 labels to your additional SharePoint Online sites.
Here is your resulting configuration.
DLP policies for your SharePoint Online sites
Use these steps to configure a DLP policy that notifies users when they share a document on a SharePoint Online
sensitive team site outside the organization.
1. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
2. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
3. In the Data loss prevention pane, click + Create a policy.
4. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
5. In the Name your policy pane, type the name for the sensitive level DLP policy in Name, and then click
Next.
6. In the Choose locations pane, click Let me choose specific locations, and then click Next.
7. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
8. In the Customize the types of sensitive info you want to protect pane, click Edit.
9. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
10. In the Labels pane, click + Add, select the Sensitive label, click Add, and then click Done.
11. In the Choose the types of content to protect pane, click Save.
12. In the Customize the types of sensitive info you want to protect pane, click Next.
13. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
14. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
15. In the text box, type or paste in one of the following tips, depending on if you implemented Azure
Information Protection to protect highly confidential files:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
Highly confidential files are protected with encryption. Only external users who are granted permissions to
these files by your IT department can read them.
Alternately, type or paste in your own policy tip that instructs users on how to share a file outside your
organization.
16. Click OK.
17. In the What do you want to do if we detect sensitive info? pane, clear the Block people from
sharing, and restrict access to shared content check box, and then click Next.
18. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
19. In the Review your settings pane, click Create, and then click Close.
Here is your resulting configuration for sensitive SharePoint Online team sites.

Next, use these steps to configure a DLP policy that blocks users when they share a document on a SharePoint
Online highly confidential team site outside the organization.
1. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
2. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
3. In the Data loss prevention pane, click + Create a policy.
4. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
5. In the Name your policy pane, type the name for the highly sensitive level DLP policy in Name, and then
click Next.
6. In the Choose locations pane, click Let me choose specific locations, and then click Next.
7. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
8. In the Customize the types of sensitive info you want to protect pane, click Edit.
9. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
10. In the Labels pane, click + Add, select the Highly Confidential label, click Add, and then click Done.
11. In the Choose the types of content to protect pane, click Save.
12. In the Customize the types of sensitive info you want to protect pane, click Next.
13. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
14. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
15. In the text box, type or paste in the following:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
Alternately, type or paste in your own policy tip that instructs users on how to share a file outside your
organization.
16. Click OK.
17. In the What do you want to do if we detect sensitive info? pane, select Require a business
justification to override, and then click Next.
18. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
19. In the Review your settings pane, click Create, and then click Close.
Here is your resulting configuration for high confidentiality SharePoint Online team sites.
Next step
Protect SharePoint Online files with Azure Information Protection

See Also
Secure SharePoint Online sites and files
Secure SharePoint Online sites in a dev/test environment
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Cloud adoption and hybrid solutions
Protect SharePoint Online files with Azure
Information Protection
9/27/2018 • 5 minutes to read • Edit Online

Summary: Apply Azure Information Protection to protect files in a highly confidential SharePoint Online team
site.
Use the steps in this article to configure Azure Information Protection to provide encryption and permissions for
files. These files can be added to a SharePoint library configured for highly confidential protection. Or, you can
open a file directly from the site and use the Azure Information Protection client to add encryption. The encryption
and permissions protection travels with a file even when it is downloaded from the site.
These steps are part of a larger solution for configuring highly confidential protection for SharePoint sites and the
files within these sites. For more information, see Secure SharePoint Online sites and files.
Using Azure Information Protection for files in SharePoint Online is not recommended for all customers, but is an
option for customers who need this level of protection for a subset of files.
Some important notes about this solution:
When Azure Information Protection encryption is applied to files stored in Office 365, the service cannot
process the contents of these files. Co-authoring, eDiscovery, search, Delve, and other collaborative features do
not work. Data Loss Prevention (DLP ) policies can only work with the metadata (including Office 365 labels)
but not the contents of these files (such as credit card numbers within files).
This solution requires a user to select a label that applies the protection from Azure Information Protection. If
you require automatic encryption and the ability for SharePoint to index and inspect the files, consider using
Information Rights Management (IRM ) in SharePoint Online. When you configure a SharePoint library for
IRM, files are automatically encrypted when they are downloaded for editing. SharePoint IRM includes
limitations that might influence your decision. For more information, see Set up Information Rights
Management (IRM ) in SharePoint admin center.

Admin setup
First, use the instructions in Activate Azure RMS with the Office 365 admin center for your Office 365
subscription.
Next, configure Azure Information Protection with a new scoped policy and sub-label for protection and
permissions of your highly confidential SharePoint Online team site.
1. Sign in to the Office 365 portal with an account that has the Security Administrator or Company
Administrator role. For help, see Where to sign in to Office 365.
2. In a separate tab of your browser, go to the Azure portal (https://portal.azure.com).
3. If this is the first time you are configuring Azure Information Protection, see these instructions.
4. In the list pane, click All services, type information, and then click Azure Information Protection.
5. Click Labels.
6. Right-click the Highly Confidential label, and then click Add a sub-label.
7. Type a name for the sub-label in Name and a description of the sub-label in Description.
8. In Set permissions for documents and emails containing this label, click Protect.
9. In the Protection section, click Azure (cloud key).
10. On the Protection blade, under Protection settings, click Add permissions.
11. On the Add permissions blade, under Specify users and groups, click Browse directory.
12. On the AAD Users and Groups pane, select the site members access group for your highly sensitive
SharePoint Online team site, and then click Select.
13. Under Choose permissions from the preset or set custom, click Custom, and then click the View
Rights, Edit Content, Save, Reply, and Reply all check boxes.
14. Click OK twice.
15. On the Sub-label blade, click Save, and then click OK.
16. On the Azure Information protection blade, click Policies > + Add a new policy.
17. Type a name for the new policy in Policy name and a description in Description.
18. Click Select which users or groups get this policy > User/Groups, and then select the site members
access group for your highly sensitive SharePoint Online team site.
19. Click Select > OK.
20. Click Add or remove labels. In the Policy: Add or remove labels pane, click the name of your new sub-
label, and then click OK.
21. Click Save, and then click OK.

Client setup
You are now ready to begin creating documents and protecting them with Azure Information Protection and your
new label.
You must install the Azure Information Protection client on your device or Windows-based computer. You can
script and automate the installation, or users can install the client manually. See the following resources:
The client side of Azure Information Protection
Installing the Azure Information Protection client
Download page for manual installation
Once installed, your users run and then sign-in from an Office application (such as Microsoft Word) with their
Office 365 account. A new Information Protection bar allows users to select the new label. Make sure that your
users know the SharePoint Online team site and which label to use, to protect their highly confidential files.

NOTE
If you have multiple highly sensitive SharePoint Online team sites, you should create multiple Azure Information Protection
scoped policies with sub-labels with the above settings, with the permissions for each sub-label set to the site members
access group of a specific SharePoint Online team site.

Adding permissions for external users


There are two ways you can grant external users access to files protected with Azure Information Protection. In
both cases, external users must have an Azure AD account. If external users aren't members of an organization
that uses Azure AD, they can obtain an Azure AD account as an individual by using this signup page:
https://aka.ms/aip-signup.
Add external users to an Azure AD group that is used to configure protection for a label. You'll need to first add
the account as a B2B user in your directory. It can take a couple of hours for group memership caching by
Azure Rights Management.
Add external users directly to the label protection. You can add all users from an organization (e.g.
Fabrikam.com), an Azure AD group (such as a finance group within an organization), or user. For example, you
can add an external team of regulators to the protection for a label.

See Also
Secure SharePoint Online sites and files
Secure SharePoint Online sites in a dev/test environment
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Cloud adoption and hybrid solutions
Secure SharePoint Online sites in a dev/test
environment
9/27/2018 • 19 minutes to read • Edit Online

Summary: Create public, private, sensitive, and highly confidential SharePoint Online team sites in a dev/test
environment.
This article provides step-by-step instructions to create a dev/test environment that includes the four different
types of SharePoint Online team sites for the Secure SharePoint Online sites and files solution.

Use this dev/test environment to experiment with the information protection behaviors and fine-tune settings for
your specific needs before deploying SharePoint Online team sites in production.

Phase 1: Create your dev/test environment


In this phase, you obtain trial subscriptions for Office 365 and Enterprise Mobility + Security for a fictional
organization.
First, follow the instructions in Phase 2 of the Office 365 dev/test environment.
Next, sign up for the EMS trial subscription and add it to the same organization as your Office 365 trial
subscription.
1. If needed, sign in to the Office 365 portal with the credentials of the global administrator account of your
trial subscription. For help, see Where to sign in to Office 365.
2. Click the Admin tile.
3. On the Office Admin center tab in your browser, in the left navigation, click Billing > Purchase
services.
4. On the Purchase services page, find the Enterprise Mobility + Security E5 item. Hover your mouse
pointer over it and click Start free trial.
5. On the Confirm your order page, click Try now.
6. On the Order receipt page, click Continue.
Next, enable the Enterprise Mobility + Security E5 license for your global administrator account.
1. On the Office 365 Admin center tab in your browser, in the left navigation, click Users > Active users.
2. Click your global administrator account, and then click Edit for Product licenses.
3. On the Product licenses pane, turn the product license for Enterprise Mobility + Security E5 to On,
click Save, and then click Close twice.

Phase 2: Create and configure your Azure Active Directory (AD)


groups and users
In this phase, you create and configure the Azure AD groups and users for your fictional organization.
First, create a set of groups for a typical organization with the Azure portal.
1. Create a separate tab in your browser, and then go to the Azure portal at https://portal.azure.com. If
needed, sign in with the credentials of the global administrator account for your Office 365 E5 trial
subscription.
2. In the Azure portal, click Azure Active Directory > Groups.
3. On the Groups - All groups blade, click + New group.
4. On the Group blade:
Select Office 365 in Group type.
Type C -Suite in Name.
Select Assigned in Membership type.
5. Click Create, and then close the Group blade.
6. Repeat steps 3-5 for the following group names:
IT staff
Research staff
Regular staff
Marketing staff
Sales staff
7. Keep the Azure portal tab in your browser open.
Next, you configure automatic licensing so that members of your groups are automatically assigned licenses for
your Office 365 and EMS subscriptions.
1. In the Azure portal, click Azure Active Directory > Licenses > All products.
2. In the list, select Enterprise Mobility + Security E5 and Office 365 Enterprise E5, and then click
Assign.
3. In the Assign license blade, click Users and groups.
4. In the list of groups, select the following:
C -Suite
IT staff
Research staff
Regular staff
Marketing staff
Sales staff
5. Click Select, and then click Assign.
6. Close the Azure portal tab in your browser.
Next, you Connect with the Azure Active Directory V2 PowerShell module.
Fill in your organization name, your location, and a common password, and then run these commands from the
PowerShell command prompt or Integrated Script Environment (ISE ) to create user accounts and add them to
their groups:
$orgName="<organization name, such as contoso for the contoso.onmicrosoft.com trial subscription domain
name>"
$location="<the ISO ALPHA2 country code, such as US for the United States>"
$commonPassword="<common password for all the new accounts>"

$PasswordProfile=New-Object -TypeName Microsoft.Open.AzureAD.Model.PasswordProfile


$PasswordProfile.Password=$commonPassword

$groupName="C-Suite"
$userNames=@("CEO","CFO","CIO")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
$groupName="IT staff"
$userNames=@("ITAdmin1","ITAdmin2")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
$groupName="Research staff"
$userNames=@("Researcher1")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
$groupName="Regular staff"
$userNames=@("Regular1", "Regular2")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
$groupName="Marketing staff"
$userNames=@("Marketing1", "Marketing2")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
$groupName="Sales staff"
$userNames=@("SalesPerson1")
$groupID=(Get-AzureADGroup | Where { $_.DisplayName -eq $groupName }).ObjectID
ForEach ($element in $userNames){
New-AzureADUser -DisplayName $element -PasswordProfile $PasswordProfile -UserPrincipalName ($element + "@" +
$orgName + ".onmicrosoft.com") -AccountEnabled $true -MailNickName $element -UsageLocation $location
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $element }).ObjectID -
ObjectId $groupID
}
NOTE
The use of a common password here is for automation and ease of configuration for a dev/test environment. This is not
recommended for production subscriptions.

Use these steps to verify that group-based licensing is working correctly.


1. From the Microsoft Office Home tab of your browser, click the Admin tile.
2. From the new Office Admin center tab of your browser, click Users.
3. In the list of users, click CEO.
4. In the pane that lists the properties of the CEO user account, verify that it has been assigned the
Enterprise Mobility + Security E5 and Office 365 Enterprise E5 licenses (in Product licenses).

Phase 3: Create Office 365 labels


In this phase, you create the labels for the different levels of security for SharePoint Online team site documents
folders.
1. If needed, use a private instance of your Internet browser and sign in to the Office 365 portal with the
global administrator account of your Office 365 E5 trial subscription. For help, see Where to sign in to
Office 365.
2. From the Microsoft Office Home tab, click the Admin tile.
3. From the new Office Admin center tab of your browser, click Admin centers > Security &
Compliance.
4. From the new Home - Security & Compliance tab of your browser, click Classifications > Labels.
5. From the Home > Labels pane, click Create a label.
6. On the Name your label pane, type Internal Public, and then click Next.
7. On the Label settings pane, click Next.
8. On the Review your settings pane, click Create this label, and then click Close.
9. Repeat steps 5-8 for these additional labels:
Private
Sensitive
Highly Confidential
10. From the Home > Labels pane, click Publish labels.
11. On the Choose labels to publish pane, click Choose labels to publish.
12. On the Choose labels pane, click Add and select all four labels.
13. Click Done.
14. On the Choose labels to publish pane, click Next.
15. On the Choose locations pane, click Next.
16. On the Name your policy pane, type Example organization in Name, and then click Next.
17. On the Review your settings pane, click Publish labels, and then click Close.

Phase 4: Create your SharePoint Online team sites


In this phase, you create and configure the four types of SharePoint Online team sites for your example
organization.
Organization wide team site
To create a baseline public SharePoint Online team site, do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal using your global
administrator account. For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type Organization wide.
6. In Team site description, type SharePoint site for the entire organization.
7. In Privacy settings, select Public - anyone in the organization can access this site, and then click
Next.
8. On the Who do you want to add? pane, click Finish.
Next, configure the documents folder of the Organization wide team site for the Internal Public label.
1. In the Organization wide-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Internal Public, and then click Save.
Here is your resulting configuration.
Project 1 team site
To create a baseline private SharePoint Online team site for a project within the organization, do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal using your global
administrator account. For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type Project 1.
6. In Team site description, type SharePoint site for Project 1.
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
Next, configure the documents folder of the Project 1 team site for the Private label.
1. In the Project 1-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Private, and then click Save.
Here is your resulting configuration.
Marketing campaigns team site
To create a sensitive-level isolated SharePoint Online team site for marketing campaign resources, do the
following:
1. Using a browser on your local computer, sign in to the Office 365 portal using your global administrator
account. For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Team site name, type Marketing campaigns.
6. In Team site description, type SharePoint site for marketing campaign resources (sensitive).
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
9. On the new Marketing campaigns tab in your browser, in the tool bar, click the settings icon, and then
click Site permissions.
10. In the Site permissions pane, click Advanced permissions settings.
11. In the new Permissions tab in your browser, click Access Request Settings.
12. In the Access Request Settings dialog box, clear the Allow members to share the site and individual
files and folders and Allow members to invite others to the site members group check boxes, type
ITAdmin1@<your organization name>.onmicrosoft.com in Send all requests for access, and then
click OK.
13. Click Marketing campaigns Members in the list.
14. On the People and Groups page, click New.
15. In the Share dialog box, type Marketing staff, select it, and then click Share.
16. Repeat steps 14 and 15 for the Researcher1 user account.
17. Click the back button on your browser.
18. Click Marketing campaigns Owners in the list.
19. On the People and Groups page, click New.
20. In the Share dialog box, type IT staff, select it, and then click Share.
21. Click the back button on your browser.
22. Close the People and Groups tab in your browser, click the Marketing campaigns-Home tab in your
browser, and then close the Site permissions pane.
Here are the results of configuring permissions:
The Marketing campaigns-Members SharePoint group contains only the Marketing campaigns group
(which contains the global administrator user account), the Marketing staff group (which contains the
Marketing1 and Marketing2 user accounts), and the Researcher1 user account.
The Marketing campaigns-Owners SharePoint group contains only the IT staff group (which contains
only the ITAdmin1 and ITAdmin2 user accounts).
The Marketing campaigns-Visitors SharePoint group contains no groups or user accounts.
Members cannot modify site-level permissions (this can only be done by members of the Marketing
campaigns-Owners group).
Other user accounts cannot access the site or its resources, but can request access to the site, which will
send an email to the ITAdmin1 user account mailbox.
Next, configure the documents folder of the Marketing campaigns team site for the Sensitive label.
1. In the Marketing campaigns-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Sensitive, and then click Save.
Next, configure a data loss prevention (DLP ) policy that notifies users when they share a document on a
SharePoint Online team site with the Sensitive label, which includes the Marketing campaigns site, outside the
organization.
1. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
2. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
3. In the Data loss prevention pane, click + Create a policy.
4. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
5. In the Name your policy pane, type Sensitive label SharePoint Online team sites in Name, and then
click Next.
6. In the Choose locations pane, click Let me choose specific locations, and then click Next.
7. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
8. In the Customize the types of sensitive info you want to protect pane, click Edit.
9. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
10. In the Labels pane, click + Add, select the Sensitive label, click Add, and then click Done.
11. In the Choose the types of content to protect pane, click Save.
12. In the Customize the types of sensitive info you want to protect pane, click Next.
13. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
14. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
15. In the text box, type or paste in the following:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
16. Click OK.
17. In the What do you want to do if we detect sensitive info? pane, clear the Block people from
sharing, and restrict access to shared content check box, and then click Next.
18. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
19. In the Review your settings pane, click Create, and then click Close.
Here is your resulting configuration.
Company strategy team site
To create an isolated SharePoint Online team site at the highly confidential level for strategic company resources
of the chief executives of the organization, do the following:
1. If needed, use a browser on your local computer and sign in to the Office 365 portal using your global
administrator account. For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Team site name, type Company strategy.
6. In Team site description, type SharePoint site for company strategy (highly confidential).
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
9. On the new Company strategy tab in your browser, in the tool bar, click the settings icon, and then click
Site permissions.
10. In the Site permissions pane, click Advanced permissions settings.
11. In the new Permissions tab in your browser, click Access Request Settings.
12. In the Access Request Settings dialog box, clear Allow members to share the site and individual
files and folders and Allow members to invite others to the site members group (so that all three
check boxes are cleared), and then click OK.
13. Click Company strategy Members in the list.
14. On the People and Groups page, click New.
15. In the Share dialog box, type C -Suite, select it, and then click Share.
16. Click Company strategy Owners in the list.
17. On the People and Groups page, click New.
18. In the Share dialog box, type IT staff, select it, and then click Share.
19. Click the back button on your browser.
20. Close the People and Groups tab in your browser, click the Company strategy-Home tab in your
browser, and then close the Site permissions pane.
Here are the results of configuring permissions:
The Company strategy-Members SharePoint group contains only the C -Suite group (which contains
only the CEO, CFO, and CIO user accounts) and the Company strategy group (which contains only the
global administrator user account).
The Company strategy-Owners SharePoint group contains only the IT staff group (which contains only
the ITAdmin1 and ITAdmin2 user accounts).
The Company strategy-Visitors SharePoint group contains no groups or user accounts.
Members cannot modify site-level permissions (this can only be done by members of the Company
strategy-Owners group).
Other user accounts cannot access the site or its resources or request access to the site. Additional
permissions to the site must be done by the global administrator or by a member of the Company
strategy-Owners group.
Next, configure the documents folder of the Company strategy team site for the Highly Confidential label.
1. In the Company strategy-Home tab of your browser, click Documents.
2. Click the settings icon, and then click Library settings.
3. Under Permissions and Management, click Apply label to items in this library.
4. In Settings-Apply Label, select Highly Confidential, and then click Save.
Next, configure a DLP policy that blocks users when they share a document on a SharePoint Online team site
with the Highly Confidential label, which includes the Company strategy site, outside the organization.
1. If needed, use a browser on your local computer and sign in to the Office 365 portal with an account that
has the Security Administrator or Company Administrator role. For help, see Where to sign in to Office
365.
2. From the Microsoft Office Home tab in your browser, click the Security & Compliance tile.
3. On the new Security & Compliance tab in your browser, click Data loss prevention > Policy.
4. In the Data loss prevention pane, click + Create a policy.
5. In the Start with a template or create a custom policy pane, click Custom, and then click Next.
6. In the Name your policy pane, type Highly Confidential label SharePoint Online team sites in
Name, and then click Next.
7. In the Choose locations pane, click Let me choose specific locations, and then click Next.
8. In the list of locations, disable the Exchange email and OneDrive accounts locations, and then click
Next.
9. In the Customize the types of sensitive info you want to protect pane, click Edit.
10. In the Choose the types of content to protect pane, click Add in the drop-down box, and then click
Labels.
11. In the Labels pane, click + Add, select the Highly Confidential label, click Add, and then click Done.
12. In the Choose the types of content to protect pane, click Save.
13. In the Customize the types of sensitive info you want to protect pane, click Next.
14. In the What do you want to do if we detect sensitive info? pane, click Customize the tip and email.
15. In the Customize policy tips and email notifications pane, click Customize the policy tip text.
16. In the text box, type or paste in the following:
To share with a user outside the organization, download the file and then open it. Click File, then Protect
Document, and then Encrypt with Password, and then specify a strong password. Send the password in a
separate email or other means of communication.
17. Click OK.
18. In the What do you want to do if we detect sensitive info? pane, select Require a business
justification to override, and then click Next.
19. In the Do you want to turn on the policy or test things out first? pane, click Yes, turn it on right
away, and then click Next.
20. In the Review your settings pane, click Create, and then click Close.
Next, follow the instructions in Activate Azure RMS with the Office 365 admin center.
Next, configure Azure Information Protection with a new policy and sub-label scoped for the C -Suite group for
protection and permissions with the following steps:
1. Sign in to the Office 365 portal with an account that has the Security Administrator or Company
Administrator role. For help, see Where to sign in to Office 365.
2. In a separate tab of your browser, go to the Azure portal (https://portal.azure.com).
3. If this is the first time you are configuring Azure Information Protection, see these instructions.
4. In the list pane, click All services, type information, and then click Azure Information Protection.
5. Click Labels.
6. Right-click the Highly Confidential label, and then click Add a sub-label.
7. Type C -Suite members in Name and Description.
8. In Set permissions for documents and emails containing this label, click Protect.
9. In the Protection section, click Azure (cloud key).
10. On the Protection blade, under Protection settings, click + Add permissions.
11. On the Add permissions blade, under Specify users and groups, click + Browse directory.
12. On the AAD Users and Groups pane, select C -Suite, and then click Select.
13. Under Choose permissions from the preset or set custom, click Custom, and then click the View
Rights, Edit Content, Save, Reply, and Reply all check boxes.
14. Click OK twice.
15. On the Sub-label blade, click Save, and then click OK.
16. On the Azure Information protection blade, click Policies > + Add a new policy.
17. Type CompanyStrategy in Policy name and Documents in the Company strategy team site in
Description.
18. Click Select which users or groups get this policy > User/Groups, and then select C -Suite.
19. Click Select > OK.
20. Click Add or remove labels. In the Policy: Add or remove labels pane, click C -Suite, and then click OK.
21. Click Save, and then click OK.
To protect a document with Azure Information Protection and this new label, you must install the Azure
Information Protection client on a test machine, install Office from the Office 365 portal, and then sign in from
Microsoft Word with an account in the C -Suite group of your trial subscription.
Here is your resulting configuration.
You are now ready to create documents in these four sites and test access to them with various user accounts in
your trial subscription.
Here is the overall configuration for all four SharePoint Online team sites.
Next step
When you are ready for production deployment of secure SharePoint Online sites, see Secure SharePoint Online
sites and files for detailed information and links to step-by-step deployment articles.

See Also
Secure SharePoint Online sites and files
Cloud adoption and hybrid solutions
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Isolated SharePoint Online team sites
9/27/2018 • 2 minutes to read • Edit Online

Summary: Learn about the uses for isolated SharePoint Online team sites.
SharePoint Online team sites are an easy way to quickly create a space for collaboration of notes, documents,
articles, a calendar, and other resources in Microsoft Office 365. SharePoint Online team sites are based on an
Office 365 group and have a simplified administration model to allow open collaboration with a private set of
group members or the entire organization. A default SharePoint Online team site allows members of the Office
365 group to invite other users and control permissions settings.
However, in some cases, you want to create a SharePoint Online team site for collaboration where the permissions
of that site are more tightly controlled through group membership and SharePoint Online permission levels,
which are only managed by SharePoint administrators. We call this an isolated site, which is isolated to the set of
users that are either collaborating, viewing its contents, or administering the site. You might need an isolated site
for the following:
A secret project within your organization.
The location for highly-sensitive or valuable intellectual property for your organization.
The resources for a legal action taken by your organization or that to which it is being subjected.
To share an Office 365 subscription between multiple organizations that have some overlap, but for the
most part exist as separate business entities.
Here are the requirements of an isolated site:
Only SharePoint Online administrators can perform site administration, which includes group membership
for access to the site and configuring custom permissions.
Members of the site cannot invite other members to the team site.
Users who are not members of the isolated site cannot request access to the site. They will receive an access
denied web page when they attempt to access any URL associated with the site.
The tradeoff of requiring centralized access control and custom permissions by SharePoint Online administrators
is that the site remains isolated over time. For example, current members cannot, either intentionally or
accidentally, invite or configure custom permissions for other users within the Office 365 subscription who should
not be members of the site.
An isolated site can be used with other features, such as:
Information Rights Management to ensure that the resources on the site remain encrypted, even if they are
downloaded locally and uploaded to another site that is available to the entire organization.
Data loss prevention to prevent users from sending the resources of the site, such as files, in email.

Next steps
To try out an isolated SharePoint Online team site in a trial subscription, see the step-by-step instructions in
Isolated SharePoint Online team site dev/test environment.
When you are ready to deploy an isolated SharePoint Online team site in production, see the step-by-step design
considerations in Design an isolated SharePoint Online team site.
See Also
Design an isolated SharePoint Online team site
Manage an isolated SharePoint Online team site
Deploy an isolated SharePoint Online team site
Design an isolated SharePoint Online team site
9/27/2018 • 5 minutes to read • Edit Online

Summary: Step through the design process for isolated SharePoint Online team sites.
This article takes you through the key design decisions you must make before creating an isolated SharePoint
Online team site.

Phase 1: Determine your SharePoint groups and permission levels


Every SharePoint Online team site by default is created with the following SharePoint groups:
<site name> Members
<site name> Visitors
<site name> Owners
These groups are separate from Office 365 and Azure Active Directory (AD ) groups and are the basis for
assigning permissions for the resources of the site.
The set of specific permissions that determines what a member of a SharePoint group can do in a site is a
permission level. There are three permission levels by default for a SharePoint Online team site: Edit, Read, and
Full control. The following table shows the default correlation of SharePoint groups and assigned permission
levels:

SHAREPOINT GROUP PERMISSION LEVEL

<site name> Members Edit

<site name> Visitors Read

<site name> Owners Full control

Best practice: You can create additional SharePoint groups and permission levels. However, we recommend
using the default SharePoint groups and permission levels for your isolated SharePoint Online site.
Here are the default SharePoint groups and permission levels.
Phase 2: Assign permissions to users with access groups
You can assign permissions to users by adding their user account, or an Office 365 or Azure AD group of which
the user account is a member, to the SharePoint groups. Once added, the Office 365 user accounts, either directly
or indirectly via membership in an Office 365 or Azure AD group, are assigned the permission level associated
with the SharePoint group.
Using the default SharePoint groups as an example:
Members of the <site name> Members SharePoint group, which can include both user accounts and
groups, are assigned the Edit permission level
Members of the <site name> Visitors SharePoint group, which can include both user accounts and
groups, are assigned the Read permission level
Members of the <site name> Owners SharePoint group, which can include both user accounts and
groups, are assigned the Full control permission level
Best practice: Although you can manage permissions through individual user accounts, we recommend that you
use a single Azure AD group, known as an access group, instead. This simplifies the management of permissions
through membership in the access group, rather than managing the list of user accounts for each SharePoint
group.
Azure AD groups for Office 365 are different than Office 365 groups. Azure AD groups appear in the Office
Admin center with their Type set to Security and do not have an email address. Azure AD groups can be
managed within:
Windows Server Active Directory (AD )
These are groups that have been created in your on-premises Windows Server AD infrastructure and
synchronized to your Office 365 subscription. In the Office Admin center, these groups have a Status of
Synched with active directory.
Office 365
These are groups that have been created using either the Office Admin center, the Azure portal, or
Microsoft PowerShell. In the Office Admin center, these groups have a Status of Cloud.
Best practice: If you are using Windows Server AD on-premises and synchronizing with your Office 365
subscription, perform your user and group management with Windows Server AD.
For isolated SharePoint Online team sites, the recommended group structure looks like this:
SHAREPOINT GROUP AZURE AD-BASED ACCESS GROUP PERMISSION LEVEL

<site name> Members <site name> Members Edit

<site name> Visitors <site name> Viewers Read

<site name> Owners <site name> Admins Full control

Best practice: Although you can use either Office 365 or Azure AD groups as members of SharePoint groups,
we recommend that you use Azure AD groups. Azure AD groups, managed either through Windows Server AD
or Office 365, give you more flexibility to use nested groups to assign permissions.
Here are the default SharePoint groups configured to use Azure AD -based access groups.

When designing the three access groups, keep the following in mind:
There should be only a few members in the <site name> Admins access group, corresponding to a small
number of SharePoint Online administrators who are managing the team site.
Most of your site members are in the <site name> Members or <site name> Viewers access groups.
Because site members in the <site name> Members access group have the ability to delete or modify
resources in the site, carefully consider its membership. When in doubt, add the site member to the <site
name> Viewers access group.
Here is an example of the SharePoint groups and access groups for an isolated site named ProjectX.
Phase 3: Use nested Azure AD groups
For a project confined to a small number of people, a single level of Azure AD -based access groups added to the
SharePoint groups of the site will fit most scenarios. However, if you have a large number of people and those
people are already members of established Azure AD groups, you can more easily assign SharePoint permissions
by using nested groups, or groups that contain other groups as members.
For example, you want to create an isolated SharePoint online team site for collaboration among the executives of
the sales, marketing, engineering, legal, and support departments and those departments already their own
groups with executive user account membership. Rather than creating a new group for the new site members and
placing all the individual executive user accounts in it, put the existing executive groups for each department in
the new group.
If you are sharing an Office 365 subscription between multiple organizations, a single level of group membership
for an isolated site for an organization might become difficult to manage due to the sheer number of user
accounts. In this case, you can use nested Azure AD groups for each organization that contain the groups within
their organizations to manage the permissions.
To use nested Azure AD groups:
1. Identify or create the Azure AD groups that will contain user accounts and add the appropriate user
accounts as members.
2. Create the container Azure AD -based access group that will contain the other Azure AD groups and add
those groups as members.
3. For the appropriate level of access for the container access group, identify the SharePoint group and
corresponding permission level.

NOTE
You cannot use nested Office 365 groups.

Here is an example of nested Azure AD groups for the ProjectX member access group.
Because all of the user accounts in the Research, Engineering, and Project leads teams are intended to be site
members, it is easier to add their Azure AD groups to the ProjectX Members access group.

Next step
When you are ready to create and configure an isolated site in production, see Deploy an isolated SharePoint
Online team site.

See Also
Isolated SharePoint Online team sites
Manage an isolated SharePoint Online team site
Deploy an isolated SharePoint Online team site
Deploy an isolated SharePoint Online team site
9/27/2018 • 8 minutes to read • Edit Online

Summary: Deploy a new isolated SharePoint Online team site with these step-by-step instructions.
This article is a step-by-step deployment guide for creating and configuring an isolated SharePoint Online team
site in Microsoft Office 365. These steps assume the use of the three default SharePoint groups and
corresponding permission levels, with a single Azure Active Directory (AD )-based access group for each level of
access.

Phase 1: Create and populate the team site access groups


In this phase, you create the three Azure AD -based access groups for the three default SharePoint groups and
populate them with the appropriate user accounts.

NOTE
The following steps assume that all necessary user accounts already exist and are assigned the appropriate licenses. If not,
please add them and assign licenses before proceeding to step 1.

Step 1: List the SharePoint Online admins for the site


Determine the set of user accounts corresponding to the SharePoint Online admins for the isolated team site.
If you are managing user accounts and groups through Office 365 and want to use Windows PowerShell, make a
list of their user principal names (UPNs) (example UPN: belindan@contoso.com).
Step 2: List the members for the site
Determine the set of user accounts corresponding to the members for the isolated team site, those who will be
collaborating on resources stored within the site.
If you are managing user accounts and groups through Office 365 and want to use PowerShell, make a list of
their UPNs. If there are a lot of site members, you can store the list of UPNs in a text file and add them all with a
single PowerShell command.
Step 3: List the viewers for the site
Determine the set of user accounts corresponding to the viewers of the isolated team site, those who can view the
resources stored in the site but not modify them or directly collaborate on their contents.
If you are managing user accounts and groups through Office 365 and want to use PowerShell, make a list of
their UPNs. If there are a lot of site members, you can store the list of UPNs in a text file and add them all with a
single PowerShell command.
Viewers for the site might include executive management, legal counsel, or inter-departmental stakeholders.
Step 4: Create the three access groups for the site in Azure AD
You need to create the following access groups in Azure AD:
Site admins (which will contain the list from step 1)
Site members (which will contain the list from step 2)
Site viewers (which will contain the list from step 3)
1. In your browser, go to the Azure portal at https://portal.azure.com and sign in with the credentials of an
account that has been assigned with User Management Admin or Company Administrator role.
2. In the Azure portal, click Azure Active Directory > Groups.
3. On the Groups - All groups blade, click + New group.
4. On the Group blade:
Select Office 365 in Group type.
Type the group name in Name.
Type a description of the group in Group description.
Select Assigned in Membership type.
5. Click Create, and then close the Group blade.
6. Repeat steps 3-5 for your additional groups.

NOTE
You need to use the Azure portal to create the groups so that they have Office features enabled. If a SharePoint Online
isolated site is later configured as a Highly Confidential site with an Azure Information Protection (AIP) label to encrypt files
and assign permission to specific groups, the permitted groups must have been created with Office features enabled. You
cannot change the Office features setting of an Azure AD group after it has been created.

Here is your resulting configuration with the three site access groups.

Step 5. Add the user accounts to the access groups


In this step, do the following:
1. Add the list of users from step 1 to the site admins access group
2. Add the list of users from step 2 to the site members access group
3. Add the list of users from step 3 to the site viewers access group
If you are managing user accounts and groups through Windows Server AD, add users to the appropriate access
groups using your normal Windows Server AD user and group management procedures and wait for
synchronization with your Office 365 subscription.
If you are managing user accounts and groups through Office 365, you can use the Office Admin center or
PowerShell. If you have duplicate group names for any of the access groups, you should use the Office Admin
center.
For the Office Admin center, sign in with a user account that has been assigned the User Account Administrator
or Company Administrator role and use Groups to add the appropriate user accounts and groups to the
appropriate access groups.
For PowerShell, first Connect with the Azure Active Directory V2 PowerShell module.
Next, use the following command block to add an individual user account to an access group:

$userUPN="<UPN of the user account>"


$grpName="<display name of the access group>"
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID
-ObjectId (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

TIP
For a text file that contains all the PowerShell commands and an Excel configuration worksheet that generates PowerShell
commands based on your group and user account names, download the Isolated SharePoint Online Team Site Deployment
Kit.

If you stored the UPNs of user accounts for any of the access groups in a text file, you can use the following
PowerShell command block to add them all at one time:

$grpName="<display name of the access group>"


$fileName="<path and name of the file containing the list of account UPNs>"
$grpID=(Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID
Get-Content $fileName | ForEach { $userUPN=$_; Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where {
$_.UserPrincipalName -eq $userUPN }).ObjectID -ObjectID $grpID }

For PowerShell, use the following command block to add an individual group to an access group:

$nestedGrpName="<display name of the group to add to the access group>"


$grpName="<display name of the access group>"
Add-AzureADGroupMember -RefObjectId (Get-AzureADGroup | Where { $_.DisplayName -eq $nestedGrpName }).ObjectID
-ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

The results should be the following:


The site admins Azure AD group contains the site admin user accounts or groups
The site members Azure AD group contains the site member user accounts or groups
The site viewers Azure AD group contains the user accounts or groups that can only view the site contents
Validate the list of group members for each access group with the Office Admin center or with the following
PowerShell command block:

$grpName="<display name of the access group>"


Get-AzureADGroupMember -ObjectId (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID | Sort
UserPrincipalName | Select UserPrincipalName,DisplayName,UserType

Here is your resulting configuration with the three site access groups populated with user accounts or groups.
Phase 2: Create and configure the isolated team site
In this phase, you create the isolated SharePoint Online site and configure the permissions for the default
SharePoint Online permission levels to use your new Azure AD -based access groups.
First, create the SharePoint Online team site with these steps.
1. Sign in to the Office 365 portal with an account that will also be used to administer the SharePoint Online
team site (a SharePoint Online administrator). For help, see Where to sign in to Office 365.
2. In the list of tiles, click SharePoint.
3. In the new SharePoint tab of your browser, click + Create site.
4. On the Create a site page, click Team site.
5. In Site name, type a name for the team site.
6. In Team site description, type an optional description of the purpose of the site.
7. In Privacy settings, select Private - only members can access this site, and then click Next.
8. On the Who do you want to add? pane, click Finish.
Next, from the new SharePoint Online team site, configure permissions.
1. In the tool bar, click the settings icon, and then click Site permissions.
2. In the Site permissions pane, click Advanced permissions settings.
3. On the new Permissions tab of your browser, click Access Request Settings.
4. In the Access Requests Settings dialog box, clear Allow member to share the site and individual
files and folders and Allow access requests (so that all three check boxes are cleared), and then click
OK.
5. On the Permissions tab of your browser, click <site name> Members in the list.
6. In People and Groups, click New.
7. In the Share dialog box, type the name of the site members access group, select it, and then click Share.
8. Click the back button on your browser.
9. Click <site name> Owners in the list.
10. In People and Groups, click New.
11. In the Share dialog box, type the name of the site admins access group, select it, and then click Share.
12. Click the back button on your browser.
13. Click <site name> Visitors in the list.
14. In People and Groups, click New.
15. In the Share dialog box, type the name of the site viewers access group, select it, and then click Share.
16. Close the Permissions tab of your browser.
The results of these permission settings are:
The <site name> Owners SharePoint group contains the site admins access group, in which all the
members have the Full control permission level.
The <site name> Members SharePoint group contains the site members access group, in which all the
members have the Edit permission level.
The <site name> Visitors SharePoint group contains the site viewers access group, in which all the
members have the Read permission level.
The ability for members to invite other members or for non-members to request access is disabled.
Here is your resulting configuration with the three SharePoint groups for the site configured to use the three
access groups, which are populated with user accounts or Azure AD groups.
You and the members of the site, through group membership in one of the access groups, can now collaborate
using the resources of the site.

Next step
When you need to change site access group membership or create a document folder with custom permissions,
see Manage an isolated SharePoint Online team site.

See Also
Isolated SharePoint Online team sites
Design an isolated SharePoint Online team site
Manage an isolated SharePoint Online team site
Manage an isolated SharePoint Online team site
9/27/2018 • 6 minutes to read • Edit Online

Summary: Manage your isolated SharePoint Online team site with these procedures.
This article describes common management operations for an isolated SharePoint Online team site.

Add a new user


When someone new joins the site, you must decide their level of participation in the site:
Administration: Add the new user account to the site admins access group
Active collaboration: Add the user account to the site members access group
Viewing: Add the user account to the site viewers access group
If you are managing user accounts and groups through Windows Server Active Directory (AD ), add the
appropriate users to the appropriate access groups using your normal Windows Server AD user and group
management procedures and wait for synchronization with your Office 365 subscription.
If you are managing user accounts and groups through Office 365, you can use the Office Admin center or
Microsoft PowerShell:
For the Office Admin center, sign in with a user account that has been assigned the User Account
Administrator or Company Administrator role and use Groups to add the appropriate users to the
appropriate access groups.
For PowerShell, first Connect with the Azure Active Directory V2 PowerShell module. To add a user
account to an access group with its user principal name (UPN ), use the following PowerShell command
block:

$userUPN="<UPN of the user account>"


$grpName="<display name of the group>"
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID -
ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

TIP
For a text file that contains all the PowerShell commands and an Excel configuration worksheet that generates PowerShell
commands based on your group and user account names, download the Isolated SharePoint Online Team Site Deployment
Kit.

To add a user account to an access group with its display name, use the following PowerShell command block:

$userDisplayName="<display name of the user account>"


$grpName="<display name of the group>"
Add-AzureADGroupMember -RefObjectId (Get-AzureADUser | Where { $_.DisplayName -eq $userDisplayName }).ObjectID
-ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

Add a new group


To add access to an entire group, you must decide the level of participation of all the members of the group in the
site:
Administration: Add the group to the site admins access group
Active collaboration: Add the group to the site members access group
Viewing: Add the group to the site viewers access group
If you are managing user accounts and groups through Windows Server AD, add the appropriate groups to the
appropriate groups using your normal Windows Server AD user and group management procedures and wait for
synchronization with your Office 365 subscription.
If you are managing user accounts and groups through Office 365, you can use the Office Admin center or
PowerShell:
For the Office Admin center, sign in with a user account that has been assigned the User Account
Administrator or Company Administrator role and use Groups to add the appropriate groups to the
appropriate access groups.
For PowerShell, first Connect with the Azure Active Directory V2 PowerShell module. Then, use the
following PowerShell commands:

$newGroupName="<display name of the new group to add>"


$siteGrpName="<display name of the access group>"
Add-AzureADGroupMember -RefObjectId (Get-AzureADGroup | Where { $_.DisplayName -eq $newGroupName }).ObjectID -
ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $siteGrpName }).ObjectID

Remove a user
When someone's access must be removed from the site, you remove them from the access group for which they
are currently a member based on their participation in the site:
Administration: Remove the user account from the site admins access group
Active collaboration: Remove the user account from the site members access group
Viewing: Remove the user account from the site viewers access group
If you are managing user accounts and groups through Windows Server AD, remove the appropriate users from
the appropriate access groups using your normal Windows Server AD user and group management procedures
and wait for synchronization with your Office 365 subscription.
If you are managing user accounts and groups through Office 365, you can use the Office Admin center or
PowerShell:
For the Office Admin center, sign in with a user account that has been assigned the User Account
Administrator or Company Administrator role and use Groups to remove the appropriate users from the
appropriate access groups.
For PowerShell, first Connect with the Azure Active Directory V2 PowerShell module. To remove a user
account from an access group with its UPN, use the following PowerShell command block:

$userUPN="<UPN of the user account>"


$grpName="<display name of the access group>"
Remove-AzureADGroupMember -MemberId (Get-AzureADUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID -
ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID
To remove a user account from an access group with its display name, use the following PowerShell command
block:

$userDisplayName="<display name of the user account>"


$grpName="<display name of the access group>"
Remove-AzureADGroupMember -MemberId (Get-AzureADUser | Where { $_.DisplayName -eq $userDisplayName }).ObjectID
-ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

Remove a group
To remove access for an entire group, you remove the group from the access group for which they are currently a
member based on their participation in the site:
Administration: Remove the group from the site admins access group
Active collaboration: Remove the group from the site members access group
Viewing: Remove the group from the site viewers access group
If you are managing user accounts and groups through Windows Server Active Directory, remove the appropriate
groups from the appropriate access groups using your normal Windows Server AD user and group management
procedures and wait for synchronization with your Office 365 subscription.
If you are managing user accounts and groups through Office 365, you can use the Office Admin center or
PowerShell:
For the Office Admin center, sign in with a user account that has been assigned the User Account
Administrator or Company Administrator role and use Groups to remove the appropriate groups from the
appropriate access groups.
For PowerShell, first Connect with the Azure Active Directory V2 PowerShell module.
To remove a group from an access group using their display names, use the following PowerShell
command block:

$groupMemberName="<display name of the group to remove>"


$grpName="<display name of the access group>"
Remove-AzureADGroupMember -MemberId (Get-AzureADGroup | Where { $_.DisplayName -eq $groupMemberName
}).ObjectID -ObjectID (Get-AzureADGroup | Where { $_.DisplayName -eq $grpName }).ObjectID

Create a documents subfolder with custom permissions


In some cases, a subset of the people working within the isolated site need a more private place to collaborate. For
SharePoint Online sites, you can create a subfolder in the Documents folder of the site and assign custom
permissions. Those without permissions will not see the subfolder.
To create a documents subfolder with custom permissions, do the following:
1. Sign in to Office 365 with an account that is a member of the admins access group for the site. For help,
see Where to sign in to Office 365.
2. Go to the isolated team site and click Documents.
3. Browse to the folder in the documents folder that will contain the subfolder with custom permissions,
create the folder, and then open it.
4. Click Share.
5. Click Shared with > Advanced.
6. Click Stop inheriting permissions, and then click OK.
7. Click Share.
8. Click Shared with > Advanced.
9. Click Grant Permissions > Shared with > Advanced.
10. On the permissions page, click <site name> Members in the list.
11. On the <site name> Members page, select the checkmark next to the site members access group, click
Actions, click Remove users from group, and then click OK.
12. To add specific members to this subfolder, click New > Add users.
13. In the Share dialog box, type the names of the user accounts that can collaborate on files in the subfolder,
and then click Share.
14. Refresh the web page to see the new results.
15. Under Groups in the left navigation, click the <site name> Visitors group and use steps 11-14 to specify
the set of user accounts that can view the files in the subfolder (as needed).
16. Under Groups in the left navigation, click the <site name> Owners group and use steps 11-14 to specify
the set of user accounts that can administer the permissions in the subfolder (as needed).
17. Close the People and Groups tab in your browser.

See Also
Isolated SharePoint Online team sites
Design an isolated SharePoint Online team site
Deploy an isolated SharePoint Online team site
Isolated SharePoint Online team site dev/test
environment
9/27/2018 • 10 minutes to read • Edit Online

Summary: Configure a SharePoint Online team site that is isolated from the rest of the organization in your
Office 365 dev/test environment.
SharePoint Online team sites in Office 365 are locations for collaboration using a common document library, a
OneNote notebook, and other services. In many cases, you want wide access and collaboration across
departments or organizations. However, in some cases, you want to tightly control the access and permissions for
collaboration among a small group of people.
Access to SharePoint Online team sites and what users can do is controlled by SharePoint groups and permission
levels. By default, SharePoint Online sites have three levels of access:
Members, who can view, create, and modify resources on the site.
Owners, who have complete control of the site, including the ability to change permissions.
Visitors, who only can view resources on the site.
This article steps you through the configuration of an isolated SharePoint Online team site for a secret research
project named ProjectX. The access requirements are:
Only members of the project can access the site and its contents (documents, OneNote Notebook, Pages),
with edit and view SharePoint permission levels controlled through group membership.
Only the site creator and members of an Admins group for the site can perform site administration, which
includes modifying site-level permissions.
There are three phases to setting up an isolated SharePoint Online team site in your Office 365 dev/test
environment:
1. Create the Office 365 dev/test environment.
2. Create the users and groups for ProjectX.
3. Create a new ProjectX SharePoint Online team site and isolate it.

TIP
Click here for a visual map to all the articles in the One Microsoft Cloud Test Lab Guide stack.

Phase 1: Build out your lightweight or simulated enterprise Office 365


dev/test environment
If you just want to create an isolated SharePoint Online team site in a lightweight way with the minimum
requirements, follow the instructions in phases 2 and 3 of Office 365 dev/test environment.
If you want to create an isolated SharePoint Online team site in a simulated enterprise configuration, follow the
instructions in DirSync for your Office 365 dev/test environment.
NOTE
Creating an isolated SharePoint Online site does not require the simulated enterprise dev/test environment, which includes a
simulated intranet connected to the Internet and directory synchronization for a Windows Server AD forest. It is provided
here as an option so that you can test an isolated SharePoint Online site and experiment with it in an environment that
represents a typical organization.

Phase 2: Create user accounts and access groups


Use the instructions in Connect to Office 365 PowerShell to connect to your Office 365 trail subscription with your
global administrator account from:
Your computer (for the lightweight Office 365 dev/test environment).
The CLIENT1 virtual machine (for the simulated enterprise Office 365 dev/test environment).
To create the new access groups for the ProjectX SharePoint Online team site, run these commands from the
Windows Azure Active Directory Module for Windows PowerShell prompt:

$groupName="ProjectX-Members"
$groupDesc="People allowed to collaborate for ProjectX."
New-MsolGroup -DisplayName $groupName -Description $groupDesc
$groupName="ProjectX-Admins"
$groupDesc="People allowed to administer SharePoint for ProjectX."
New-MsolGroup -DisplayName $groupName -Description $groupDesc
$groupName="ProjectX-Viewers"
$groupDesc="People allowed to view the SharePoint resources for ProjectX."
New-MsolGroup -DisplayName $groupName -Description $groupDesc

TIP
Click here for a text file that contains all of the PowerShell commands in this article.

Fill in your organization name (example: contosotoycompany), the two-character country code for your location,
and then run the following commands from the Windows Azure Active Directory Module for Windows PowerShell
prompt:

$orgName="<organization name>"
$loc="<two-character country code, such as US>"
$licAssignment= $orgName + ":ENTERPRISEPREMIUM"
$userName= "designer@" + $orgName + ".onmicrosoft.com"
New-MsolUser -DisplayName "Lead Designer" -FirstName Lead -LastName Designer -UserPrincipalName $userName -
UsageLocation $loc -LicenseAssignment $licAssignment -ForceChangePassword $false

From the display of the New-MsolUser command, note the generated password for the Lead Designer account
and record it in a safe location.
Run the following commands from the Windows Azure Active Directory Module for Windows PowerShell prompt:

$userName= "researcher@" + $orgName + ".onmicrosoft.com"


New-MsolUser -DisplayName "Lead Researcher" -FirstName Lead -LastName Researcher -UserPrincipalName $userName
-UsageLocation $loc -LicenseAssignment $licAssignment -ForceChangePassword $false

From the display of the New-MsolUser command, note the generated password for the Lead Researcher account
and record it in a safe location.
Run the following commands from the Windows Azure Active Directory Module for Windows PowerShell prompt:

$userName= "devvp@" + $orgName + ".onmicrosoft.com"


New-MsolUser -DisplayName "Development VP" -FirstName Development -LastName VP -UserPrincipalName $userName -
UsageLocation $loc -LicenseAssignment $licAssignment -ForceChangePassword $false

From the display of the New-MsolUser command, note the generated password for the Development VP account
and record it in a safe location.
Next, to add the new accounts to the new access groups, run these PowerShell commands from the Windows
Azure Active Directory Module for Windows PowerShell prompt:

$grpName="ProjectX-Members"
$userUPN="designer@" + $orgName + ".onmicrosoft.com"
Add-MsolGroupMember -GroupObjectId (Get-MsolGroup | Where { $_.DisplayName -eq $grpName }).ObjectID -
GroupMemberObjectId (Get-MsolUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID -GroupMemberType
"User"
$userUPN="researcher@" + $orgName + ".onmicrosoft.com"
Add-MsolGroupMember -GroupObjectId (Get-MsolGroup | Where { $_.DisplayName -eq $grpName }).ObjectID -
GroupMemberObjectId (Get-MsolUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID -GroupMemberType
"User"
$grpName="ProjectX-Admins"
Add-MsolGroupMember -GroupObjectId (Get-MsolGroup | Where { $_.DisplayName -eq $grpName }).ObjectID -
GroupMemberObjectId (Get-MsolUser | Where { $_.UserPrincipalName -eq $userCredential.UserName }).ObjectID -
GroupMemberType "User"
$grpName="ProjectX-Viewers"
$userUPN="devvp@" + $orgName + ".onmicrosoft.com"
Add-MsolGroupMember -GroupObjectId (Get-MsolGroup | Where { $_.DisplayName -eq $grpName }).ObjectID -
GroupMemberObjectId (Get-MsolUser | Where { $_.UserPrincipalName -eq $userUPN }).ObjectID -GroupMemberType
"User"

Results:
The ProjectX-Members access group contains the Lead Designer and Lead Researcher user accounts
The ProjectX-Admins access group contains the global administrator account for your trial subscription
The ProjectX-Viewers access group contains the Development VP user account
Figure 1 shows the access groups and their membership.
Figure 1
Phase 3: Create a new ProjectX SharePoint Online team site and isolate
it
To create a SharePoint Online team site for ProjectX, do the following:
1. Using a browser on either your local computer (lightweight configuration) or on CLIENT1 (simulated
enterprise configuration), sign in to the Office 365 portal (https://portal.office.com) using your global
administrator account.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, click + Create site.
4. In Team site name, type ProjectX. In Privacy settings, select Private - only members can access this
site.
5. In Team site description, type SharePoint site for ProjectX, and then click Next.
6. On the Who do you want to add? pane, click Finish.
7. On the new ProjectX-Home tab in your browser, in the tool bar, click the settings icon, and then click Site
permissions.
8. In the Site permissions pane, click Advanced permissions settings.
9. In the new Permissions: Project X tab in your browser, click Access Request Settings.
10. In the Access Requests Settings dialog box, clear Allow members to share the site and individual
files and folders and Allow access requests (so that all three check boxes are cleared), and then click OK.
11. Click ProjectX Members in the list.
12. On the People and Groups page, click New.
13. In the Share dialog box, type ProjectX-Members, select it, and then click Share.
14. Click the back button on your browser.
15. Click ProjectX Owners in the list.
16. On the People and Groups page, click New.
17. In the Share dialog box, type ProjectX-Admins, select it, and then click Share.
18. Click the back button on your browser.
19. Click ProjectX Visitors in the list.
20. On the People and Groups page, click New.
21. In the Share dialog box, type ProjectX-Viewers, select it, and then click Share.
22. Close the People and Groups tab in your browser, click the ProjectX-Home tab in your browser, and then
close the Site permissions pane.
Here are the results of configuring permissions:
The ProjectX Members SharePoint group contains only the ProjectX-Members access group (which
contains only the Lead Designer and Lead Researcher user accounts) and the ProjectX group (which
contains only the global administrator user account).
The ProjectX Owners SharePoint group contains only the ProjectX-Admins access group (which contains
only the global administrator user account).
The ProjectX Visitors SharePoint group contains only the ProjectX-Viewers access group (which contains
only the Development VP user account).
Members cannot modify site-level permissions (this can only be done by members of the ProjectX-Admins
group).
Other user accounts cannot access the site or its resources or request access to the site.
Figure 2 shows the SharePoint groups and their membership.
Figure 2
Now let's demonstrate access using the Lead Designer user account:
1. Close the ProjectX-Home tab in your browser, and then click the Microsoft Office Home tab in your
browser.
2. Click the name of your global administrator, and then click Sign out.
3. Sign in to the Office 365 portal ( https://portal.office.com) using the Lead Designer account name and its
password.
4. In the list of tiles, click SharePoint.
5. On the new SharePoint tab in your browser, type ProjectX in the search box, activate the search, and then
click the ProjectX team site. You should see a new tab in your browser for the ProjectX team site.
6. Click the settings icon. Notice that there is no option for Site Permissions. This is correct because only the
members of the ProjectX-Admins group can modify permissions on the site
7. Open Notepad or a text editor of your choice.
8. Copy the URL of the ProjectX team site and paste it on a new line in Notepad or your text editor.
9. On the new ProjectX-Home tab in your browser, click Documents.
10. Copy the URL of the ProjectX documents folder and paste it on a new line in Notepad or your text editor.
11. On the new ProjectX-Documents tab in your browser, click New > Word document.
12. Type some text in the Word Online page, wait for the status to indicate Saved, click the back button on
your browser, and then refresh the page. You should see a new Document.docx in the Documents folder.
13. Click the ellipsis for the Document.docx document, and then click Get a link.
14. Copy the URL in the Share 'Document.docx' dialog box and paste it on a new line in Notepad or your text
editor, and then close the Share 'Document.docx' dialog box.
15. Close the ProjectX-Documents and SharePoint tabs in your browser, and then click the Microsoft
Office Home tab.
16. Click the Lead Designer name, and then click Sign out.
Now let's demonstrate access using the Development VP user account:
1. Sign in to the Office 365 portal ( https://portal.office.com) using the Development VP account name and its
password.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, type ProjectX in the search box, activate the search, and then
click the ProjectX team site. You should see a new tab in your browser for the ProjectX team site.
4. Click Documents, and then click the Document.docx file.
5. In the Document.docx tab in your browser, try to modify the text. You should see a message stating This
document is read-only. This is expected because the Development VP user account only has view
permissions for the site.
6. Close the Document.docx, ProjectX-Documents, and SharePoint tabs in your browser.
7. Click the Microsoft Office Home tab, click the Development VP name, and then click Sign out.
Now let's demonstrate access with a user account that has no permissions:
1. Sign in to the Office 365 portal ( https://portal.office.com) using the User 3 account name and its password.
2. In the list of tiles, click SharePoint.
3. On the new SharePoint tab in your browser, type ProjectX in the search box and then activate the search.
You should see the message Nothing here matches your search.
4. From the open instance of Notepad or your text editor, copy the URL for the ProjectX site into the address
bar of your browser and press Enter. You should see an Access Denied page.
5. From Notepad or your text editor, copy the URL for the ProjectX Documents folder into the address bar of
your browser and press Enter. You should see an Access Denied page.
6. From Notepad or your text editor, copy the URL for the Documents.docx file into the address bar of your
browser and press Enter. You should see an Access Denied page.
7. Close the SharePoint tab in your browser, click the Microsoft Office Home tab, click the User 3 name,
and then click Sign out.
Your isolated SharePoint Online site is now ready for your additional experimentation.

Next Step
When you are ready to deploy an isolated SharePoint Online team site in production, see the step-by-step design
considerations in Design an isolated SharePoint Online team site.

See Also
Isolated SharePoint Online team sites
Cloud adoption Test Lab Guides (TLGs)
Base Configuration dev/test environment
Office 365 dev/test environment
Cloud adoption and hybrid solutions
SIEM server integration with Microsoft 365 services
and applications
10/30/2018 • 2 minutes to read • Edit Online

Overview
If your organization is using a Security Information and Event Management (SIEM ) server, or if you are planning to
get a SIEM server soon, you might be wondering how that'll integrate with your Microsoft 365, including Office
365 Enterprise. Whether you need a SIEM server depends on many factors, such as your organization's security
requirements. Microsoft 365 offers a variety of security features; however, if your organization has content and
applications on premises and in the cloud (as in the case of a hybrid cloud deployment), you might consider adding
a SIEM server for extra protection. Or, if your organization has particularly stringent security requirements you
must meet, you might consider adding a SIEM server to your environment.

SIEM server integration Microsoft 365


A SIEM server can receive data from a wide variety of Microsoft 365 services and applications. The following table
lists several Microsoft 365 services and applications along with SIEM server inputs and where to go to learn more
about SIEM server integration.

MICROSOFT 365 SERVICE OR APPLICATION SIEM SERVER INPUTS RESOURCES TO LEARN MORE

Office 365 Advanced Threat Protection Audit logs SIEM integration with Office 365 Threat
or Intelligence and Advanced Threat
Office 365 Threat Intelligence Protection

Microsoft Cloud App Security Log integration SIEM integration with Microsoft Cloud
App Security

Office 365 Cloud App Security Log integration Integrate your SIEM server with Office
365 Cloud App Security

Windows Defender Advanced Threat Log integration Pull alerts to your SIEM tools
Protection

Azure Security Center (Threat Protection Alerts Azure Security data export to SIEM -
and Threat Detection) Pipeline Configuration - Preview

Azure Active Directory Identity Audit logs Integrate Azure Active Directory audit
Protection logs

Azure Advanced Threat Analytics Log integration ATA SIEM log reference

Audit logging must be turned on


Make sure audit logging is turned on before you configure SIEM server integration.
For SharePoint Online, OneDrive for Business, and Azure Active Directory, audit logging is turned on in the
Security & Compliance Center.
For Exchange Online, audit logging is turned on with Windows PowerShell.

See Also
Cloud adoption and hybrid solutions
Cloud adoption Test Lab Guides (TLGs)
Get started with the Microsoft Service Trust Portal
9/26/2018 • 5 minutes to read • Edit Online

The Microsoft Service Trust Portal (STP ) provides a variety of content, tools, and other resources about Microsoft
security, privacy and compliance practices. It also includes independent third-party audit reports of Microsoft's
online services, and information about how our online services can help your organization maintain and track
compliance with standards, laws, and regulations, such as:
International Organization for Standardization (ISO )
Service Organization Controls (SOC )
National Institute of Standards and Technology (NIST)
Federal Risk and Authorization Management Program (FedRAMP )
General Data Protection Regulation (GDPR )

Accessing the Service Trust Portal


The STP contains details about Microsoft's implementation of controls and processes that protect our cloud
services and the customer data therein. To access some STP materials, you must log in as an authenticated user
with your Microsoft cloud services account (either an Azure Active Directory organization account or a Microsoft
Account) and review and accept the Microsoft Non-Disclosure Agreement for Compliance Materials.
Existing customers can access the STP at https://aka.ms/STP with one of the following online subscriptions
(trial or paid):
Office 365
Dynamics 365
Azure

NOTE
Azure Active Directory accounts associated with organizations have access to the full range of documents and features like
Compliance Manager. Microsoft accounts created for personal use have limited access to Service Trust Portal content.

New customers and customers evaluating Microsoft online services


To create a new account or to create a trial account, use one of the following sign-up forms (also used for trial
accounts) to get access to the STP.
Sign up for a new Office 365 Business trial account or a new Office 365 Enterprise trial account
Sign up for a new Dynamics 365 trial account
Sign up for a new Azure trial account.
When you sign up for either a free trial, or a subscription, you must enable Azure Active Directory to support your
access to the STP.

Navigating the Service Trust Portal


STP features and content are accessible from the main menu, shown below:

Service Trust Portal


The Service Trust Portal link takes you to the STP home page, which includes a What's New section for the STP
and Compliance Manager that provides details on the latest updates.
Compliance Manager
Use Use Compliance Manager to help meet data protection and regulatory requirements when using Microsoft
cloud services to help meet data protection and regulatory requirements when using Microsoft Cloud Services.
Trust Documents
The Service Trust Portal gives you access to wealth of security implementation and design information with the
goal of making it easier for you to meet regulatory compliance objectives by understanding how Microsoft cloud
services keep your data secure. To review content, select an option from the menu.
Audit Reports provides independent audit and assessment reports on Microsoft cloud services compliance
with data protection standards and regulatory requirements, including:
Data Protection provides Trust Documents for download, information about how Microsoft operates
Azure, Dynamics 365, and Office 365.
Azure Security and Compliance Blueprints offers turn-key security and compliance solutions and
support, tailored to the needs of industry verticals, that accelerate cloud adoption and utilization for
customers with regulated or restricted data.
Regional Compliance
This section provides regionally specific compliance information, often in the form of Legal Opinions that render
Microsoft Cloud Services.
Czech Republic provides legal opinions on Microsoft online service compliance with Czech Republic law.
Poland provides legal opinions on Microsoft online service compliance with the laws of Poland.
Romania provides legal opinions on Microsoft online service compliance with the laws of Romania.
Spain provides legal opinions on Microsoft online service compliance with the laws of Spain.
Privacy
This site provides information about the capabilities in Microsoft services that you can use to address specific
requirements of the GDPR, documentation helpful to your GDPR accountability and to your understanding of the
technical and organizational measures Microsoft has taken to support the GDPR.
GDPR: Get Started - The homepage for Service Trust Portal GDPR -related content, with links to relevant
content and tools available.
Data Subject Requests - How Microsoft enables you to respond to Data Subject Requests, with links to
relevant documentation and tools.
Data Breach - Information on how Microsoft detects and responds to a breach of personal data and
notifies the controllers under GDPR, with links to relevant documentation and tools.
DPIA - Information about how Microsoft helps organizations meet their own Data Protection Impact
Assessment obligations.
Resources
Frequently Asked Questions provides answers to common and important questions about the STP and
Compliance Manager.
Office 365 Security and Compliance Center offers comprehensive resources for learning about security
and compliance in Office 365, including documentation, articles, and recommended best practices.
Admin
Administrative functions that are only available to the tenant administrator account, and will only be visible when
you are signed in as a global administrator.
Settings enables you to assign role-based access to Compliance Manager. For more information, see the
"Permissions and role-based access control" section in Use Compliance Manager to help meet data protection and
regulatory requirements when using Microsoft cloud services.
Search

Click the magnifying glass in the upper right-hand corner of the page by to expand the Search input field, enter
your search terms and press Enter. The Search control will appear, with the search term in the search pane input
field, and search results will appear beneath.
By default, Search returns Document results, and you can use the Filter By dropdown lists to refine the list of
documents displayed, to add or remove search results from view. You can use multiple filter attributes at the same
time to narrow the returned documents to specific cloud services, categories of compliance or security practices,
regions of the world, or industries. Click the document name link to download the document.

Click the Compliance Manager link to display search results for Compliance Manager assessment controls. The
listed search results show the date the assessment was created, the name of the assessment grouping, the
applicable cloud service, and whether the controls are Microsoft or Customer Managed.
NOTE
Service Trust Portal reports and documents are available to download for at least twelve months after publishing or until a
new version of document becomes available.

Localization support
Service Trust Portal enables you to view the page content in different languages. To change the page language,
simply click on the globe icon in the lower left corner of the page and select the language of your choice.

Feedback
We can help with questions about the Service Trust Portal, or errors you experience when you use the portal. You
can also contact us with questions and feedback about Service Trust Portal compliance reports and trust resources
by using the Feedback link on the bottom of the STP pages.
Your feedback is very important to us. Click on the Feedback button at the bottom of the page to send us
comments about what you did or did not like, or suggestions you may have for improving our products or product
features.
Use Compliance Manager to help meet data
protection and regulatory requirements when using
Microsoft cloud services
11/19/2018 • 48 minutes to read • Edit Online

Compliance Manager isn't available in Office 365 operated by 21Vianet, Office 365 Germany, Office 365 U.S.
Government Community High (GCC High), or Office 365 Department of Defense.
Compliance Manager, a workflow -based risk assessment tool in the Microsoft Service Trust Portal, enables you to
track, assign, and verify your organization's regulatory compliance activities related to Microsoft Professional
Services and Microsoft cloud services, such as Microsoft Office 365, Microsoft Dynamics 365, and Microsoft
Azure. Compliance Manager:
Combines the detailed information provided by Microsoft to auditors and regulators as part of various
third-party audits of Microsoft 's cloud services against various standards (for example, ISO 27001, ISO
27018, and NIST) and information that Microsoft compiles internally for its compliance with regulations
(such as HIPAA and the EU General Data Protection Regulation, or GDPR ) with your own self-assessment
of your organization's compliance with these standards and regulations.
Enables you to assign, track, and record compliance and assessment-related activities, which can help your
organization cross team barriers to achieve your organization's compliance goals.
Provides a Compliance Score to help you track your progress and prioritize the auditing controls that will
help reduce your organization's exposure to risk.
Provides a secure repository for you to upload and manage evidence and other artifacts related to your
compliance activities.
Produces richly detailed reports in Microsoft Excel that document the compliance activities performed by
Microsoft and your organization, which can be provided to auditors, regulators, and other compliance
stakeholders.

IMPORTANT
Compliance Manager is a dashboard that provides a summary of your data protection and compliance stature and
recommendations to improve data protection and compliance. The Customer Actions provided in Compliance Manager are
recommendations; it is up to each organization to evaluate the effectiveness of these recommendations in their respective
regulatory environment prior to implementation. Recommendations found in Compliance Manager should not be
interpreted as a guarantee of compliance.

What is Compliance Manager?


Compliance Manager is a workflow -based risk assessment tool designed to help you manage regulatory
compliance within the shared responsibility model of the cloud. Compliance Manager provides you with a
dashboard view of standards and regulations and assessments that contain Microsoft's control implementation
details and test results and customer control implementation guidance and tracking for your organization to enter.
Compliance Manager provides certification assessment control definitions, guidance on implementation and
testing of controls, risk-weighted scoring of controls, role-based access management, and an in-place control
action assignment workflow to track control implementation, testing status and evidence management.
Compliance Manager optimizes compliance workload by enabling customers to logically group assessments
together and apply assessment control testing to identical or related controls, reducing the duplication of effort
that might otherwise be required to satisfy identical control requirements across different certifications.

Using search

Click the magnifying glass in the upper right-hand corner of the page by to expand the Search input field, enter
your search terms and press Enter. The Search control will appear, with the search term in the search pane input
field, and search results will appear beneath.
By default, Search returns Document results, and you can use the Filter By dropdown lists to refine the list of
documents displayed, to add or remove search results from view. You can use multiple filter attributes at the same
time to narrow the returned documents to specific cloud services, categories of compliance or security practices,
regions of the world, or industries. Click the document name link to download the document.

Click on the Compliance Manager link to display Search results for Compliance Manager assessment controls. The
listed search results show the date the assessment was created, the name of the assessment grouping, the
applicable cloud service, and whether the controls is Microsoft or Customer Managed.
NOTE
Service Trust Portal reports and documents are available to download for at least twelve months after publishing or until a
new version of document becomes available.

Localization support
Service Trust Portal enables you to view the page content in different languages. To change the page language,
simply click on the globe icon in the lower left corner of the page and select the language of your choice.

Assessments in Compliance Manager


The core component of Compliance Manager is called an Assessment. An Assessment is an assessment of a
Microsoft service against a certification standard or data protection regulation (such as ISO 27001:2013, and the
GDPR ). Assessments help you to discern your organization's data protection and compliance posture against the
selected industry standard for the selected Microsoft cloud service. Assessments are completed by the
implementation of the controls that map to the certification standard being assessed.
The structure of an Assessment is based on the responsibility that is shared between Microsoft and your
organization for assessing security and compliance risks in the cloud and for implementing the data protection
safeguards specified by a compliance standard, a data protection standard, a regulation, or a law.
An Assessment is made of several components, which are:
In-Scope Services - Each assessment applies to a specific set of Microsoft services, which are listed in the
In-Scope Cloud Services section.
Microsoft Managed Controls - For each cloud service, Microsoft implements and manages a set of
controls as part of Microsoft's compliance with various standards and regulations. These controls are
organized into control families that align with the structure from the corresponding certification or
regulation that the Assessment is aligned to. For each Microsoft managed control, Compliance Manager
provides details about how Microsoft implemented the control, along with how and when that
implementation was tested and validated by an independent third-party auditor.
Here's an example of three Microsoft managed controls in the Security control family from an Assessment
of Office 365 and the GDPR.
a. Specifies the following information from the certification or regulation that maps to the Microsoft
managed control.
Control ID - The section or article number from the certification or regulation that the control maps
to.
Title - The title from the corresponding certification or regulation.
Article ID - This field is included only for GDPR assessments, as it specifies the corresponding
GDPR article number.
Description - Text of the standard or regulation that maps to the selected Microsoft managed
control.
b. The Compliance Score for the control, which indicates the level of risk (due to non-compliance or control
failure) associated with each Microsoft managed control. See Understanding the Compliance Score for
more information. Note that Compliance Scores are rated from 1 to 10 and are color-coded. Yellow
indicates low risk controls, orange indicates medium-risk controls, and red indicated high-risk controls.
c. Information about the implementation status of a control, the date the control was tested, who performed
the test, and the test result.
d. For each control, you can click More to see additional information, including details about Microsoft's
implementation of the control and details about how the control was tested and validated by an
independent third-party auditor.
Customer Managed Controls - This is the collection of controls that are managed by your organization.
Your organization is responsible for implementing these controls as part of your compliance process for a
given standard or regulation. Customer managed controls are also organized into control families for the
corresponding certification or regulation. Use the customer managed controls to implement the
recommended actions suggested by Microsoft as part of your compliance activities. Your organization can
use the prescriptive guidance and recommended Customer Actions in each customer managed control to
manage the implementation and assessment process for that control.
Customer managed controls in Assessments also have built-in workflow management functionality that you
can use to manage and track your organization's progress towards completing the Assessment. For
example, a Compliance Officer in your organization can assign an Action Item to an IT admin who has the
responsibility and necessary permissions to perform the actions that are recommended for the control.
When that work is complete, the IT admin can upload evidence of their implementation tasks (for example,
screen shots of configuration or policy settings) and then assign the Action Item back to the Compliance
Officer to evaluate the collected evidence, test the implementation of the control, and record the
implementation date and test results in Compliance Manager. For more information, see the Managing the
assessment process section in the article.

Permissions and role-based access control


By default, everyone in your organization with an Office 365 or Azure AD account has access to Compliance
Manager and can perform any action in Compliance Manager. To change from default permissions to the role-
based access control model, at least one user must be added to each Compliance Manager role (see the following
instructions). After a user is added to a role, the permissions to perform the actions assigned to that role are
removed from the default set of permissions available to all users, and only users that have been provisioned that
role will be able to access Compliance Manager and perform the actions allowed by that role.
Once role-based access has been implemented, any user that is not assigned to a defined Compliance Manager
role will have Guest access.

NOTE
To fully implement role-based access control to manage who can access and perform actions in Compliance Manager, a user
must be added to each role to change the default permissions. For example, if you add a user to the role that lets users
manage Assessments, only members of that role can manage Assessments. Similarly, if you don't add a user to the role that
lets users read the data in Assessments, then all users in your organization can access Compliance Manager and read data in
any Assessment.

The following table describes each Compliance Manager permission and what it allows the user do. The table also
indicates the role that each permission is assigned to.

COMPLIANCE COMPLIANCE COMPLIANCE


COMPLIANCE MANAGER MANAGER MANAGER
MANAGER READER CONTRIBUTOR ASSESSOR ADMINISTRATOR PORTAL ADMIN

Read data -
Users can read
but not edit data.

Edit data - Users


can edit all fields,
except the Test
Result and Test
Date fields.
COMPLIANCE COMPLIANCE COMPLIANCE
COMPLIANCE MANAGER MANAGER MANAGER
MANAGER READER CONTRIBUTOR ASSESSOR ADMINISTRATOR PORTAL ADMIN

Edit test results


- Users can edit
the Test Result
and Test Date
fields.

Manage
assessments -
Users can create,
archive, and
delete
Assessments.

Manage users -
Users can add
other users in
their organization
to the Reader,
Contributor,
Assessor, and
Administrator
roles. Only those
users with the
Global
Administrator
role in your
organization can
add or remove
users from the
Portal Admin
role.

Guest access
After Compliance Manager access has been configured, any user that does not have a provisioned role is in the
Guest access role by default (which is also the experience of any non-organization-provisioned accounts like
personal Microsoft Accounts). Guest Access users do not have full access to all of the Compliance Manager
features and are not able to see any of the organization's compliance assessment data, however they are able to
use Compliance Manager to view Microsoft's compliance assessment reports and Service Trust documents. For an
illustration of what is and is not accessible, see the images below where accessible features are outlined in blue and
inaccessible features are outlined in red.
Understanding the Compliance Score
On the Dashboard, Compliance Manager displays a total score for Office 365 assessments in the upper right hand
corner of the tile. This is the overall total Compliance Score for the Assessment, and is the accumulation of points
received for each control assessment that has been marked as Implemented and Tested in the Assessment. When
adding an Assessment, you will see that the Compliance Score is already on the way towards completion because
the points for the Microsoft managed controls that have been implemented by Microsoft and tested by
independent third parties are already applied.

The remaining points come from the successful customer control assessment, from the implementation and
testing of the customer-managed controls, each of which has a specific value that contributes to the overall
compliance score.
Each Assessment displays a risk-based Compliance Score to help you assess the level of risk (due to non-
compliance or control failure) associated with each control (including both Microsoft managed and customer
managed controls) in an Assessment. Each customer managed control is assigned a possible number of points
(called a severity ranking ) on a scale from 1 to 10, where more points are awarded for controls associated with a
higher risk factor if the control fails, and fewer points are awarded for lower-risk controls.
For example, the User Access Management assessment control shown below has a very high severity risk ranking,
and displays an assigned value of 10.

By comparison, the Information Backup assessment control shown below has a lower severity risk ranking, and
displays an assigned value of 3.

The Compliance Manager assigns a default severity ranking to each control. Risk rankings are calculated based on
the following criteria:
Whether a control prevents incidents from happening (highest ranking), detects incidents that have
happened, or corrects the impact of an incident (lowest ranking). In terms of severity ranking, a control that
prevents a threat and is mandatory is assigned the highest number of points; controls that are detective or
corrective (regardless of whether they're mandatory or discretionary) are assigned the lowest number of
points.
Whether a control (after it's been implemented) is mandatory and therefore can't be by-passed by users (for
example, users having to reset their password and meet password length and character requirements) or
discretionary and can be by-passed by users (for example, business rules that require users to lock their
screens when their computers are unattended).
Controls related to risks to data confidentiality, integrity, and availability, whether these risks come from
internal or external threats, and whether the threat is malicious or accidental. For example, controls that
would help prevent an external attacker from breaching that network and gaining access to personally
identifiable information would be assigned more points than a control related to preventing an employee
from accidentally mis-configuring a network router setting that results in a network outage).
Risks related to legal and external drivers, such as contracts, regulations, and public commitments, for each
control.
The displayed Compliance Score values for the control are applied in their entirety to the Total Compliance Score
on a pass/fail basis--either the control is implemented and passes the subsequent assessment test or it does not;
there is no partial credit for a partial implementation. Only when the control has its Implementation Status set
to Implemented or Alternative Implementation and the Test Result is set to Passed are the assigned points
added to the Total Compliance Score.
Most importantly, the Compliance Score can help you prioritize which controls to focus on for implementation by
indicating which controls that have a higher potential risk if there is a failure related to a control. In addition to risk-
based prioritization, it is worthwhile noting that where assessment controls are related to other controls (either
within the same assessment or in another assessment that is in the same assessment grouping) completing a
single control successfully can result in a significant reduction of effort based on the synchronization of control test
results.
For example, in the image below we see that the Office 365 - GDPR Assessment is currently 46% assessed, with
51 of 111 control assessments completed for a Total Compliance score of 289 out of a possible 600.

Within the assessment GDPR control 7.5.5 is related to 5 other controls (7.4.1, 7.4.3, 7.4.4,.7.4.8, and 7.4.9) each
with a moderate to high severity risk rating score of 6 or 8). Using the assessment filter, we have selected all of
these controls, making them visible in the assessment view, and can see below that none of them have been
assessed.
As those 6 controls are related, the completion of any one them will result in a synchronization of those test results
across the related controls within this assessment (just as it will for any related controls in an assessment that is in
the same assessment grouping). Upon completion of the implementation and testing of GDPR control 7.5.5, the
control detail area refreshes to show that all 6 controls have been assessed, with a corresponding increase in the
number of assessed controls to 57 and 51% assessed, and a change in total Compliance Score of +40.

This confirmation update dialog box will appear if you are about to change the Implementation Status of a related
control in a way that will impact the other related controls.
NOTE
Currently, only Assessments for Office 365 cloud services include a Compliance Score. Assessments for Azure and Dynamics
show an assessment status.

Compliance Score methodology


The Compliance Score, like the Microsoft Secure Score, is similar to other behavior-based scoring systems; your
organization's activity can increase its Compliance Score by performing activities related to data protection, privacy,
and security.

NOTE
The Compliance Score does not express an absolute measure of organizational compliance with any particular standard or
regulation. It expresses the extent to which you have adopted controls which can reduce the risks to personal data and
individual privacy. No service can guarantee that you are compliant with a standard or regulation, and the Compliance Score
should not be interpreted as a guarantee in any way.

Assessments in Compliance Manager are based on the shared responsibility model for cloud computing. In the
shared responsibility model, Microsoft and each customer share responsibility for the protection of the customer's
data when that data is stored in our cloud.
As shown in the Office 365 GDPR Assessment below, Microsoft and customers are each responsible for
performing a variety of Actions that are designed to satisfy the requirements of the standard or regulation being
assessed. To rationalize and understand the required Actions across a variety of standards and regulations,
Compliance Manager treats all standards and regulations as if they were control frameworks. Thus, the Actions
performed by Microsoft and by customers for each Assessment involve the implementation and validation of
various controls.
Here's the basic workflow for a typical Action:
1. The Compliance, Risk, Privacy, and/or Data Protection Officer of an organization assigns the task to
someone in the organization to implement a control. That person could be:
A business policy owner
An IT implementer
Another individual in the organization who has responsibility for performing the task
2. That individual performs the tasks necessary to implement the control, uploads evidence of implementation
into Compliance Manager, and marks the control(s) tied to the Action as implemented. Once these tasks are
completed, they assign the Action to an Assessor for validation. Assessors can be:
Internal assessors that perform validation of controls within an organization
External assessors that examine, verify, and certify compliance, such as the third-party independent
organizations that audit Microsoft's cloud services
3. The Assessor validates the control and examines the evidence and marks the control(s) as assessed and the
results of the assessment (e.g., passed).
Once all the controls associated with an Assessment have been assessed, the Assessment is considered completed.
Every Assessment in Compliance Manager comes pre-loaded with information that provides details about the
Actions taken by Microsoft to satisfy the requirements of the controls for which Microsoft is responsible. This
information includes details about how Microsoft has implemented each control and how and when Microsoft's
implementation was assessed and verified by a third-party auditor. For this reason, the Microsoft Managed
Controls for each Assessment are marked as Assessed, and the Compliance Score for the Assessment reflects this.
Each Assessment includes a total Compliance Score based on the shared responsibility model. Microsoft's
implementation and testing of controls for Office 365 contributes a portion of the total possible points associated
with a GDPR assessment. As the customer implements and tests each of the customer Actions, the Compliance
Score for the Assessment will increase by the value assigned to the control.
Risk-based scoring methodology
Compliance Manager uses a risk-based scoring methodology with a scale from 1-10 that assigns a higher value to
controls that represent a higher risk in the event the control fails or is non-compliant. The scoring system used by
Compliance Score is based on several key factors, such as:
The essence of the control
The level of risk of the control based on the kinds of threats
The external drivers for the control

Essence of the control


The essence of the control is based on whether the control is Mandatory or Discretionary, and whether it is
Preventative, Detective, or Corrective.
Mandatory or discretionary
Mandatory controls are controls that cannot be bypassed either intentionally or accidentally. An example of a
common mandatory control is a centrally-managed password policy that sets requirements for password length,
complexity, and expiration. Users must comply with these requirements in order to access the system.
Discretionary controls rely upon users to understand policy and act accordingly. For example, a policy requiring
users to lock their computer when they leave it is a discretionary control because it relies on the user.
Preventative, detective, or corrective
Preventative controls are those that prevent specific risks. For example, protecting information at rest using
encryption is a preventative control against attacks, breaches, etc. Separation of duties is a preventative control to
manage conflict of interest and to guard against fraud.
Detective controls are those that actively monitor systems to identify irregular conditions or behaviors that
represent risk or that can be used to detect intrusions or determine if a breach has occurred. System access
auditing and privileged administrative actions auditing are types of detective monitoring controls; regulatory
compliance audits are a type of detective control used to find process issues.
Corrective controls are those that try to keep the adverse effects of a security incident to a minimum, take
corrective action to reduce the immediate effect, and reverse the damage, if possible. Privacy incident response is a
corrective control to limit damage and restore systems to an operational state after a breach.
By evaluating each control using these factors, we determine the essence of the control and assign it a value
relative to the risk that it represents.
Threat
Mandatory Discretionary

Preventative High risk Medium risk

Detective Medium risk Low risk

Corrective Medium risk Low risk

Threat refers to anything that poses a risk to the fundamental, universally-accepted security standard known as the
CIA triad for data: Confidentiality, Integrity, and Availability:
Confidentiality means that information can be read and understood only by trusted, authorized parties.
Integrity means that information has not been modified or destroyed by unauthorized parties.
Availability means that information can be accessed readily with a high level of quality of service.
A failure of any of these characteristics is considered a compromise of the system as a whole. Threats can come
from both internal and external sources, and an actor's intent can be accidental or malicious. These factors are
estimated in a threat matrix that assigns threat levels of either High, Moderate, or Low to each combination of
scenarios.

INTERNAL EX TERNAL

Malicious Accidental Malicious Accidental

Confidentiali (H, M, or L) (H, M, or L) (H, M, or L) (H, M, or L)


ty

Integrity (H, M, or L) (H, M, or L) (H, M, or L) (H, M, or L)

Availability (H, M, or L) (H, M, or L) (H, M, or L) (H, M, or L)

External drivers

CONTRACTS REGULATIONS PUBLIC COMMITMENTS

(H, M, or L) (H, M, or L) (H, M, or L)

External factors such as applicable regulations, contracts, and public commitments can influence controls designed
to protect data and prevent data breaches, and each of these factors are assigned risk values or High, Moderate or
Low.
The estimated number of occurrences of these risk values of High, Moderate, or Low across the 15 possible risk
scenarios represented in the CIA/Threat and Legal/External Drivers are combined to provide a risk weighting,
which considers the likelihood and number of occurrences of risks at a given value as significant and is taken into
consideration when calculating the severity ranking of the control.
Based on the control's severity ranking, the control is assigned its compliance score value, a number between 1
(low ) and 10 (high), grouped into the following categories of risk:

RISK LEVEL CONTROL VALUE


RISK LEVEL CONTROL VALUE

Low 1-3

Moderate 6

High 8

Severe 10

By prioritizing assessment controls with the highest compliance score values, the organization will be
concentrating on the highest risk items and receive proportionally higher positive feedback in the form of more
points added to the total compliance score for the assessment for each control assessment completed.
Summmary of scoring methodology
The Compliance Score is a core component of the way that Compliance Manager helps organizations understand
and manage their compliance. The Compliance Score for an assessment is an expression of the company's
compliance with a given standard or regulation as a number, where the higher the score (up to the maximum
number of points allocated for the Assessment), the better the company's compliance posture. Understanding the
compliance scoring methodology in which assessment controls are assigned risk severity values between 1- 10
(low to high), and how completed control assessments add to the total compliance score is crucial to organizations
for prioritizing their actions.

Grouping Assessments
When you create a new Assessment, you're prompted to create a new group to assign the Assessment to or assign
the Assessment to an existing group. Groups allow you to logically organize Assessments and share common
information and workflow tasks between Assessments that have the same or related customer managed controls.
For example, you could group Assessments by year or teams, departments, or agencies within your organization
or group them by year. Here are some examples of groups and the Assessments they might contain.
GDPR Assessments - 2018
Office 365 + GDPR
Azure + GDPR
Dynamics + GDPR
Azure Assessments - 2018
Azure + GDPR
Azure + ISO 27001:2013
Azure + ISO 27018:2014
Data Security and Privacy Assessments
Office 365 + ISO 27001:2013
Office 365 + ISO 27018:2014
Azure + ISO 27001:2013
Azure + ISO 27018:2014
TIP
We recommend that your determine a grouping strategy for your organization before adding new assessments.

These are the requirements for grouping Assessments:


Group names (also called Group IDs ) must be unique within your organization.
Groups can contain Assessments for the same certification/regulation, but each group can only contain one
Assessment for a specific cloud service/certification pair. For example, a group can't contain two
Assessments for Office 365 and GDPR. Similarly, a group can contain multiple Assessments for the same
cloud service as long as the corresponding certification/regulation for each one is different.
Once an assessment has been added to an assessment grouping, the grouping cannot be changed. You can
rename the assessment group, which changes the name of the assessment grouping for all of the assessments
associated with that group. You can create a new assessment and a new assessment group and copy information
from an existing assessment, which effectively creates a duplicate of that assessment in a different assessment
group. Archiving an assessment breaks the relationship between that assessment and the assessment group; any
further updates to other related assessments are no longer reflected in the archived assessment.
As previous explained, one key advantage of using groups is that when two different Assessments in the same
group share the same customer managed control (and therefore the customer actions would be the same for each
control), then the completion of implementation details, testing information, and status for the control in one
Assessment would be synchronized to the same control in any other Assessment in the group. In other words, if
Assessments share the same control and those Assessments are in the same group, you'd only have to manage the
assessment process for the control in one Assessment. The results for that control will be automatically
synchronized to other Assessments. For example, ISO 27001 and ISO 27018 both have a control related to
password policies. If the Test Status for the control is set to "Passed" in one Assessment, the control will be updated
(and marked as "Passed") in the other Assessment, as long as both assessments are part of the same Assessment
Group.
As an example of this, consider these two related assessment controls, each having to do with encryption of data
on public networks, control 6.10.1.2 in the Office 365 - GDPR assessment, and control SC -13 in the Office 365 -
NIST 800-53 assessment. These are related assessment controls, in two different assessments, both in the Default
Group; initially, neither assessment has completed any customer control assessments, as is displayed on the
Compliance Manager Dashboard that shows these two Assessments.
By clicking the Office 365 - GDPR assessment, and using the filter controls to view GDPR control 6.10.1.2, we see
that NIST 800-53 control SC -13 is listed as a related control.

Here we show the completion of the implementation and testing of GDPR control 6.10.1.2.
By navigating to the related control in the grouped assessment, we see that NIST 800-53 SC -13 has also been
marked as completed with the same date and time, with no additional implementation or testing effort.

Back at the Dashboard, we can see that each assessment has 1 control assessment completed and that the total
Compliance Score for each assessment has increased by 8 (the compliance score value of that shared control).

Administrative functions
There are specific administrative functions that are only available to the tenant administrator account, and will only
be visible when logged in as a global administrator.
NOTE
The Access to Restricted Documents permission in the drop-down list will allow administrators to give users access to
restricted documents that Microsoft shares on the Service Trust Portal. The Restricted Documents feature isn't available, but
is coming soon.

Assigning Compliance Manager roles to users


Each Compliance Manager role has slightly different permissions. You can view the permissions assigned to each
role, see which users are in which roles, and add or remove users from that role through the Service Trust Portal by
selecting the Admin menu item, and then choosing Settings.

To add or remove users from Compliance Manager roles.


1. Go to https://servicetrust.microsoft.com.
2. Sign in with your Azure Active Directory global administrator account.
3. On the Service Trust Portal top menu bar, click Admin and then choose Settings.
4. In the Select Role drop-down list, click the role that you want to manage.
5. Users added to the each role are listed on the Select Role page.
6. To add users to this role, click Add. In the Add Users dialog, click the user field. You can scroll through the
list of available users or begin typing the user name to filter the list based on your search term. Click the
user to add that account to the Add Users list to be provisioned with that role. If you would like to add
multiple users concurrently, begin typing a user name to filter the list, and then click the user to add to the
list. Click Save to provision the selected role to these users.

7. To remove users from this role, select the user(s) and click Delete.
User Privacy settings
Certain regulations require that an organization must be able to delete user history data. To enable this,
Compliance Manager provides the User Privacy Settings functions, that allow administrators to:
Search for a user
Export a report of account data history
Reassign action items
Delete user data history

Search for a user


To search for a user account:
1. Enter the user email address by typing in the alias (the information to the left of the @ symbol) and
choosing the domain name by clicking on the domain suffix list on the right. If this is tenant with multiple
registered domains, you can double check the email address domain name suffix to ensure that it is correct.
2. When you have the username correctly entered, click Search.
3. If the user account is not found, the error message 'User not found' will be displayed on the page. Check the
user's email address information, make corrections as necessary and click Search to try again.
4. If user account is found, the text of the button will change from Search to Clear, which indicates that the
returned user account is the operating context for the additional functions that will be displayed below, that
running those functions will apply to this user account.
5. To clear search results and search for a different user, click Clear.
Export a report of account data history
Once the user account has been identified, you may wish to generate a report of dependencies that exist linked to
this account. This information will allow you to reassign open action items or ensure access to previously uploaded
evidence.
To generate and export a report:
1. Click Export to generate and download a report of the Compliance Manager control action items currently
assigned to the returned user account, as well as the list of documents uploaded by that user. If there are no
assigned actions or uploaded documents, an error message will state "No data for this user".
2. The report downloads in the background of the active browser window - if you don't see a download popup
you want to check your browser download history.
3. Open the document to review the report data.

NOTE
This is not a historical report that retains and displays state changes to action item assignment history. The generated report
is a snapshot of the control action items assigned at the time that the report is run (date and time stamp written into the
report). For instance, any subsequent reassignment of action items will result in different snapshot report data if this report is
generated again for the same user.

Reassign action items


This function enables an organization to remove any active or outstanding dependencies on the user account by
reassigning all action item ownership (which includes both active and completed action items) from the returned
user account to a new user selected below. This action does not change document upload history for the returned
user account.
To reassign action items to another user:
1. Click the input box to browse for and select another user within the organization to whom the returned
user's action items should be assigned.
2. Select Replace to reassign all control action items from the returned user to the newly selected user.
3. A confirmation dialog box appear stating "This will reassign all control action items from the current user to
the selected user. This action cannot be undone. Are you sure you want to continue?"
4. To continue click OK,, otherwise click Cancel.

NOTE
All action items (both active and completed) will be assigned to the newly selected user. However, this action does not affect
the document upload history; any documents uploaded by the previously assigned user will still show the date/time and
name of the previously assigned user.

Changing the document upload history to remove the previously assigned user will have to be done as a manual
process. In that case, the administrator will need to:
1. Open the previously downloaded Export report.
2. Identify and navigate to the desired control action item.
3. Click Manage Documents to navigate to the evidence repository for that control.
4. Download the document.
5. Delete the document in the evidence repository.
6. Re-upload the document. The document will now have a new upload date, time and Uploaded By username.
Delete user data history
This sets control action items to 'unassigned' for all action items assigned to the returned user. This also sets
uploaded by value to 'user removed' for any documents uploaded by the returned user
To delete the user account action item and document upload history:
1. Click Delete.
A confirmation dialog will be displayed, stating "This will remove all control action item assignments and
the document upload history for the selected user. This action cannot be undone. Are you sure you want to
continue?"
2. To continue click OK, otherwise click Cancel.

Using Compliance Manager


Compliance Manager provides you with tools to assign, track, and record compliance and assessment-related
activities, and to help your organization cross team barriers to achieve your organization's compliance goals.
Accessing Compliance Manager
You access Compliance Manager from the Service Trust Portal. Anyone with a Microsoft account or Azure Active
Directory organizational account can access Compliance Manager.

1. Go to https://servicetrust.microsoft.com.
2. Sign in with your Azure Active Directory (Azure AD ) user account.
3. In the Service Trust Portal, click Compliance Manager.
4. When the Non-Disclosure Agreement is displayed, read it, and then click Agree to continue. You'll only
have to do this once, and then the Compliance Manager dashboard is displayed.
To get you started, we've added the following Assessments by default:
5. Click Help to take a short tour of Compliance Manager.

Viewing action items


Compliance Manager provides a convenient view of all your assigned control assessment action items, enabling
you to quickly and easily take action on them. You can view all action items or select the action items that
correspond with a specific certification by clicking on the tab associated with that assessment. For instance, in the
image below, the GDPR tab has been selected, showing controls that related to the GDPR assessment.

To view your action items:


1. Go to the Compliance Manager dashboard
2. Click the Action Items link, and the page will refresh to show the action items that have been assigned to
you.
By default, all action items are shown. If you have action items across multiple certifications, the names of
the certifications will be listed in tabs across the top of the assessment control. To see the action items for a
specific certification, click that tab.

Adding an Assessment
To add an Assessment to Compliance Manager:
1. In the Compliance Manager dashboard, click Add Assessment.
2. In the Add an Assessment window, you can create a new group to add the Assessment to or you can add it
to an existing group (the built-in group is named "Initial Group".) Depending on the option you choose,
either type the name of a new group or select an existing group from the drop-down list. For more
information, see Grouping Assessments.
If you create a new group, you also have the option to copy information from an existing group to the new
Assessment. That means any information that was added to the Implementation Details and Test Plan and
Management Response fields of customer managed controls from Assessments in the group that you're
copying from are copied to the same (or related) customer managed controls in the new Assessment. If
you're adding a new Assessment to an existing group, common information from Assessments in that
group will be copied to the new Assessment. For more information, see Copying information from existing
Assessments.
3. Click Next, and do the following:
a. Choose a Microsoft cloud service to assess for compliance from the Select a product drop down list.
b. Choose a certification to assess the selected cloud service against from the Select a certification drop
down list.
4. Click Add to Dashboard to create the Assessment; the assessment will be added to the Compliance
Manager dashboard as a new tile at the end of the list of existing tiles.
The Assessment Tile on the Compliance Manager dashboard, displays the assessment grouping, the name
of the assessment (automatically created as a combination of the Service name and the certification
selected), the date it was created and when it was last modified, the Total Compliance Score (which is the
sum of all of the assigned control risk values that have been implemented, tested and passed), and progress
indicators along the bottom that show the number of controls that have been assessed.
5. Click the Assessment name to open it, and view the details of the Assessment.
6. Click on the Actions menu to view your assigned action items, rename the assessment group, export the
assessment report, or archive the assessment.
Copying information from existing Assessments
As previously explained, when you create a new assessment group, you have the option to copy information from
Assessments in an existing group to the new Assessment in the new group. This allows you to apply the
assessment and testing work that's been completed to the same customer managed controls in the new
Assessment. For example, if you have a group for all GDPR -related Assessments in your organization, you can
copy common information from existing assessment work when add a new Assessment to the group.
You can copy the following information from customer to a new Assessment:
Assessment Users. An Assessment user is a user who the control is assigned to.
Status, Test Date, and Test Results.
Implementation details and test plan information.
Similarly, information from shared customer managed controls within the same Assessment group is
synchronized. And information in related customer managed controls within the same Assessment is also
synchronized.

Viewing Assessments
1. Locate the Assessment Tile corresponding to the assessment you wish to view, then click the assessment
name to open it and view the Microsoft and customer managed controls associated with the Assessment,
along with a list of the cloud services that are in-scope for the Assessment. Here's an example of the
Assessment for Office 365 and GDPR.
2. This section shows the Assessment summary information, including the name of the Assessment Grouping,
Product, Assessment name, number of Assess controls
3. This section shows the Assessment Filter controls. For a more detailed explanation of how to use the
Assessment Filter controls see the Managing the assessment process section.
4. This section shows the individual cloud services that are in-scope for the assessment.
5. This section contains Microsoft managed controls. Related controls are organized by control family. Click a
control family to expand it and display individual controls.
6. This section contains customer managed controls, which are also organized by control family. Click a control
family to expand it and display individual controls.
7. Displays the total number of controls in the control family, and how many of those controls have been
assessed. A key capability of Compliance Manager is tracking your organization's progress on assessing the
customer managed controls. For more information, see the Understanding the Compliance Score section.

Managing the assessment process


The creator of an Assessment is initially the only Assessment User. For each customer managed control, you can
assign an Action Item to a person in your organization so that person becomes an Assessment User who can
perform the recommended Customer Actions, and gather and upload evidence. When you assign an Action Item,
you can choose to send an email to the person that contains details including the recommended Customer Actions
and the Action Item priority. The email notification includes a link to the Action Items dashboard, which lists all
Action Items assigned to that person.
Here's a list of tasks that you can perform using the workflow features of Compliance Manager.

1. Use the Filter Options to find specific assessment controls - Compliance Manager provides Filter
Options, giving you highly granular selection criteria for displaying assessment controls, helping you to
precisely target specific areas of your compliance efforts.
Click on the funnel icon on the right hand side of the page to show or hide the Filter Options controls.
These controls allow you to specify filter criteria, and only the assessment controls that fit those criteria will
be displayed below.
Articles - filters on the article name and returns the assessment controls associated to that article.
For instance, typing in "Article (5)" returns a selection list of articles whose name includes that string,
i.e. Article (5)(1)(a), Article (5)(1)(b), Article (5)(1)(c), etc. Selecting Article (5)(1)(c) will return the
controls associated with Article (5)(1)(c). This is multiselect field that uses an OR operator with
multiple values -- for instance, if you select Article (5)(1)(a) and then add Article (5)(1)(c), the filter will
return controls associated with either Article (5)(1)(a) or Article (5)(1)(c).

Controls - returns the list of controls whose names fit the filter, i.e. typing in 7.3 returns a selection
list of items like 7.3.1, 7.3.4, 7.3.5, etc. This is multiselect field that uses an OR operator with multiple
values -- for instance, if you select 7.3.1 and then add 7.3.4, the filter will return controls associated
with either 7.3.1 or 7.3.4.

Assigned Users - returns the list of controls who are assigned to the selected user.
Status - returns the list of controls with the selected status.
Test Result - returns the list of controls with the selected test result.
As you apply filter conditions, the view of applicable controls will change to correspond to your filter
conditions. Expand the control family sections to show the control details below.

2. If after selecting the desired filters no results are shown, that means there are no controls that correspond to
the specified filter conditions. For instance, if you select a particular Assigned User and then choose a
Control name that does correspond to the control assigned to that user, no assessments will be shown in
the page below.
3. Assign an Action Item to a user - You can assign an Action Item to a person to implement the
requirements of a certification/regulation, or to test, verify, and document your organization's
implementation requirements. When you assign an Action Item, you can choose to send an email to the
person that contains details including the recommended Customer Actions and the Action Item priority. You
can also unassign or reassign an Action Item to a different person.
4. Manage documents - Customer managed controls also have a place to manage documents that are
related to performing implementation tasks and for performing testing and validation tasks. Anyone with
permissions to edit data in Compliance Manager can upload documents by clicking Manage Documents.
After a documented has been uploaded, you can click Manage Documents to view and download files.
5. Provide implementation and testing details - Every customer managed control has an editable field
where users can add implementation details that document the steps taken by your organization to meet
the requirements of the certification/regulation, and to validate and document how your organization meets
those requirements.
6. Set Status - Set the Status for each item as part of the assessment process. Available status values are
Implemented, Alternative Implementation, Planned, and Not in Scope.
7. Enter test date and test result - The person with the Compliance Manager Assessor role can verify that
proper testing performed, review the implementation details, test plan, test results, and any uploaded
evidence, and then set the Test Date and Test Result. Available test result values are Passed, Failed-Low
Risk, Failed-Medium Ris k, and Failed-High Risk.

Managing action items


The people involved in the assessment process in your organization can use Compliance Manager to review the
customer managed controls from all Assessments for which they are users. When a user signs in to Compliance
Manager and opens the Action Items dashboard, a list of Action Items assigned to them is displayed. Depending
on the Compliance Manager role assigned to the user, they can provide implementation or test details, update the
Status, or assign Action Items.
As certification controls are generally implemented by one person and tested by another, the control action item
can be initially assigned to one person for implementation, and once that is complete, that person can reassign the
control action item to the next person for control testing and uploading of evidence. This assignment/reassignment
of control actions can be performed by any users who have a Compliance Manager role with sufficient
permissions, allowing for central management of control assignments, or decentralized routing of control action
items, from implementer to tester as appropriate.
To assign an action item:
1. On the Compliance Manager dashboard, locate the assessment tile of the assessment you wish to work with
and click on the name of the assessment to go to the assessment details page.
2. You can click Filter and use the filter controls to find the specific assessment control you wish to assign, or
3. Scroll down to the Customer Managed Controls section, expand the control family, and scroll through the
list of control until you have located the assessment control to be assigned
4. Under the Assigned User column, click Assign.
5. In the Assign Action Item dialog box, click the Assign To field to populate the list of users to whom the
action can be assigned. You can scroll through the list to find the target user or start typing in the field to
search for the username.
6. Click the user to assign them this action item.
7. If you wish to send an email notification to the user notifying them, ensure that the Send Email
Notification checkbox is checked.
8. Type any notes you wish to be displayed to that user and click Assign.
The user will receive notification of their action item assignment and any notes you have provided.
The notes that are associated with the action item are persisted in the notes section, available for the next time the
action item is assigned. These notes are not read-only, can be edited, replaced or removed by the person assigning
the action item.

Exporting information from an Assessment


You can export an Assessment to an Excel file, which can be reviewed by compliance stakeholders in your
organization, and provided to auditors and regulators. This assessment report is a snapshot of the assessment as
of the date and time that the report is created, and it contains the details of both the Microsoft-managed controls
and the customer managed controls for that assessment, including control implementation status, control test date
and test results, and provides links to the uploaded evidence documents. It is recommended that you export the
assessment report prior to archiving an assessment, as archived assessments do not retain their links to uploaded
documents.
To export an Assessment report:
On the Compliance Manager dashboard, click Actions on the tile of the assessment you wish to export, and
then choose Export to Excel
Or
If you are viewing the Assessment details page, click on the Export to Excel button, which is located in the
upper right hand corner of the page above the assessment's Compliance Score.
The assessment report will be downloaded in your browser session. If you don't see a popup informing you of this,
you may wish to check your browser's downloads folder.

Archiving an Assessment
When you have completed an Assessment and no longer need it for compliance purposes, you can archive it.
When an Assessment is archived, it is removed from Assessments dashboard.

NOTE
When an Assessment is Archived, it cannot be 'unarchived' or restored to a read-write in progress state. Please note that
Archived Assessments do not retain their links to uploaded evidence documents, so it is highly recommended that you
perform an Export of the Assessment before archiving it, as the exported assessment report will contain links to the evidence
documents, enabling you to continue to access them.

To archive an assessment:
1. On the dashboard tile of the desired assessment, click Actions.
2. Select Archive Assessment.
The Archive Assessments dialog is displayed, asking you to confirm that you want to archive the
assessment.
3. To continue with archiving, click Archive, or else click Cancel.
To view archived Assessments:
1. On the Compliance Manager dashboard, check the Show Archived checkbox.
The archived assessments will appear in a newly visible section below the rest of the active assessments
under a bar titled Archived Assessments.
2. Click the name of the assessment you wish to view.
When viewing an archived assessment, none of the normally editable controls (i.e. Implementation, Test Results)
will be active, and the Managed Documents button will be absent.

Change log for Customer Managed Controls


Compliance Manager is designed to be regularly updated to keep pace with changes in regulatory requirements,
as well as changes in our cloud services. These updates include changes to the Customer Managed Controls. A
Change Log is provided to help you understand the impact of these changes, including the details of the content
being added or changed, and guidance as to what effect the changes have on existing Assessments. Generally,
there are two types of changes:
A Major change is a significant change to a Customer Action, such as the addition or removal of a control
or specific numbered steps, or a change in the guidance around responsibilities, recommendations, or
evidence. For Major changes, we recommend that you re-evaluate your implementation and/or assessment
of the affected control.
A Minor change is an insignificant change to a Customer Actions, such as fixing a typo or formatting issues,
or updating or correcting hyperlinks. Minor changes generally do not require the control to be re-evaluated;
however, we do recommend that you review the updated Customer Action.
Office 365 Customer Managed Controls - Change Log for July 2018
RECOMMENDED
DESCRIPTION OF ACTIONS FOR
CONTROL ID ASSESSMENT TYPE OF CHANGE CHANGE CUSTOMERS

45 C.F.R. § 164.308(a) Office 365: HIPAA Major Added HITECH Review the added
(7)(ii)(A) control to HIPAA control and
Assessment for Office recommended
365 Customer Actions

45 C.F.R. 164.312(a) Office 365: HIPAA Major Added HITECH Review the added
(6)(ii) control to HIPAA control and
Assessment for Office recommended
365 Customer Actions

45 C.F.R. § 164.312(c) Office 365: HIPAA Major Added HITECH Review the added
(1) control to HIPAA control and
Assessment for Office recommended
365 Customer Actions

45 C.F.R. § 164.316(b) Office 365: HIPAA Major Added HITECH Review the added
(2)(iii) control to HIPAA control and
Assessment for Office recommended
365 Customer Actions

Office 365 Customer Managed Controls - Change Log for April 2018
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

6.13.2 C.16.1.1 Major Previously Re-assess


numbered the
as control:
6.12.1.1. Review
Added the
details to updated
recomme guidance
ndations. in the
Customer
Actions
and follow
the
recomme
nded
steps for
implemen
ting and
assessing
the
control.

3.1.6 Major Added Review


steps to the
guidance updated
that recomme
include ndations
enabling in the
auditing Customer
and Actions.
searching
audit logs.

6.8.2 A.10.2 Major Previously Re-assess


numbered the
as 6.7.2.9. control:
Updated Review
guidance the
with updated
additional guidance
recomme in the
ndations Customer
and Actions
action and follow
items. the
recomme
nded
steps for
implemen
ting and
assessing
the
control.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

6.6.4 45 C.F.R. § A.9.4.2 IA-2 3.5.1 Major Previously Re-assess


164.312(a numbered the
)(2)(i) as 6.5.2.3. control:
45 C.F.R. § Updated Review
164.312(d guidance the
) with updated
additional guidance
recomme in the
ndations Customer
and Actions
action and follow
items. the
recomme
nded
steps for
implemen
ting and
assessing
the
control.

6.13.1 45 C.F.R. § A.16.1 C.16.1 IR-4(a) 3.6.1 Major Previously Re-assess


164.308(a numbered the
)(1)(i) as 6.12.1. control:
Updated Review
guidance the
with updated
additional guidance
recomme in the
ndations Customer
and Actions
action and follow
items. the
recomme
nded
steps for
implemen
ting and
assessing
the
control.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

6.7 Major Previously Re-assess


numbered the
as 6.6.1.1. control:
Updated Review
guidance the
with updated
additional guidance
recomme in the
ndations Customer
and Actions
action and follow
items. the
recomme
nded
steps for
implemen
ting and
assessing
the
control.

6.6.5 A.10.8 IA-3 3.5.2 Major Previously Re-assess


numbered the
as 6.5.4.2. control:
Updated Review
guidance the
with updated
additional guidance
recomme in the
ndations Customer
and Actions
action and follow
items. the
recomme
nded
steps for
implemen
ting and
assessing
the
control.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

6.15.1 Major Previously Re-assess


numbered the
as control:
6.14.1.3. Review
Updated the
guidance updated
with guidance
additional in the
recomme Customer
ndations Actions
and and follow
action the
items. recomme
nded
steps for
implemen
ting and
assessing
the
control.

AC-2(h) Minor Added No action


(2) link to necessary.
Enable
Auditing
blade.

AC-2(7) Minor Added No action


(b) link to necessary.
Enable
Auditing
blade.

AC-2(h) Minor Added No action


(1) link to necessary.
Enable
Auditing
blade.

45 C.F.R. § AC-2(g) Minor Added No action


164.308(a link to necessary.
)(5)(ii)(C) Enable
Auditing
blade.

AC-2(12) Minor Added No action


link to necessary.
Enable
Auditing
blade.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

45 C.F.R. § A.12.4.3 AU-2(d) Minor Added No action


164.312(b link to necessary.
) Enable
Auditing
blade.

AC-2(4) Minor Added No action


link to necessary.
Enable
Auditing
blade.

3.1.7 Minor Added No action


link to necessary.
Enable
Auditing
blade.

A.16.1.7 C.12.4.2, Minor Added No action


Part 2 link to necessary.
Enable
Auditing
blade.

AC-2(h) Minor Added No action


(3) link to necessary.
Enable
Auditing
blade.

A.12.4.2 Minor Added No action


link to necessary.
Enable
Auditing
blade.

A.7.2.8 Minor Added No action


links to necessary.
Content
Search
blade and
to DSR
portal.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

45 C.F.R. § Minor Added No action


164.308(a links to necessary.
)(3)(ii)(C) Enable
Auditing
blade and
to Office
365
admin
role
support
topics.

5.2.1 Minor Previously Review


numbered the
as 5.2.2. updated
Clarified recomme
customer ndations
responsibi in the
lities Customer
within Actions.
guidance.

6.11.1 45 C.F.R. § A.10.1.1 C.10.1.1 SC-13 3.13.11 Minor Previously No action


164.312(e A.10.1.2 numbered necessary.
)(2)(ii) A.18.1.5 as
6.10.1.2.
Fixed
typo.

7.5.1 Minor Previously No action


numbered necessary.
as A.7.4.1.
Fixed
typo.

A.8.2.3 3.1.3 Minor Removed No action


extra necessary.
unnecessa
ry
sentence.

45 C.F.R. § A.6.1.2 AC-5(a) 3.1.2 Minor Updated Review


164.308(a 3.1.4 guidance the
)(4)(i) with updated
additional recomme
recomme ndations
ndations in the
and Customer
action Actions.
items.
RECOMME
NDED
ACTIONS
DESCRIPTI FOR
NIST 800- NIST 800- TYPE OF ON OF CUSTOMER
GDPR HIPAA ISO 27001 ISO 27018 53 171 CHANGE CHANGE S

45 C.F.R. § RA-2(a) Minor Updated No action


164.308(a import necessary.
)(7)(ii)(E) service
help topic
link to use
FWLink.

GDPR Assessment Control ID Change Reference - Change Log for February 2018
PREVIOUS CONTROL ID (NOVEMBER 2017 PREVIEW) NEW CONTROL ID (FEBRUARY 2018 GA RELEASE)

5.2.2 5.2.1

5.2.3 5.2.2

5.2.4 5.2.3

6.1.1.1 6.2

6.10.1.2 6.11.1

6.10.2.5 6.11.2

6.11.1.2 6.12

6.12.1 6.13.1

6.12.1.1 6.13.2

6.12.1.5 6.13.3

6.14.1.3 6.15.1

6.14.2.1 6.15.2

6.14.2.3 6.15.3

6.2.1.1 6.3

6.3.2.2 6.4

6.4.3.1 6.5.2

6.4.3.2 6.8.1

6.4.3.3 6.5.3
PREVIOUS CONTROL ID (NOVEMBER 2017 PREVIEW) NEW CONTROL ID (FEBRUARY 2018 GA RELEASE)

6.5.2 6.6.1

6.5.2.1 6.6.2

6.5.2.2 6.6.3

6.5.2.3 6.6.4

6.5.4.2 6.6.5

6.6.1.1 6.7

6.7.2.7 6.8.1

6.7.2.9 6.8.2

6.8.1.4 6.9.1

6.8.4.1 6.9.3

6.8.4.2 6.9.4

6.9.2.1 6.10.1

6.9.2.3 6.10.2

A.7.1.1 7.2.1

A.7.1.2 7.2.2

A.7.1.3 7.2.3

A.7.1.4 7.2.4

A.7.1.5 7.2.5

A.7.1.6 7.2.6

A.7.1.7 7.2.7

A.7.2.1 7.3.1

A.7.2.10 7.3.9

A.7.2.11 7.3.10

A.7.2.2 7.3.2

A.7.2.3 7.3.3
PREVIOUS CONTROL ID (NOVEMBER 2017 PREVIEW) NEW CONTROL ID (FEBRUARY 2018 GA RELEASE)

A.7.2.4 7.3.4

A.7.2.5 7.3.5

A.7.2.6 7.3.6

A.7.2.7 7.3.7

A.7.2.8 7.3.8

A.7.3.1 7.4.1

A.7.3.10 7.4.10

A.7.3.2 7.4.2

A.7.3.3 7.4.3

A.7.3.4 7.4.4

A.7.3.5 7.4.5

A.7.3.6 7.4.6

A.7.3.7 7.4.7

A.7.3.8 7.4.8

A.7.3.9 7.4.9

A.7.4.1 7.5.1

A.7.4.2 7.5.2

A.7.4.3 7.5.3

A.7.4.4 7.5.4

A.7.4.5 7.5.5

B.8.1.1 8.2.1

B.8.1.2 8.2.2

B.8.1.3 8.2.3

B.8.1.4 8.2.4

B.8.1.5 8.2.5
PREVIOUS CONTROL ID (NOVEMBER 2017 PREVIEW) NEW CONTROL ID (FEBRUARY 2018 GA RELEASE)

B.8.1.6 8.2.6

B.8.2.1 8.3.1

B.8.3.1 8.4.1

B.8.3.2 8.4.2

B.8.3.3 8.4.3

B.8.4.1 8.5.1

B.8.4.2 8.5.2

B.8.4.3 8.5.4

B.8.4.4 8.5.5

B.8.4.5 8.5.3

B.8.4.6 8.5.6

B.8.4.7 8.5.7

B.8.4.8 8.5.8

See also
Compliance Manager Interactive guide
Announcing Compliance Manager general availability
Microsoft 365 provides an information protection strategy to help with the GDPR
Manage GDPR data subject requests with the DSR
case tool in the Office 365 Security & Compliance
Center
8/21/2018 • 26 minutes to read • Edit Online

The EU General Data Protection Regulation (GDPR ) is about protecting and enabling individuals' privacy rights
inside the European Union (EU ). The GDPR gives individuals in the European Union (known as data subjects) the
right to access, retrieve, correct, erase, and restrict processing of their personal data. Under the GDPR, personal
data means any information relating to an identified or identifiable natural person. A formal request by a person to
their organization to take an action on their personal data is called a Data Subject Request or DSR. For detailed
information about responding to DSRs for data in Office 365, see Office 365 Data Subject Request Guide.
To manage investigations in response to a DSR submitted by a person in your organization, you can use the DSR
case tool in the Office 365 Security & Compliance Center to find content stored in:
Any user mailbox in your organization. This includes Skype for Business conversations and one-to-one chats
in Microsoft Teams
All mailboxes associated with an Office 365 Group and all team mailboxes in Microsoft Teams
All SharePoint Online sites and OneDrive for Business accounts in your organization
All Teams sites and Office 365 Group sites in your organization
All public folders in Exchange Online
Using the DSR case tool you can:
Create a separate case for each DSR investigation.
Control who has access to the DSR case by adding people as members of the case; only members can
access the case and can only see their cases in the list of cases on the DSR cases page in the Security &
Compliance Center. Additionally, you can assign different permissions to different members of the same
case. For example, you can allow some members to only view the case and search results and allow other
members to create searches and export search results.
Use the built-in search to search for all content created or uploaded by a specific data subject.
Optionally revise the built-in search query and re-run the search to narrow the search results.
Add additional content searches associated with the DSR case. This includes creating searches that return
partially indexed items and system-generated logs from My Analytics and the Office Roaming Service.
Export data in response to a DSR access or export request.
Delete cases when the DSR investigation process is complete; this will remove all searches and export jobs
associated with the case.
Here's the high-level process for using the DSR case tool to manage DSR investigations:
Step 1: Assign eDiscovery permissions to potential case members
Step 2: Create a DSR case and add members
Step 3: Run the search query
Step 4: Export the data
(Optional) Step 5: Revise the built-in search query
More information about using the DSR case tool

IMPORTANT
Our tools can help admins perform DSR access or export requests by enabling them to utilize the built-in search and export
functionality found in the DSR case tool. The tool helps to facilitate a best-effort method to export data that's relevant to a
DSR request submitted by a data subject. However, it's important to note that search results can vary based on the data
subject or the admin actions taken that may impact whether or not an item would be deemed as "personal data" for export
purposes. For example, if the data subject was the last person to modify a file they didn't create, the file might not be
returned in the search results. Similarly, an admin could export data without including partially indexed items or all versions of
SharePoint documents. Therefore, the tools provided can help facilitate accessing and exporting data requests; however, the
results are subject to specific admin and data subject usage scenarios.

Step 1: Assign eDiscovery permissions to potential case members


By default, an Office 365 global administrator can access the DSR case tool in the Security & Compliance Center.
By design, other users such as a data privacy officer, a human resources manager, or other people involved in DSR
investigations don't have access to the DSR case tool and will have to be assigned the appropriate permissions to
access the tool. The easiest way to do this is to go to the Permissions page in the Security & Compliance Center
and add users to the eDiscovery Manager role group. Note that you also have to assign these permissions so you
can add them as members of the DSR case that you create in Step 2.
For step-by-step instructions, see Assign eDiscovery permissions in the Office 365 Security & Compliance Center.

NOTE
By default, an Office 365 global administrator (or other members of the Organization Management role group in the Security
& Compliance Center don't have the necessary permissions to export Content Search results (see Step 4 in this article). To
address this, an admin can add themselves as a member of the eDiscovery Manager role group.

Step 2: Create a DSR case and add members


The next step is to create a DSR case. When you create a case, you can choose to start the built-in search or you
can create the case without starting the search. The following procedure will instruct you to create the case without
starting the search and then show you how to add members to the case.
1. Go to https://protection.office.com and sign in to Office 365 using your work or school account.
2. In the Security & Compliance Center, click Data privacy > Data subject requests, and then click New
DSR case.
3. On the New DSR case flyout page, give the case a name, type an optional description, and then click Next.
Note that the name of the case must be unique in your organization.

TIP
Consider adding the name of the person who submitted the DSR request that you're investigating in the name
and/or description of the new case. Note that only members of this case (and eDiscovery Administrators) will be able
to see the case in the list of cases on the Data subject requests page.
4. On the Request details page, under Data subject (the person who filed this request), select the person
that you want to find and export data for and then click Next.
5. On the Confirm your case settings page, you can change the case name and description, and select a
different data subject. Otherwise, just click Save.
A page is displayed that confirms the new DSR case has been created.

At this point, you can do one of two things:


a. Clicking Show me search results starts the search. This is the default selection. The built-in search that is
run when you select this option and the results that are returned are discussed in Step 3.
b. Clicking Finish closes the new DSR case without starting the built-in search. When you select this option,
the new DSR case is displayed on the Data subject requests page.
6. Click Finish so that you can go in to the new DSR case and add members to it.
7. On the Data subject requests page, click the name of the DSR case that you just created.
8. On the Manage this case flyout page, under Manage members, click Add.
Under Users, a list of people that have been assigned the appropriate eDiscovery permissions is displayed.
Note that the people you assigned eDiscovery permissions to in Step 1 will be displayed in this list.
9. Select the people to add as members of the DSR case, click Add, and then save your changes.
Note that you can also add role groups as members of DSR case by clicking Add under Manage role
groups.

Step 3: Run the search query


After you create a DSR case and add members, the next step is to run the built-in search that's associated with the
case. This default search query does the following:
Searches all mailboxes in your organization for all email items that were sent or received by the data subject.
This is accomplished by using the Participants email property, which searches for the data subject in all the
people fields in an email message. This property returns items in which the data subject is in the From, To,
CC, and BCC fields. Public folders in Exchange Online are also searched for messages sent or received by
the data subject.
Searches all sites in your organization for documents and items that were created or uploaded by the data
subject. This is accomplished by using the following site properties:
The Author property returns items where the data subject is listed in the author field in Office
documents. This value persists, even if the document is copied and uploaded by someone else.
The CreatedBy property returns items that were created or uploaded by the data subject.
Here's what the keyword query looks like for the built-in search that gets automatically created when you create a
DSR case.

participants:"<email address>" OR author:"<display name>" OR createdby:"<display name>"

For example, if the name of the data subject is Ina Leonte, the keyword query would look like this:

participants:"ina@contoso.com" OR author:"Ina Leonte" OR createdby:"Ina Leonte"

To run the built-in search for a DSR case:


1. In the Security & Compliance Center, click Data privacy > Data subject requests, and then click Open
next to the DSR case that you created in Step 2.
Click the Search tab at the top of the page, and then click the checkbox next to the built-in search that was
created when you created the new DSR case. Note the search has the same name as the DSR case.
2. In the search flyout page, click Open query.
When you open the query, the search is started and will complete in a few moments.
3. When the search is complete, click Preview results to preview the search results. For more information, see
Preview search results.

TIP
You can also view the search query statistics to see the number of mailbox and site items that are returned by the
search, and the top content locations that contain items that match the search query. For more information see, View
information and statistics about a search.

You can edit the built-in search query, change the content locations that are searched, and then re-run the search.
See Step 5 for more information.

Step 4: Export the data


After you run the built-in search, you can export the search results. Alternatively, before you export the data, you
may want to revise the query to reduce the number of search results. See Step 5 for more information about
narrowing the search results.
When you export search results, mailbox items can be downloaded in PST files or as individual messages. When
you export content from SharePoint and OneDrive accounts, copies of native Office documents and other
documents are exported. A results file that contains information about every item that is exported is also included
with the search results. For more detailed information about exporting, see Export Content Search results from the
Office 365 Security & Compliance Center.

NOTE
By default, an Office 365 global administrator (or other members of the Organization Management role group in the Security
& Compliance Center) don't have the necessary permissions to export Content Search results. To address this, an admin can
add themselves as a member of the eDiscovery Manager role group.
The computer you use to export data has to meet the following system requirements:
32- or 64-bit versions of Windows 7 and later versions
Microsoft .NET Framework 4.7
A supported browser:
Microsoft Edge
Or
Microsoft Internet Explorer 10 and later versions

NOTE
Microsoft doesn't manufacture third-party extensions or add-ons for ClickOnce applications. Exporting data
using an unsupported browser with third-party extensions or add-ons isn't supported.

To export data from the built-in search in a DSR case:


1. In the Security & Compliance Center, click Data privacy > Data subject requests, and then click Open
next to the DSR case that you want to export data from.
2. Click the Search tab at the top of the page, and then click the checkbox next to the built-in search that was
created when you created the DSR case. Or click another search to export data from that search.
3. On the search flyout page, click More, and then select Export results from the drop-down list.
4. On the Export results page, select the following recommended options for DSR export requests.
a. Under Output options, select the first option ( All items, excluding ones that have ones that have
an unrecognized format, are encrypted, or weren't indexed for other reasons) to export indexed
items only. The reason you don't want to export partially indexed items from the built-in search is because
partially indexed items from other users will be exported. To export only the partially indexed items for the
data subject, we recommend that you create a separate search. For more information, see Exporting partially
indexed items in the "More information about using the DSR case tool" section.
b. Under Export Exchange content as, select the third option, One PST file containing all messages in
a single folder. Because some of the results may be for items that originated in another user's mailbox, this
option just lists the item in a single folder without indicating the actual mailbox and is the best option to use
when you de-duplicate the results as recommended in the next item. This option also lets the data subject
review items in chronological order (items are sorted by sent date) without having to navigate the original
mailbox folder structure for each item.
c. Select Enable de-duplication option to excludes duplicate email messages. We recommend this option
because the built-in search searches all mailboxes in your organization. So if multiple copies of the same
message are found in the mailboxes that were searched, this option means only one copy of a message will
be exported. This option, together will exporting messages in one PST file in a single folder results in the
best user experience for DSR export requests. Note that the Results.csv export report will list all locations
where duplicate messages were found.
Optionally, you can select Include versions for SharePoint documents option to export all versions of
SharePoint and OneDrive documents. This requires that versioning is turned on for document libraries. This
option helps to ensure that all relevant data is exported.
5. After you choose the export settings, click Export.
The search results are prepared for downloading, which means they're uploaded to the Azure storage area
for your organization in the Microsoft cloud. The next steps show you how to download this data to your
local computer.
6. Click the Export tab to display the export job you just created. Note that export jobs have the same name as
the corresponding search with _Export appended to the end of search name.
7. Click the export job that you just created to display the export flyout page. This page shows information
about the search, such as the size and total number of items to be exported, and the percentage of the items
that have been transferred to an Azure storage area. Click Refresh to update the upload status information.
8. Under Export key, click Copy to clipboard. You will use this key in step 11 to download the search results.
9. Click Download results at the top of the export flyout page.
10. In the pop-up window at the bottom of the page, click Open to open the Microsoft Office 365 eDiscovery
Export Tool. The eDiscovery Export Tool will be installed the first time you download search results.
11. In the eDiscovery Export Tool, paste the export key that you copied in step 8 in the appropriate box.
12. Click Browse to specify the location where you want to download the search result files.

NOTE
Due to the high amount of disk activity (reads and writes), you should download search results to a local disk drive;
don't download them to a mapped network drive or other network location.

13. Click Start to download the search results to your computer.


The eDiscovery Export Tool displays status information about the export process, including an estimate of
the number (and size) of the remaining items to be downloaded. When the export process is complete, you
can access the files in the location where they were downloaded. For more information about the reports
that included when you download Content Search results, see the More information section in "Export
Content Search results from the Office 365 Security & Compliance Center".
After the data is exported, the search results and export reports are located in a folder that has the same name as
the DSR case. The PST files that contain mailbox items are located in a subfolder named Exchange. Documents
and other items from sites are located in a subfolder named SharePoint.

(Optional) Step 5: Revise the built-in search query


After you run the built-in search, you can revise it to narrow the scope to return fewer search results. You can do
this by adding conditions to the query. A condition is logically connected to the keyword query by the AND
operator. That means to be returned in the search results, items must satisfy both the keyword query and any
conditions you add. This is how conditions help to narrow the results. If you add two or more unique conditions to
a search query (conditions that specify different properties), those conditions are logically connected by the AND
operator. That means only items that satisfy all the conditions (in addition to the keyword query) are returned. If
you add multiple values (separated by commas or semi-colons) to a single condition, those values are connected by
the OR operator. That means items are returned if they contain any of the specified values for the property in the
condition.
Here are some examples of the conditions that you can add to the built-in search query of a DSR case. The name of
the actual property used in a search query is shown parentheses.
File type ( filetype ) - Specifies the extension of a document or file. Use this condition to search for
documents and files created by specific Office applications, such as Word, Excel, and OneNote.
Message type ( kind ) - Specifies the type of email item to search for. For example, you can use the syntax
kind:email OR kind:im to return only email messages and Skype for Business conversations or one-to-one
chats in Microsoft Teams.
Compliance tag ( compliancetag ) - Specifies a label assigned to an email message or a document. This
condition will return items that are classified with a specific label. Labels are used to classify email and
documents for data governance and enforce retention rules based on the classification defined by the label.
This is a useful condition for DSR investigations because your organization may be using labels to classify
content related to data privacy or that contains personal data or sensitive information. For the value of this
condition, use the complete label name or the first part of the label name with a wildcard. For more
information, see Overview of labels in Office 365.
For a list and description of all the conditions available in the DSR case tool, see Search conditions in the "Keyword
queries and search conditions for Content Search" article.
Changing the content locations that are searched
In addition to revising the built-in search for a DSR case, you can also change the content locations that are
searched. As previously explained, the built-in search searches every mailbox and site in the organization, and any
Exchange Online public folders. For example, you could narrow the search to only search the data subject's mailbox
and OneDrive account and selected SharePoint sites. If you choose to search specific sites, you'll have to add each
site that you want to search.
To modify the content locations to search:
1. Open the built-in search that you want to change the content locations for.
2. In the search query, under Locations, click Modify next to the Specific locations option.

The Modify locations flyout page is displayed. Here's a description of the content locations in the built-in
search and some information about modifying the locations that are searched.
a. The toggle under Select all in mailbox section at the top of the flyout page is selected, which indicates
that all mailboxes are searched. To narrow the scope of the search, click the toggle to unselect it, and then
click Choose users, groups, or teams and choose specific mailboxes to search.
b. The toggle under Select all in the sites section in the middle of the flyout page is selected, which indicates
that all sites are searched. To narrow the search to selected sites, you would unselect the toggle and then
click Choose sites. You'll have to add each specific site that you want to search, including the data subject's
OneDrive account.
c. The toggle in the Exchange public folders section is selected, which means all Exchange public folders are
searched. Note that you can only search all Exchange public folders or none of them. You can't choose
specific ones to search.
3. If you modify the content locations in the built-in search, click Save & run to re-start the search.

More information about using the DSR case tool


The following sections contain more information about using the DSR case tool to respond to DSR export
requests.
Exporting data from MyAnalytics and the Office Roaming Service
Exporting partially indexed items
Searching and exporting data from Microsoft Teams and Office 365 Groups
Searching Exchange public folders
Exporting data from MyAnalytics and the Office Roaming Service
You can use the DSR case tool to search for and export usage data that's generated by MyAnalytics and the Office
Roaming Service. Here's a description of what these services do:
MyAnalytics - Provides users with insights about how they spend their time based on the mail and
calendar data in their mailbox. All MyAnalytics insights are derived from email and meeting headers in the
user's mailbox. Users that are assigned a MyAnalytics license can sign in to Office 365 and go to the
MyAnalytics dashboard to view the insights about how they spend their time. (Users can screen shots of
these insights in response to a DSR access request). The built-in search in a DSR case will export the data
that's used to generate MyAnalytics insights.
Office Roaming Service - Roaming is a service that stores Office-related settings, such as Office theme,
custom dictionary, language settings, developer mode, and auto correct.
The data from MyAnalytics and the Office Roaming service is stored in a data subject's mailbox in hidden folders
located in a non-interpersonal message (non-IPM ) subtree of Exchange Online mailboxes. This means the data is
hidden from the user's view when they use Outlook or other mail clients to access their mailbox. For more
information about hidden folders, see MAPI Hidden Folders.
You can create a separate content search (and associate it with a DSR case) that returns the MyAnalytics and the
Office Roaming Service usage data in the data's subjects mailbox. This data isn't included in the search statistics
and it won't be available for preview. But you can export it and then give it to the data subject in response to a DSR
export request.
When you export data from MyAnalytics and the Office Roaming Service, the data is saved to a separate folder for
each application that's located in the ApplicationDataRoot folder, which is under a folder that is name with the
data subject's email address. This data is exported as JSON files, which are human-readable text files similar to
XML or TXT files, that are attached to email messages. Currently, these folders are named with a globally unique
identifier (GUID ) that's assigned to MyAnalytics and the Office Roaming Service, which are listed in the following
table. In future versions of the DSR case tool, the GUID will be replaced with the name of the actual application.

APPLICATION GUID/FOLDER NAME

MyAnalytics 3c896ded-22c5-450f-91f6-3d1ef0848f6e

Office Roaming Service 1caee58f-eb14-4a6b-9339-1fe2ddf6692b

To search for and export MyAnalytics and Office Roaming Service data:
1. In the Security & Compliance Center, click Data privacy > Data subject requests, and then click Open
next to the DSR case for the data subject that you want to export usage data for.
2. Click the Search tab at the top of the page, and then click Guided search.
3. Click Cancel on the Name your search page.
4. Under Search query, in the Type condition, select the check boxes next to MyAnalytics and Office
Roaming Service.
Note that the Type condition (which are email message classes) should be the only item in the search query.
You can delete the Keywords box or leave it blank.
5. Under Locations, make sure Specific locations is selected and then click Modify.
6. On top part of the Modify locations flyout page (the mailbox section), click Choose users, groups, or
teams.
7. On the Edit locations page, click Choose users, groups, or teams, choose the data subject's mailbox, and
then save your selection.
8. Click Save & run, and then name the search and save it.
The search is started.
To export MyAnalytics and Office Roaming Service data:
1. When the search that you created in the previous step is complete, click the Search tab at the top of the
page, and then click the checkbox next to the search. You may have to click Refresh to display the search.
2. On the search flyout page, click More, and then select Export results from the drop-down list.
3. On the Export results page, select the these recommended options to export usage data.
a. Under Output options, select the first option ( All items, excluding ones that have ones that have
an unrecognized format, are encrypted, or weren't indexed for other reasons) to export indexed
items only.
b. Under Export Exchange content as, select the second option, One PST file containing all messages.
c. Leave the remaining export options unselected.
4. After you choose the export settings, click Export.
The search results are prepared for downloading, which means they're uploaded to the Azure storage area
for your organization in the Microsoft cloud. The next steps show you how to download this data to your
local computer.
5. Click the Export tab to display the export job you just created. Note that export jobs have the same name as
the corresponding search with _Export appended to the end of search name.
6. Click the export job that you just created to display the export flyout page.
7. Under Export key, click Copy to clipboard. You will use this key in step 10 to download the search results.
8. Click Download results at the top of the export flyout page.
9. In the pop-up window at the bottom of the page, click Open to open the Microsoft Office 365 eDiscovery
Export Tool. The eDiscovery Export Tool will be installed the first time you download search results.
10. In the eDiscovery Export Tool, paste the export key that you copied in step 7 in the appropriate box.
11. Click Browse to specify the location where you want to download the search result files.
NOTE
Due to the high amount of disk activity (reads and writes), you should download search results to a local disk drive;
don't download them to a mapped network drive or other network location.

12. Click Start to download the search results to your computer.


The eDiscovery Export Tool displays status information about the export process, including an estimate of
the number (and size) of the remaining items to be downloaded. When the export process is complete, you
can open the Exchange PST file in Outlook and then go to the ApplicationDataRoot folder to access the
subfolders to MyAnalytics and Roaming service.
As previously explained, the JSON files that contains usage data are attached to messages. To view a JSON
file, click a message and then open the attached JSON file.
Exporting partially indexed items
We recommend that you don't export partially indexed items (also called unindexed items) from the built-in search
that's created when you create a new DSR case. That's because the search results will more than likely include
partially indexed items for other users in your organization, and not just partially indexed items for the data
subject). Instead, we recommend that you create a separate Content Search that's associated with the DSR case
that's designed to export only the partially indexed items related to the data subject.
Here's a high-level process to export partially indexed items. After they're export, you can review them to
determine if an items is responsive to a DSR access or export request.
1. Open the DSR case and create a new search on the Search page.
2. Use the following criteria for configuring the search query and the content locations to search:
Use an empty/blank keyword query. This will return all items in the content locations that are
searched.
Search only the data subject's Exchange Online mailbox and their OneDrive account.
3. After you run the search and it completes, you can export and download the search results (as described in
Step 4). Use the following settings to export partially indexed items.
Under Output options, select the third option ( Only items that have an unrecognized format,
are encrypted, or weren't indexed for other reasons) to export partially indexed items only.
Under Export Exchange content as, you can select any option based on your preferences.
Selecting the Include versions for SharePoint documents option will export versions of
documents if a version is partially indexed.
For more information about partially indexed items, see:
Partially indexed items in Content Search in Office 365
Exporting partially indexed items
Searching and exporting data from Microsoft Teams and Office 365 Groups
Conversations that are part of the Chat list in Microsoft Teams (called Team chats or one-to-one chats) are stored
in the Exchange Online mailbox of the users who participate in the chats. Also, the files a person shares in a one-to-
one chat are stored in the OneDrive account of the person who shares the file. Because the built-in search searches
all mailboxes and OneDrive accounts in the organization, team chats and documents shared in a chat session (that
the data subject created or uploaded) will be returned by built-in search in a DSR case.
Alternatively, conversations that are part of a Teams channel (also called channel messages) are stored in the
mailbox that's associated with a team. These types of conversations that the data subject participated in are also
returned by the built-in search because all mailboxes associated with Microsoft Teams are searched. Additionally,
tiles that a data subject might have shared in a Teams channel are stored on the team's SharePoint site. Files
created or uploadedby the data subject will be returned by the built-in search in a DSR case because sites
associated with Microsoft Teams are included in the search.
Similarly, mailboxes and SharePoint sites that correspond to an Office 365 Group are also included in the built-in
search. This means that email messages that where sent or received by the data subject and files created or
uploaded by the data subject will be returned.
For more information about using Content Search to search for items in Microsoft Teams and Office 365 Groups
or to see how to get a list of a members, see the "Searching Microsoft Teams and Office 365 Groups" section in
Content Search in Office 365.
Searching Exchange public folders
The built-in search in a DSR case will only return email messages that the data subject sent to a mail-enabled
public folder or messages that someone else sent to a public folder and also copied the data subject . It will not
return message that the data subject might have posted to a public folder. To search for items that the data subject
posted to a public folder, you can create a separate create a separate Content Search that searches for any item
posted to a public folder by the data subject.
Here's a high-level process to search for items that the data subject might have posted to a public folder.
1. Open the DSR case and create a new search on the Search page.
2. Use the following criteria for configuring the search query and the content locations to search:
In the Keywords box, use the following search query:

itemclass:ipm.post AND "<email address of the data subject>"

Search all Exchange public folders


After you run the search and it completes, you can export and download the search results (as described in
Step 4). Use the following settings to export partially indexed items.
Office 365 Information Protection for GDPR
8/28/2018 • 2 minutes to read • Edit Online

Summary: This solution demonstrates how to protect sensitive data that is stored in Office 365 services.
This solution includes prescriptive recommendations for discovering, classifying, protecting, and monitoring
personal data. This solution uses General Data Protection Regulation (GDPR ) as an example, but you can apply the
same process to achieve compliance with many other regulations.

PDF | Visio
For information about performing data subject requests for the GDPR, see Office 365 Data Subject Requests for
the GDPR.

See Also
Microsoft Security Guidance for Political Campaigns, Nonprofits, and Other Agile Organizations
Overview of Office 365 Information Protection for
GDPR
8/28/2018 • 3 minutes to read • Edit Online

This solution demonstrates how to protect sensitive data that is stored in Office 365 services. It includes
prescriptive recommendations for discovering, classifying, protecting, and monitoring personal data. This solution
uses General Data Protection Regulation (GDPR ) as an example, but you can apply the same process to achieve
compliance with many other regulations.
GDPR regulates the collection, storage, processing, and sharing of personal data. Personal data is defined very
broadly under the GDPR as any data that relates to an identified or identifiable natural person that is a resident of
the European Union (EU ).
Article 4 – Definitions

‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an
identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an
identifier such as a name, an identification number, location data, an online identifier or to one or more factors
specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural
person;

This solution is intended to help organizations discover and protect personal data in Office 365 that might be
subject to the GDPR. It is not offered as a GDPR compliance attestation. Organizations are responsible for
ensuring their own GDPR compliance and are advised to consult their legal and compliance teams or to seek
guidance and advice from third parties that specialize in compliance.
GDPR Assessment is a quick, online self-evaluation tool available at no cost to help your organization review its
overall level of readiness to comply with the GDPR (http://aka.ms/gdprassessment).

Assess and manage your compliance risk


The first step towards GDPR compliance is to assess whether the GDPR applies to your organization, and, if so, to
what extent. This analysis includes understanding the data your organization processes and where it resides.
Step 1 — Use Compliance Manager to view the regulation requirements and track your progress
Compliance Manager provides tools to track, implement, and manage the auditing controls to help your
organization reach compliance against various standards, including GDPR.

For more information, see Use Compliance Manager in the Service Trust Portal.
Step 2 — Use Content Search and sensitive information types to find personal data
Discover personal data in your environment that is subject to the GDPR. Use Content Search together with
sensitive information types to:
Find and report on where personal data resides.
Optimize sensitive data types and other queries to find all personal data in your environment.

Sensitive information types define how the automated process recognizes specific information types such as health
service numbers and credit card numbers. This article includes a set you can use as a starting point. Many more
sensitive information types are coming soon for personal data in EU countries.
For more information, see Search for and find personal data.

Classify, protect, and monitor personal data in Office 365 and other
SaaS apps
Some of the capabilities used for information protection in Office 365 can also be used to protect sensitive data in
other SaaS applications.

This illustration is described by the rest this section (steps 3-5).


Step 3 — Decide if you want to use labels in addition to sensitive information types
Sensitive information types are a form of classification. See Architect a classification schema for personal data, to
decide if you also want to implement labels. To apply labels, see Apply labels to personal data in Office 365.
In the illustration, sensitive information types and labels work across Office 365. Coming soon, you can use these
with Cloud App Security to find sensitive data in other SaaS apps, such as Box and Salesforce.
Step 4 — Protect personal data in Office 365
Protection for personal data starts with Office 365 data loss prevention. There are several other capabilities
recommended for protecting access to personal data, including Office 365 Message Encryption for email.
These protections can be targeted to specific data sets:
Site and library-level permissions
Site-level external sharing policies
Site-level device access policies
Protection for access to Office 365 and other cloud services include:
Identity and device access protection in Enterprise Mobility + Security (EMS )
Privileged access management
Windows 10 security capabilities
For more information about applying proteciton, see Apply protection to personal data in Office 365.
Step 5 — Monitor for leaks of personal data
Office 365 data loss prevention reports provide the greatest level of detail for monitoring sensitive data. You can
setup automated alerts and investigate breaches by using the Office 365 audit log. Cloud App Security extends the
ability to find and monitor sensitive data to other SaaS providers. For more information on these tools, see
Monitor for breaches of personal data.
Search for and find personal data
8/28/2018 • 5 minutes to read • Edit Online

Personal data is defined very broadly under the GDPR as any data that relates to an identified or identifiable
natural person that is a resident of the European Union (EU ).
Article 4 – Definitions

‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an
identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an
identifier such as a name, an identification number, location data, an online identifier or to one or more factors
specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural
person;

This article demonstrates how to find personal data stored in SharePoint Online and OneDrive for Business (which
includes the sites for all Office 365 groups and Microsoft Teams).
Finding personal data subject to GDPR relies on using sensitive information types in Office 365. These define how
the automated process recognizes specific information types such as health service numbers and credit card
numbers. At this time these cannot be used to find data in Exchange mailboxes at rest. However, sensitive
information types can be used with data loss prevention policies to find personal data in mail while in transit.
So, while you can’t currently use Content Search to find personal data at rest in Exchange Online mailboxes, you
can use the sensitive information types you curate for GDPR to find and protect personal information as it is sent
through email.

Use Content Search to find personal data


Microsoft recommends a three-stage approach to finding personal data in Office 365. The rest of this topic
provides guidance for each of these stages.

STEP DESCRIPTION

1. Search for sensitive information types Start by using sensitive information types to find personal
data. Create a Content Search query for each sensitive
information type. Run the query and analyze the results.
If needed, add parameters to the query to reduce false
positives:
Count range
Confidence range
Other properties or operators for more complex queries
If necessary, modify a sensitive information type to
improve accuracy for your organization:
Adjust the confidence level directly in the XML.
Add key words.
Adjust the proximity requirements for keywords.
STEP DESCRIPTION

2. Use Keyword Query Language (KQL) to find additional To find data not included in sensitive information types,
personal data in your environment use the KQL query language to develop custom queries.
Test the results of these searches and adjust the KQL
query string until you achieve the expected result.

3. Create new custom sensitive information types using After optimizing KQL queries to find target data, create new
the KQL queries custom sensitive information types using these queries. You
can then use these custom sensitive information types with
Content Search, in DLP policies and other tools, and within
other KQL queries.

Coming soon — You'll be able to create and modify sensitive information types in a new user interface in the
Security and Compliance Center. You can dynamically see matching results and tune sensitive information types to
meet your needs.

Search for sensitive information types using Content Search


Begin searching for personal data by using the sensitive information types that are included with Office 365. These
are listed in the Security and Compliance Center under Classification.
This topic includes a list of current sensitive information types that apply to citizens in the European Union. Use
these as a starting point. Check Security and Compliance Center frequently for new additions that can help with
GDPR compliance.
Also see this article: List of sensitive information types and what each one looks for.
Sensitive information types define how the automated process recognizes specific information types such as bank
account numbers, health service numbers, and credit card numbers. Sensitive information types are also referred
to as conditions. A sensitive information type is defined by a pattern that can be identified by a regular expression
or a function. In addition, corroborative evidence such as keywords and checksums can be used to identify a
sensitive information type. Confidence level and proximity are also used in the evaluation process.
At this time sensitive information types cannot be used to find data at rest in mailboxes.
Using Content Search with sensitive information types
STEP MORE INFORMATION

Go to Content Search in the Security and Compliance In the left pane of the Security & Compliance Center, click
Center **Search & investigation** > **Content search**.
See Run a Content Search in the Office 365 Security &
Compliance Center.
STEP MORE INFORMATION

Create a new search item for each sensitive information Use the following syntax:
type
SensitiveType:”<type>”

For example:
SensitiveType:"France Passport Number"

Scope the search to SharePoint (includes OneDrive for


Business). Make sure the syntax is exact and there are no
extra spaces or typos.
See Form a query to find sensitive data stored on sites.

Review the results for each search Look for these types of issues to determine if the query
accuracy is on target:
Many false positives
Missing known instances of data
See Export Content Search results from the Office 365
Security & Compliance Center.
Note: if you’re using Mozilla Firefox or Chrome, you might
need to first download reports using Internet Explorer or
Edge in order to install the required add-in.

Sensitive information types for EU citizen data


Start with these sensitive information types. Many more sensitive information types are coming soon for personal
data in EU countries.

Belgium National Number


Credit Card Number
Croatia Identity Card Number
Croatia Personal Identification (OIB ) Number
Czech National Identity Card Number
Denmark Personal Identification Number
EU Debit Card Number
Finland National ID
Finland Passport Number
France Driver's License Number
France National ID Card (CNI)
France Passport Number
France Social Security Number (INSEE )
German Driver’s License Number
Germany Identity Card Number
German Passport Number
Greece National ID Card
International Banking Account Number (IBAN )
IP Address
Ireland Personal Public Service (PPS ) Number
Italy’s Driver’s License Number
Netherlands Citizen’s Service (BSN ) Number
Norway Identity Number
Poland Identity Card
Poland National ID (PESEL )
Poland Passport
Portugal Citizen Card Number
Spain Social Security Number (SSN )
Sweden National ID
Sweden Passport Number
U.K. Driver’s License Number
U.K. Electoral Roll Number
U.K. National Health Service Number
U.K. National Insurance Number (NINO )
U.S./U.K. Passport Number

Add parameters to a sensitive information type query to hone the


results
You can add these parameters to a sensitive information type query:
Count range — define the number of occurrences of sensitive information a document needs to contain
before it’s included in the query results.
Confidence range — the level of confidence that the detected sensitive type is actually a match, such as 85
(85%).

Syntax:
SensitiveType:”<type>|<count range>|<confidence range>”
Examples:
SensitiveType:“Credit Card Number|5”(return only documents that contain exactly five credit card numbers)
SensitiveType:“Credit Card Number|*|85..”(confidence range is 85 percent or higher)
Note: “SensitiveType” is case sensitive, but the rest of the query is not.
You can also use properties, and operators to illustrate how you can refine your queries. For more information and
examples, see Form a query to find sensitive data stored on sites.
Customize or create a new sensitive information type
10/31/2018 • 10 minutes to read • Edit Online

This article provides three examples to demonstrate how to modify or create new Office 365 sensitive information
types for GDPR.
Modify an existing sensitive information type — EU Debit Card Number
Create a new sensitive information type — email address
Create a new sensitive information type with example XML file — Contoso customer number
Also see:
Create a custom sensitive information type in Office 365 Security & Compliance Center PowerShell
Customize a built-in sensitive information type

Modify a sensitive information type to improve accuracy


If you’re using Content Search to search for personal data using sensitive information types and you’re not
returning the expected results, or the query returns too many false positives, consider modifying the sensitive
information type to work better with your environment.
The best practice when creating or customizing a sensitive information type is to create a new sensitive information
type based on an existing one, giving it a unique name and identifiers. For example, if you wish to adjust the
parameters of the “EU Debit Card Number” sensitive information type, you could name your copy of that rule “EU
Debit Card Enhanced” to distinguish it from the original.
In your new sensitive information type, simply modify the values you wish to change to improve its accuracy. Once
complete, upload your new sensitive information type and create a new DLP rule (or modify an existing one) to use
the new sensitive information type you just added. Modifying the accuracy of sensitive information types might
require some trial and error, so maintaining a copy of the original type allows you to fall back to it if required in the
future.
To customize a sensitive information type:
1. Export the existing Microsoft Rule Package of built in sensitive information types in Office 365.
2. Rename this XML file and open it in your favorite XML editor.
3. Isolate the sensitive information type and remove all others.
4. Use PowerShell to generate two new GUIDs for the sensitive information type you are modifying.
5. Modify the ID and other basic elements so the sensitive information type is unique (this includes replacing
two GUIDs with the new ones you generated).
6. Tune the match requirements to improve accuracy.
a. Proximity modifications — Modify the character pattern proximity to expand or shrink the window in
which keywords must be found around the sensitive information type.
b. Keyword modifications — Add keywords to one of the <Keywords> element in order to provide our
sensitive information type more specific corroborative evidence to search for in order to signal a
match on this rule. Or remove keywords that are causing false positives.
c. Confidence modifications — Modify the confidence with which the sensitive information type must
match the criteria specified in its definition before a match is signaled and reported.
7. Upload the new sensitive information type.
8. Recrawl your content to identify the sensitive information. See Manually request crawling and re-indexing of
a site.

Example: modify the ‘EU Debit Card Number’ sensitive information type
Improving the accuracy of DLP rules in any system requires testing against a sample data set, and may require fine
tuning through repetitive modifications and tests. This example demonstrates modifications to the ‘EU Debit Card
Number’ sensitive information type to improve its accuracy.
When searching for an EU Debit Card Number in our example, the definition of that number is strictly defined as
16 digits using a complex pattern, and being subject to the validation of a checksum. We cannot alter this pattern
due to the string definition of this sensitive information type. However, we can make the following adjustments to
improve the accuracy of how Office 365 DLP finds this sensitive information type within Office 365.
Proximity modification
We'll shrink the window by modifying the patternProximity value in our <Entity> element from 300 to 150
characters. This means that our corroborative evidence, or our keywords, must be closer to our sensitive
information type in order to signal a match on this rule.
<Entity id="48da7072-821e-4804-9fab-72ffb48f6f78" patternsProximity="150" recommendedConfidence="85">
Keyword modifications
Some keywords might cause false positives to occur. As a result you might want to remove keywords. Here are the
keywords for this example::
<Keyword id="Keyword_card_terms_dict">
<Group>
<Term>corporate card</Term>
<Term>organization card</Term>
<Term>acct nbr</Term>
<Term>acct num</Term>
<Term>acct no</Term>

</Group>
</Keyword>
Confidence modifications
If you remove keywords from the definition, you would typically want to adjust how confident you are that this
sensitive information type was found by lowering this value. The default level for EU Debit Card Number type is
85.
<Entity id="48da7072-821e-4804-9fab-72ffb48f6f78" patternsProximity="150" recommendedConfidence="85">
<Pattern confidenceLevel="85">

</Pattern>
</Entity>

Create a new custom sensitive information type


To create a new custom sensitive information type, start by using Content Search to:
Optimize a KQL query
See which keywords are most useful
Use these results to create a new sensitive information type. Then optimize the new sensitive information type for
your environment.
Note: Many new sensitive information types are coming soon for personal data in EU countries. If you need to
create new sensitive information types, begin by targeting data that is custom to your environment.
Step 1 — Use KQL queries and key words to find additional data in your environment
You might need to create additional queries to find personal data that is subject to GDPR. Content Search uses
Keyword Query Language (KQL ) to find data. Most sensitive data can’t be accurately detected using just KQL
without sensitive information types. So the goal is to test and optimize KQL strings using Content Search and then
use these to create and tune new sensitive information types where you can achieve even greater accuracy.
Use these resources to formulate and optimize queries using KQL:
Keyword Query Language (KQL ) syntax reference (DMC )
Run a Content Search in the Office 365 Security & Compliance Center
Content Search provides another resource to help you develop KQL queries and sensitive information types —
keywords. Why use the keyword list? You can get statistics that show how many items match each keyword. This
can help you quickly identify which keywords are the most (and least) effective. For more information about search
statistics, see View keyword statistics for Content Search results.
Keywords on each row are connected by the OR operator in the search query that's created. You can also use a
keyword phrase (surrounded by parentheses) in a row.
For more information, see Keyword queries and search conditions for Content Search.
Example —Using Content Search to identify email addresses
Email addresses are considered sensitive information related to data subjects. This is a simple example to
demonstrate how Content Search can help.
KQL and keywords can’t be used together. Use these tools separately to hone your query and determine keywords
that might be useful in sensitive information types.
KQL query
(^|\b)([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z ]{2,5})($|\b)
Notes:
You can use NEAR and ONEAR for proximity searches.
Unfortunately, KQL doesn’t support queries with the Regex Class (ex: IdRef="Regex_email_address")
Keywords
Enter each keyword on a separate line. Example keywords:
email address
mail
contact
sender
recipient
cc
bcc
In this example, you might learn the keywords are not necessary and produce a lot of false positive results.
Step 2 — Create a new custom sensitive information type
After using KQL queries and keywords to identify sensitive information, use these to create new custom sensitive
information types. In many cases, you’ll require the sophistication of sensitive information types to achieve the
right level of accuracy. You can then use these custom sensitive information types with Content Search, in DLP
policies and other tools, and within other KQL queries.
The best practice is to create a new sensitive information type based on an existing one. Use the same process
described earlier in this article.
Example — Create a new sensitive information for email addresses
We’ll continue with the email address as an example because it’s simple. The following table details the
modifications recommended for a new email sensitive information type.

STEP MODIFICATION EXAMPLE XML SYNTAX

1 Set the IdRef property IdRef="Regex_email_address"


Within the <Entity> element,
modify the <IdMatch> element so
that its idRef property is = to a
unique value. This value will point to
an element that defines our regular
expression to find email addresses.

2 Proximity attribute patternsProximity="300"


We'll start with a patternProximity
value in our <Entity> element of
300.
STEP MODIFICATION EXAMPLE XML SYNTAX

3 Confidence level recommendedConfidence="75">


Set the recommendedConfidence The resulting XML for these first
property to a value you feel will three elements combined looks like
represent the confidence of finding this:
an accurate match. This will likely
require testing with a representative <Entity id="42e6348e-27f0-4774-
data set to get an accurate result. 9604-d470cb3e219a"
As an initial setting, set this value to patternsProximity="300"
75. recommendedConfidence="75">
<Pattern confidenceLevel="75">
<IdMatch
idRef="Regex_email_address" />
<Any minMatches="1">
<Match
idRef="Keyword_email_terms" />
</Any>
</Pattern>
</Entity>

4 Regex element <Regex id="Regex_email_address">


(^|\b)([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-
Add a new <Regex> element 9_\-\.]+)\.([a-zA-Z]{2,5})($|\b)</Regex>
immediately be below the <Entity>
elements that defines the regular
expression used to identify email
addresses.

5 Keywords <Keyword
id="Keyword_email_terms">
Add a new <Keyword> element
below the <Regex> element that <Group>
defines list of email address related
keywords. Ensure that the id value <Term>email</Term>
for the <Keyword> element <Term>email address</Term>
matches the <Match idRef> value
in the <Entity><Pattern> element. <Term>contact</Term>
You may continue to add your own </Group>
keywords if needed.
</Keyword>
Keywords are likely not necessary
to include in an email sensitive
information type. These are
provided as an example.
STEP MODIFICATION EXAMPLE XML SYNTAX

6 LocalizedStrings element <LocalizedStrings>


In the <LocalizedStrings> <Resource idRef="42e6348e-27f0-
<Resource> element ensure that 4774-9604-d470cb3e219a">
you have a unique name that
identifies your sensitive information <Name default="true"
type. langcode="en-us">Email
Address</Name>
<Description default="true"
langcode="en-us">Detects email
addresses.</Description>
</Resource>
</LocalizedStrings>

Create a new sensitive information type with example PowerShell and


XML file — Contoso customer number
Contoso uses a Contoso Customer Number (CCN ) to identify each customer in their customer database. A CCN
consists of the following taxonomy:
Two digits to represent the year that the record was created. Contoso was founded in 2002; therefore, the
earliest possible value would be 02.
Three digits to represent the partner agency that created the record. Possible agency values range from 000
to 999.
An alpha character to represent the line of business. Possible values are a-z and should be case insensitive.
A four-digit serial number. Possible serial number values range from 0000 to 9999.
Example CCNs:

15080P9562
14040O1119
15020J8317
14050E2330
16050E2166
17040O1118

Contoso always refers to customers by using a CCN in internal correspondence, external correspondence,
documents, etc. They would like to create a custom sensitive information type to detect the use of CCN in Office
365 so that they may apply protection to the use of this form of personal data.
Create a new sensitive information type for Contoso customer number
STEP ACTION RESULT
STEP ACTION RESULT

1 Contoso uses PowerShell and Content #Connect to Office 365 Security &
Search to find documents that match an Compliance Center
example set of CCNs.
$adminUser =
"alland@contoso.com"
Connect-IPPSSession -
UserPrincipalName $adminUser
#Create & start search for sample
data
$searchName = "Sample Customer
Information Search"
$searchQuery = "15080P9562 OR
14040O1119 OR 15020J8317 OR
14050E2330 OR 16050E2166 OR
17040O1118"
New-ComplianceSearch -Name
$searchName -SharePointLocation
All -ExchangeLocation All -
ContentMatchQuery $searchQuery
Start-ComplianceSearch -Identity
$searchName

2 Contoso analyzes the results. Every time customer number, customer no,
the CCN was used, an EU formatted customer #, customer#, Contoso
date was used and one of these customer
keywords were also used within a
proximity of 300 characters.

3 Contoso developed the following [0-1][0-9][0-9]{3}[A-Za-z][0-9]{4}


Regular Expression (RegEx) pattern to
identify their CCN.

4 Contoso developed the following ````xml (0?[1-9]|[12][0-9]|3[0-1])[\/-](0?


Regular Expression (RegEx) pattern to [1-9]|1[0-2]|j\x00e4n(uar)?
identify EU dates in the formats used by |jan(uary|uari|uar|eiro|vier|v)?|ene(ro)?
their various subsidiaries. |genn(aio)?|
feb(ruary|ruari|rero|braio|ruar|br)?
|f\x00e9vr(ier)?|fev(ereiro)?
|mar(zo|o|ch|s)?|m\x00e4rz|maart|
apr(ile|il)?|abr(il)?|avril|may(o)?|magg(io)?
|mai|mei|mai(o)?|jun(io|i|e|ho)?
|giugno|juin|jul(y|io|i|ho)?|lu(glio)?
|juil(let)?|ag(o|osto)?|aug(ustus|ust)?
|ao\x00fbt|sep|sept(ember|iembre|embre
)?|sett(embre)?|set(embro)?|
oct(ober|ubre|obre)?|ott(obre)?
|okt(ober)?|out(ubro)?
|nov(ember|iembre|embre|embro)?
|dec(ember)?| dic(iembre|embre)?
|dez(ember|embro)?|d\x00e9c(embre)?)[
\/-](19|20)?[0-9]{2} ````
STEP ACTION RESULT

5 Contoso uses PowerShell to generate #Generate a unique GUID for


three unique GUIDs. RulePack Id, Publisher Id, and Entity
Id
[guid]::NewGuid().Guid
[guid]::NewGuid().Guid
[guid]::NewGuid().Guid

6 Contoso defines the following Name: Contoso Customer Number


parameters for their sensitive item type (CCN)
rule.
Description: Contoso Customer
Number (CCN) that looks for
additional keywords and EU
formatted date

7 Contoso creates an XML file for a new See the XML file below this table.
sensitive information type to detect a
Contoso Customer Number (CCN) and
saves this to a local file system
asC:\Scripts\ContosoCCN.xml in with
UTF-8 encoding.

8 Contoso creates the custom sensitive #Connect to Office 365 Security &
information type with the following Compliance Center
PowerShell.
$adminUser =
"alland@contoso.com"
Connect-IPPSSession -
UserPrincipalName $adminUser
#Create new Sensitive Information
Type
New-
DlpSensitiveInformationTypeRulePa
ckage -FileData (Get-Content -Path
"C:\Scripts\ContosoCCN.xml" -
Encoding Byte -ReadCount 0)

Example XML file for the new sensitive information type (step 7)

\<?xml version="1.0" encoding="utf-8"?\>

\<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce"\>

\<RulePack id="130ae63b-a91e-4a12-9e02-a90e36a83d7f"\>

\<Version major="1" minor="0" build="0" revision="0" /\>

\<Publisher id="47148982-defd-42a1-890a-7b9472099f1f" /\>

\<Details defaultLangCode="en"\>

\<LocalizedDetails langcode="en"\>

\<PublisherName\>Contoso Ltd.\</PublisherName\>

\<Name\>Contoso Rule Package\</Name\>


\<Name\>Contoso Rule Package\</Name\>

\<Description\>Defines Contoso's custom set of classification rules\</Description\>

\</LocalizedDetails\>

\</Details\>

\</RulePack\>

\<Rules\>

\<!-- Contoso Customer Number (CCN) --\>

\<Entity id="a91f9a2e-6cfc-4622-8c5d-954875aa5b2b" patternsProximity="300" recommendedConfidence="85"\>

\<Pattern confidenceLevel="85"\>

\<IdMatch idRef="Regex\_contoso\_ccn" /\>

\<Match idRef="Keyword\_contoso\_ccn" /\>

\<Match idRef="Regex\_eu\_date" /\>

\</Pattern\>

\</Entity\>

\<Regex id="Regex\_contoso\_ccn"\>[0-1][0-9][0-9]{3}[A-Za-z][0-9]{4}\</Regex\>

\<Keyword id="Keyword\_contoso\_ccn"\>

\<Group matchStyle="word"\>

\<Term caseSensitive="false"\>customer number\</Term\>

\<Term caseSensitive="false"\>customer no\</Term\>

\<Term caseSensitive="false"\>customer \#\</Term\>

\<Term caseSensitive="false"\>customer\#\</Term\>

\<Term caseSensitive="false"\>Contoso customer\</Term\>

\</Group\>

\</Keyword\>

\<Regex id="Regex\_eu\_date"\> (0?[1-9]|[12][0-9]|3[0-1])[\\/-](0?[1-9]|1[0-2]|j\\x00e4n(uar)?


|jan(uary|uari|uar|eiro|vier|v)?|ene(ro)?|genn(aio)? |feb(ruary|ruari|rero|braio|ruar|br)?|f\\x00e9vr(ier)?
|fev(ereiro)?|mar(zo|o|ch|s)?|m\\x00e4rz|maart|apr(ile|il)?|abr(il)?|avril |may(o)?|magg(io)?|mai|mei|mai(o)?
|jun(io|i|e|ho)?|giugno|juin|jul(y|io|i|ho)?|lu(glio)?|juil(let)?|ag(o|osto)?|aug(ustus|ust)?
|ao\\x00fbt|sep|sept(ember|iembre|embre)?|sett(embre)?|set(embro)?|oct(ober|ubre|obre)?|ott(obre)?|okt(ober)?
|out(ubro)? |nov(ember|iembre|embre|embro)?|dec(ember)?|dic(iembre|embre)?|dez(ember|embro)?|d\\x00e9c(embre)?)
[ \\/-](19|20)?[0-9]{2}\</Regex\>

\<LocalizedStrings\>

\<Resource idRef="a91f9a2e-6cfc-4622-8c5d-954875aa5b2b"\>

\<Name default="true" langcode="en-us"\>Contoso Customer Number (CCN)\</Name\>

\<Description default="true" langcode="en-us"\>Contoso Customer Number (CCN) that looks for additional keywords
and EU formatted date\</Description\>

\</Resource\>

\</LocalizedStrings\>

\</Rules\>
\</Rules\>

\</RulePackage\>
Architect a classification schema for personal data
8/28/2018 • 6 minutes to read • Edit Online

Previous articles in this series focus on using sensitive information types to identify personal data that is subject to
GDPR. Sensitive information types are a form of classification. This might be all the classification you need.
However, many organizations implement a broader data governance strategy using labels. Use this topic to decide
if you also want to implement labels as part of your GDPR plan. If you do, this topic provides some guidance and
examples.
Note: Defining a classification schema for an organization and configuring policies, labels, and conditions requires
careful planning and preparation. It is important to realize that this is not an IT driven process. Be sure to work
with your legal and compliance team to develop an appropriate classification and labeling schema for your
organization’s data.

Decide if you are using labels in addition to sensitive data types


You can take one of two approaches for classification in Office 365 for personal information. Either of these can be
used for GDPR protection. If decide to use only sensitive information types for classification, you can skip the rest
of this topic.
Choose one of the following options.
Option 1: Use only Office 365 sensitive information types
Sensitive information types work well to identify and protect personal data subject to GDPR and other types
of regulations.
These are simpler to use if your organization doesn’t already have or plan to implement a broader data
governance plan using labels.
These work with DLP rules (so do Office labels).
In the future these will work with Cloud App Security so you can detect sensitive information in other SaaS
apps.
Option 2: Use sensitive information types + Office labels
You’ll need sensitive information types to automatically apply labels to personal data that is subject to
GDPR, so these are a prerequisite.
Using Office labels allows you to include personal data that is subject to GDPR into a broader data
governance plan for your organization.
Later, Office labels will converge with Azure Information Protection labels into a unified classification and
labeling engine.

Develop a label schema that includes personal data


Before using technical capabilities to apply labels and protection, first work across your organization to define a
classification schema. Your organization might already have a classification schema, which makes it easier to add
personal data. This topic includes an example classification schema. You can use this as a starting point, if needed.
Getting started
Begin by deciding on the number and names of labels to implement. Do this activity without worrying about which
technology to use and how labels will be applied. Apply this schema universally throughout your organization,
including data that resides on premises and in other cloud services.
Recommendations
When designing and implementing policies, labels and conditions, consider following these recommendations:
Use existing classification schema (if any) — Many organizations already are using data classification in
some form. Carefully evaluate the existing label schema and if possible use it as is. Using familiar labels that
are recognizable to the end-user will drive adoption.
Start with default policies and labels — All solutions come with a set of predefined policies and labels.
Carefully evaluate these against the organizations legal and business requirements and consider using them
instead of creating new ones.
Start small — There is virtually no limit to the number of labels that can be created. However, large
numbers of labels and sub-labels will negatively impact the adoption. Too many choices often means no
choice at all.
Use scenarios and use cases — Identify common use cases within the organization and use scenarios
derived from the GDPR to verify if the envisioned label and classification configuration will work in practice.
Question every request for a new label, does every scenario or use case really need a new label or can we
use what we already have? Keeping the number of labels to a minimum improves adoption.
Use sub-labels for key departments, some departments will have specific needs that require specific labels.
Define these labels as sub-labels to an existing label and consider using scoped policies that are assigned to
user groups instead of globally.
Consider scoped policies, polices targeted at subsets of users will prevent "label overload". A scoped policy
enables assigning role or department specific (sub-)labels to just employees that work for that specific
department.
Use meaningful label names, it is recommended not to use jargon, standards or acronyms as label names.
Try to use names that resonate with the end user to improve adoption. Instead of using labels like PII, PCI,
HIPAA, LBI, MBI and HBI consider names like Non-Business, Public, General, Confidential and Highly
Confidential.
Example classification schema
LABEL NAME DESCRIPTION

Personal Non-business data, for personal use only.

Public Business data that is specifically prepared and approved for


public consumption.

Customer data Business data that contains personal identifiable information.


Examples are credit card numbers, bank account numbers, and
social security numbers.

HR data Human Resource data about Contoso employees, such as


employee number and salary data.

Confidential Sensitive business data that could cause damage to the


business if shared with unauthorized people. Examples include
contracts, security reports, forecast summaries, and sales
account data.
LABEL NAME DESCRIPTION

Highly confidential Very sensitive business data that would cause damage to the
business if it was shared with unauthorized people. Examples
include employee and customer information, passwords,
source code, and pre-announced financial reports.

Define a taxonomy and search criteria for each label


After developing a classification schema for your organization, the next step is to develop the taxonomy and search
criteria for finding this data. For personal data, you’ve already completed this work by identifying sensitive
information types and also by customizing or creating new sensitive information types for your environment.
The following table provides an example schema, taxonomy, and search criteria for an organization. The labels are
ordered by sensitivity level from least sensitive to most sensitive to ensure that data that matches multiple label
conditions is assigned the appropriate label.
Note: The configuration example is provided for illustration only and is not intended as deployment guidance or
reference.
The important takeaway is to ensure that the work you invest to classify personal data for GDPR compliance fits
together with the objectives for your entire organization.
Example schema, taxonomy, and search criteria
LABEL TAXONOMY METHOD SEARCH SYNTAX

Personal Documents manually Manual Documents manually


labelled personal by the end labelled personal by the end
user. user.

Public Documents containing the KQL KQL — Approved for


case insensitive phrase Public Release*
Approved for Public Release RegEx
##/#### where # represents RegEx — (?i)(\bApproved
any digit. for Public Release
\d{2}\/\d{4}\b)

Customer data Sensitive information types Sensitive information types


for EU citizen data.

Human Resources — Documents that include the KQL KQL — CONTOSO-9*


Employee Data case sensitive employee id in
the format CONTOSO- RegEx RegEx — (\bCONTOSO-
9##### where # represents 9\d{5}\b)
any digit.

Human Resources — Salary Documents that include the KQL KQL — Contoso AND
Data keyword (not case sensitive) (Salary OR
Contoso AND either RegEx Compensation)
keyword (not case sensitive)
Salary OR Compensation RegEx — (\bCONTOSO-
9\d{5}\b)
LABEL TAXONOMY METHOD SEARCH SYNTAX

Confidential Documents containing the KQL KQL — Contoso


phrase (not case sensitive) Confidential
Contoso Confidential. RegEx
RegEx — (?i)(\bContoso
Confidential\b)

Highly confidential Documents that include KQL KQL — Contoso Secret


either pharase (case OR Secret-C*
sensitive) Contoso Secret or RegEx
Secret-C#### where # RegEx — (?i)(\bContoso
represents any digit. Secret\b)|(\bSecret-
C\d{4}\b)
Apply labels to personal data in Office 365
8/28/2018 • 5 minutes to read • Edit Online

Use this topic if you are using Office labels as part of your GDPR protection plan. Today labels can be created in
the Office 365 Security & Compliance Center and in Azure Information Protection. Over time these technologies
will converge into a unified labeling and classification experience and you will be able to achieve even more.
If you are using labels for protection of personal data in Office 365, Microsoft recommends you start with Office
labels. You can use Advanced Data Governance to automatically apply labels based on sensitive information types
or other criteria. You can use Office labels with data loss prevention to apply protection. You can also use labels
with eDiscovery and Content Search. You’ll soon be able to use both labels and sensitive information types with
Cloud App Security to monitor personal data that resides in other SaaS apps.
Azure Information Protection labels are currently recommended for applying labels to files on premises and in
other cloud services and providers. These are also recommended for files in Office 365 that require Azure Rights
Management (Azure RMS ) encryption for data protection, such as trade secret files.
At this time, using Azure Information Protection to apply Azure RMS encryption is not recommended for files in
Office 365 with data that is subject to the GDPR. Office 365 services currently cannot read into RMS -encrypted
files. Therefore, the service can’t find sensitive data in these files.
Azure Information Protection labels can be applied to mail in Exchange Online and these labels work with Office
365 data loss prevention. Coming soon with the unified classification and labeling engine you will be able to use
the same labels for email and files, including automatically labeling and protecting email in transit.

In the illustration:
Use Office 365 labels for personal data and for highly regulated & trade secret files in SharePoint Online
and OneDrive for Business.
Use Azure Information Protection (AIP ) labels for highly regulated & trade secret files, Exchange Online
email, files in other SaaS services, files in on-premises datacenters, and files in other cloud providers.
Coming soon: both types of labels will converge into a unified classification and labeling experience.

Use Office labels and sensitive information types across Microsoft 365
for information protection
The following illustration shows how Office labels and sensitive information types can be used in label policies,
data loss prevention policies, and with Cloud App Security policies.

For accessibility, the following table provides the same examples in the illustration.

CLOUD APP SECURITY POLICIES


DATA LOSS PREVENTION FOR ALL SAAS APPS — 1
CLASSIFICATION ELEMENTS LABEL POLICIES — 2 EXAMPLES POLICIES — 2 EXAMPLES EXAMPLE

Office labels. Examples: Auto apply this label . . . Apply this protection . . . Alert when files with
Personal, Public, Customer these attributes . . .
data, HR data, Confidential, Customer data <define protection>
Highly confidential <predefined PII attribute
. . . to documents that . . . to documents with -or- custom expression>
match these sensitive this label . . .
information types . . . . . . in any sanctioned
Customer data SaaS app are shared
<list of example outside the organization
sensitive information
types>

Sensitive information types. Publish these labels for Apply this protection . . . Note: Attributes coming
Examples: Belgium National users to manually apply . soon to Cloud App Security
Number, Credit Card .. <define protection> include Office 365 sensitive
Number, Croatia Identity . . . to documents that information types and
Cart Number, Finland <select labels> Unified labels across Office
match these sensitive
National ID . . . to these locations . . . information types> 365 and Azure Information
Protection.
<all locations or choose
specific locations>

Prioritize auto-apply label policies


For personal data that is subject to GDPR, Microsoft recommends auto-applying labels by using the sensitive
information types you curated for your environment. It is important that auto-apply label policies are well
designed and tested to ensure the intended behavior occurs.
The order that auto-apply policies are created and whether users are also applying these labels affect the result. So,
it is important to carefully plan the roll-out. Here’s what you need to know.
One label at a time
You can only assign one label to a document.
Older auto -apply policies win
If there are multiple rules that assign an auto-apply label and content meets the conditions of multiple rules, the
label for the oldest rule is assigned. For this reason, it is important to plan the label policies carefully before
configuring them. If an organization requires a change to the priority of the label policies, they will need to delete
and recreate them.
Manual user-applied labels trump auto -applied labels
Manual user applied labels trump auto-applied labels. Auto-apply policies cannot replace a label that is already
applied by a user. Users can replace labels that are auto-applied.
Auto -assigned labels can be updated
Auto-assigned labels can be updated by either newer label policies or by updates to existing policies.
Be sure your plan for implementing labels includes:
Prioritizing the order that auto-apply policies are created.
Allowing enough time for labels to be automatically applied before rolling these out for users to manually
apply. It can take up to seven days for the labels to be applied to all content that matches the conditions.
Example priority for creating the auto -apply policies
LABELS PRIORITY ORDER TO CREATE AUTO-APPLY POLICIES

Human Resources — Employee Data 1

Customer Data 2

Highly Confidential 3

Human Resources — Salary Data 4

Confidential 5

Public 6

Personal No auto-apply policy

Create labels and auto-apply label policies


Create labels and policies in the Security & Compliance Center.

STEP DESCRIPTION

Give permissions to members of your compliance team. Members of your compliance team who will create labels
need permissions to use the Security & Compliance
Center. Go to Permissions in Security and Compliance
Center and modify the members of the Compliance
Administrator group.
See Give users access to the Office 365 Security &
Compliance Center.
STEP DESCRIPTION

Create Office labels. Go to Classifications in Security and Compliance Center,


choose Labels, and create the labels for your environment.

Create auto-apply policies for labels. Go to Classification in Security and Compliance Center, choose
Label policies, and create the policies for auto-applying labels.
Be sure to create these policies in the prioritized order.

The following illustration shows how to create an auto-apply label for the Customer data label.

In the illustration:
The “Customer data” label is created.
The desired sensitive information types for GDPR are listed: Belgium National Number, Credit Card
Number, Croatia Identity Card Number, Finland National ID.
Create an auto-apply policy assigns the label “Customer data” to any file that includes one of the sensitive
information types that you add to the policy.
Apply protection to personal data in Office 365
8/28/2018 • 12 minutes to read • Edit Online

Protection of personal information in Office 365 includes using data loss prevention capabilities. With data loss
prevention (DLP ) policies in the Office 365 Security & Compliance Center, you can identify, monitor, and
automatically protect sensitive information across Office 365.
This topic describes how to use DLP to protect personal data. This topic also lists other protection capabilities that
can be used to achieve GDPR compliance, including setting permissions in SharePoint libraries and using device
access policies.

Apply protection using data loss prevention in Office 365


With DLP, you can:
Identify sensitive information across many locations.
Prevent accidental sharing of sensitive information.
Help users learn how to stay compliant without interrupting their workflow.
View DLP reports showing content that matches your organization’s DLP policies.
For more information, see Overview of data loss prevention policies.

This illustration shows the options for creating a DLP policy:


Choose the protection to apply. Protection can include:
Policy tips for users
Email report for admins
Prevent sharing externally, internally, or both
Choose the criteria for applying the protection. Apply the protection to documents with this type of content:
you can configure the policy to use sensitive information types and/or labels.
Using DLP for GDPR compliance
One of the primary uses of Office 365 DLP is to identify personal data related to EU data subjects in your Office
365 environment. Office 365 DLP can notify your compliance teams of where personal information is stored in
SharePoint Online and OneDrive for Business, or when users send email containing personal information. DLP
can also provide policy tips to your employees when working with personal information related to EU residents.
Educating and raising awareness to where EU resident data is stored in your environment and how your
employees are permitted to handle it represents one level of information protection using Office 365 DLP. Often,
employees who already have access to this type of information require this access to perform their day to day
work. Enforcing DLP policies to help comply with GDPR may not require restricting access.
However, complying with GDPR typically involves a risk based assessment of the organization from both a legal
and information security perspective, identification of what type and where personal information is stored, as well
as if there is a legal justification to store and process that information. Based on this assessment, implementing
policies to protect the organization and comply with GDPR might require removing access for employees to
documents that contain personal information for EU data subjects. In cases where further protection is required,
additional DLP protection can be configured.
The following table lists three configurations of increasing protection using DLP. The first configuration,
awareness, can be used as a starting point and minimum level of protection for GDPR.
Example protection levels that can be configured with DLP policies and used for GDPR compliance
DLP CONFIGURATION FOR DOCUMENTS
WITH PERSONAL INFORMATION RELATED
PROTECTION LEVEL TO EU DATA SUBJECTS BENEFITS AND RISKS

Awareness Send email notifications to Raise awareness with compliance


compliance teams when this data is teams as well as employees
found in documents in SharePoint regarding where this data is stored.
Online and OneDrive for Business.
Educate employees on corporate
Customize and display Policy Tips policy for handling documents
to employees in SharePoint and containing this data.
OneDrive for Business when
accessing documents containing Does not prevent employees from
this data. sharing this data internally or
externally.
Detect and report when this data is
being shared. You can review DLP reports for
shared data and decide if you need
to increase the protection.

Prevent external sharing Restrict access to documents that Prevents external sharing of this
contain this data in SharePoint data while allowing for employees
Online and OneDrive for Business to work with this data internally.
when that content is shared with
external users. You can review DLP reports for
internally shared data and decide if
Prevent sending emails with you need to increase this
documents that contain this data to protection.
external recipients.
Detect and report when this data is
being shared.
DLP CONFIGURATION FOR DOCUMENTS
WITH PERSONAL INFORMATION RELATED
PROTECTION LEVEL TO EU DATA SUBJECTS BENEFITS AND RISKS

Prevent internal and external sharing Restrict access to documents that Prevents internal and external
contain this data in SharePoint sharing of this data.
Online and OneDrive for Business
when that content is shared Employees might not be able to
internally or externally. complete tasks that require working
with this data.
Prevent sending emails which
contain this data to both internal You can review DLP reports for
and external recipients. internally or externally shared data
and decide if end user training is
needed.

Note: As the levels of protection increase, the ability of users to access information will decrease in some cases, and
could potentially impact their productivity or ability to complete day to day tasks. Increasing protection levels by
implementing policies that impact employees is typically accompanied by end user training, educating users on
new security policies and procedures to help them continue to be productive in a more secure environment.
Example DLP policy for GDPR — Awareness
Name: Awareness for personal data that is subject to GDPR.
Description: Display policy tips to employees, notify compliance teams when this data is found in documents in
SharePoint Online and OneDrive for Business, detect and report when this data is being shared outside your
organization.

CONTROL SETTINGS

Choose information to protect Select a Custom policy template.

Locations All locations in Office 365

Find content that contains Click ‘Edit’ and add all the sensitive information types you
curated for your environment.

Detect when this content is shared Check this box and select ‘with people outside my
organization.’

Notify users when content matches the policy settings Check this box (“Show policy tips to users and send them
an email notification.”)
Click ‘Customize the tip and email’ and update these for
your environment. See the default notifications in this
article: Send email notifications and show policy tips for
DLP policies.
CONTROL SETTINGS

Detect when a specific amount of sensitive info is being shared ‘Detect when content that’s being shared contains: At
at one time least ____ instances of the same sensitive info type’ — Set
this to 1.
‘Send incident reports in email’ — check this box. Click
‘Choose what to include in the report and who receives it.’
Be sure to add your compliance team.
‘Restrict who can access the content and override the
policy’ — clear this checkbox to receive notifications about
sensitive information without preventing users from
access that information.

All locations includes:


SharePoint Online
OneDrive for Business accounts
Exchange mailboxes
Because Content Search doesn’t currently let you test sensitive information types with email,consider creating
separate policies for Exchange with a subset of sensitive information types in each policy and monitoring the
rollout of these policies.

Additional protection you can apply to protect personal data in Office


365
Sensitive information types, labels, and data loss protection policies help you identify documents containing
specific data and apply protection. However, these protections depend on appropriate permissions being set for
access to data, users with accounts that are not compromised, and devices that are healthy.
The following illustration details additional protection you can apply to protect access to personal data.

For accessibility, the following table provides the same information in the illustration.
SCOPE OF PROTECTION CAPABILITIES

Document and email-level protection (includes mail in transit, Sensitive information types
but not currently mailboxes at rest)
Office labels
Data loss prevention policies
Office 365 Message Encryption for email

Site and library-level protection (includes SharePoint Online Permissions for SharePoint Online and OneDrive for
and OneDrive for Business sites) Business sites and libraries
External sharing policies for SharePoint Online and
OneDrive for Business (site-level)
Site-level device access policies

Service access protection (includes access to all services in Identity and device access protection in Enterprise
Office 365) Mobility + Security (EMS) suite
Privileged access management
Windows 10 security capabilities

The rest of this article provides more information on each of these categories of protection.
Capabilities that are OK to use with GDPR
You can use the following capabilities in an environment configured for GDPR compliance. These capabilities are
not necessary for GDPR compliance, but they can be used without adversely affecting your ability to discover,
protect, monitor, and report on data related to GDPR compliance.
Customer Key — Allows customers to provide and retain control over the encryption keys that are used to encrypt
data at rest within Office 365. Recommended only for customers with a regulatory need to manage their own
encryption keys.
Customer Lockbox — Customer lockbox allows you to control how a Microsoft support engineer accesses your
data, if needed, to fix a technical issue on a case by case basis. You can control whether to give the support
engineer access to your data or not. An expiration time is provided with each request.

Site and library-level protection


Permissions for SharePoint and OneDrive for Business libraries
Use permissions in SharePoint to provide or restrict user access to the site or its contents. Add individual users or
Azure Active Directory groups to the default SharePoint groups. Or, create a custom group for finer-grain control.

The illustration plots permission levels from Full control to View Only. The following table includes the same
information.
FULL CONTROL DESIGN EDIT CONTRIBUTE READ VIEW ONLY

Contribute + Contribute + View, add, View and View, no


approve and add, edit and update, delete list download download
customize delete lists (not items and
just list items) documents

More information:
Understanding permission levels in SharePoint
Understanding SharePoint groups
External sharing policies for SharePoint and OneDrive for Business libraries
Many organizations allow external sharing to support collaboration. Find out how your tenant-wide settings are
configured. Then review the external sharing settings for sites that contain personal data.
An external user is someone outside of your organization who is invited to access your SharePoint Online sites and
documents but does not have a license for your SharePoint Online or Microsoft Office 365 subscription.
External sharing policies apply to both SharePoint Online and OneDrive for Business.
You must be a SharePoint Online admin to configure sharing policies.
You must be a Site Owner or have full control permissions to share a site or document with external users.
The following table summarizes the controls you can configure.

CONTROL CATEGORY OPTIONS

Type of sharing Don’t allow sharing outside your organization (can be set
for individual site collections)
Allow sharing to authenticated external users only (allow
new or limit to existing, can be set for individual site
collections)*
Allow sharing to external users with an anonymous access
link (can be set for individual site collections)
Limit external sharing using domains (allow and deny list)
Choose the default link type (anonymous, company
shareable, or restricted)

What external users can do Prevent external users from sharing files, folders, sites they
don’t own
Require external users to accept sharing invitations with
the same account the invitation was sent to
CONTROL CATEGORY OPTIONS

Notifications Currently only available in OneDrive for Business. Notify


owners when:
-
Users invite additional external users to shared files
-
External users accept invitations to access files
-
An anonymous access link is created or changed

More information:
Manage external sharing for your SharePoint Online environment
Share sites or documents with people outside your organization
Site -level device access policies
SharePoint Online and OneDrive for Business let you configure device access policies at the site level. This lets you
configure more protection for sites with sensitive data.
If you configure site-level device access policies, be sure to coordinate these with tenant-level policies and also with
access policies that are configured in Azure Active Directory, Intune, and Intune App Management.
Device access policies for SharePoint and OneDrive for Business require supporting policies in Azure Active
Directory and Microsoft Intune depending on the scenario you are implementing. The following table summarizes
objectives you can achieve with device access policies and indicates which products require supporting policies.

PREVENT USERS PREVENT USERS


ONLY ALLOW FROM FROM
ACCESS FROM DOWNLOADING DOWNLOADING
SPECIFIC IP FILES TO NON- BLOCK ACCESS ON FILES TO NON- BLOCK ACCESS ON
ADDRESS DOMAIN JOINED NON-DOMAIN COMPLIANT NON-COMPLIANT
LOCATIONS DEVICES JOINED DEVICES DEVICES DEVICES

SharePoint admin Yes Yes Yes Yes Yes


center

Azure Active Yes Yes Yes Yes


Directory

Microsoft Intune Yes Yes

More information: SharePoint Online admin center: Control access from unmanaged devices.

Service access protection for identities and devices


Microsoft recommends you configure protection for identities and devices that access the service. The work you
put into protecting access to Office 365 services can also be used to protect access to other SaaS services, PaaS
services, and even apps in other cloud providers.
Access protection for identities and devices provides a baseline of protection to ensure that identities are not
compromised, devices are safe, and organization data that is accessed on devices is isolated and protected.
For starting point recommendations and configuration guidance, see Microsoft security guidance for political
campaigns, nonprofits, and other agile organizations.
For hybrid identity environments with AD FS, see Recommended security policies and configurations.
The following illustration describes how cloud services (SaaS, PaaS ), account types (tenant domain accounts vs.
B2B accounts) and service access capabilities relate. It’s important to note which capabilities can be used with B2B
accounts.

For accessibility, the rest of this section describes this illustration.


Cloud services
Azure Active Directory provides identity access to any cloud service, including non-Microsoft providers such as
Amazon Web Services. The illustration shows Office 365, “Other SaaS app,” and “PaaS app.” Arrows point from
Azure Active Directory to each of these services, showing that Azure Active Directory can be used for
authentication to all of these app types.
Types of accounts
Tenant domain accounts are account you add to your tenant and manage directly. B2B accounts are accounts for
users outside your organization you invite to collaborate with. These can be other Office 365 accounts, other
organization accounts, or consumer accounts (such as Gmail). The illustration shows both account types within
Azure Active Directory.
Capabilities
The capabilities in the following table protect identities and devices. The table indicates which capabilities can also
be used with B2B accounts, similar to the illustration.

WORKS WITH TENANT DOMAIN WORKS WITH AZURE B2B ACCOUNTS


CAPABILITY ACCOUNTS (WITHOUT ADDITIONAL LICENSING)

Multi-factor authentication and Yes Yes


conditional access
WORKS WITH TENANT DOMAIN WORKS WITH AZURE B2B ACCOUNTS
CAPABILITY ACCOUNTS (WITHOUT ADDITIONAL LICENSING)

Azure AD Identity Protection Yes Yes

Azure AD Privileged Identity Yes


Management

Mobile Application Management Yes


(MAM)

Device enrollment and management Yes Only one organization can manage a
device

Windows 10 security capabilities Yes Yes


(conditional access based on device
compliance requires device
management)

You can add licenses to B2B accounts to give these users additional capabilities, if needed, to protect access to
personal data in your environment.
Monitor for leaks of personal data
8/28/2018 • 7 minutes to read • Edit Online

There are many tools that can be used to monitor the use and transport of personal data. This topic describes three
tools that work well.

In the illustration:
Start with Office 365 data loss prevention reports for monitoring personal data in SharePoint Online,
OneDrive for Business, and email in transit. These provide the greatest level of detail for monitoring
personal data. However, these reports don’t include all services in Office 365.
Next, use alert policies and the Office 365 audit log to monitor activity across Office 365 services. Setup
ongoing monitoring or search the audit log to investigate an incident. The Office 365 audit log works across
Office 365 services — Sway, PowerBI, eDiscovery, Dynamics 365, Microsoft Flow, Microsoft Teams, Admin
activity, OneDrive for Business, SharePoint Online, mail in transit, and mailboxes at rest. Skype
conversations are included in mailboxes at rest.
Finally, Use Microsoft Cloud App Security to monitor files with sensitive data in other SaaS providers.
Coming soon is the ability to use Office 365 sensitive information types and unified labels across Azure
Information Protection and Office with Cloud App Security. You can setup policies that apply to all of your
SaaS apps or specific apps (like Box). Cloud App Security doesn’t discover files in Exchange Online,
including files attached to email.

Office 365 data loss prevention reports


After you create your data loss prevention (DLP ) policies, you’ll want to verify that they’re working as you intended
and helping you to stay compliant. With the DLP reports in Office 365, you can quickly view the number of DLP
policy matches, overrides, or false positives; see whether they’re trending up or down over time; filter the report in
different ways; and view additional details by selecting a point on a line on the graph.
You can use the DLP reports to:
Focus on specific time periods and understand the reasons for spikes and trends.
Discover business processes that violate your organization’s DLP policies.
Understand any business impact of the DLP policies.
View the justifications submitted by users when they resolve a policy tip by overriding the policy or
reporting a false positive.
Verify compliance with a specific DLP policy by showing any matches for that policy.
View a list of files with sensitive data that matches your DLP policies in the details pane.
In addition, you can use the DLP reports to fine tune your DLP policies as you run them in test mode.
DLP reports are in Security and Compliance center. Navigate to Reports > View reports. Under Data loss
prevention (DLP ), go to either DLP policy and rule matches or DLP false positives and overrides.
For more information, see View the reports for data loss prevention.

Office 365 audit log and alert policies


The Office 365 audit log contains events from Exchange Online, SharePoint Online, OneDrive for Business, Azure
Active Directory, Microsoft Teams, Power BI, Sway, and other Office 365 services.
The Office 365 Security and Compliance Center provides two ways to monitor and report against the Office 365
audit log:
Setup alert policies, view alerts, and monitor trends — Use the new alert policy and alert dashboard tools in
the Office 365 Security & Compliance Center.
Search the audit log directly — Search for all events in a specified date rage. Or you can filter the results
based on specific criteria, such as the user who performed the action, the action, or the target object.
Information security and compliance teams can use these tools to proactively review activities performed by both
end users and administrators across Office 365 services. Automatic alerts can be configured to send email
notifications when certain activities occur on specific site collections - for example when content is shared from
sites known to contain GDPR related information. This allows those teams to follow up with users to ensure that
corporate security policies are followed, or to provide additional training.
Information security teams can also search the audit log to investigate suspected data breaches and determine
both root cause and the extent of the breach. This built in capability facilitates compliance with article 33 and 34 of
the GDPR, which require notifications be provided to the GDPR supervisory authority and to the data subjects
themselves of a data breach within a specific time period. Audit log entries are only retained for 90 days within the
service - it is often recommended and many organizations required that these logs be retained for longer periods
of time.
Solutions are available which subscribe to the Unified Audit Logs through the Microsoft Management Activity API
and can both store log entries as needed, and provide advanced dashboards and alerts. One example is Microsoft
Operations Management Suite (OMS ).
More information about alert policies and searching the audit log:
Alert policies in the Office 365 Security & Compliance Center
Search the audit log for user and admin activity in Office 365 (introduction)
Turn Office 365 audit log search on or off
Search the audit log in the Office 365 Security & Compliance Center
Search-UnifiedAuditLog (cmdlet)
Detailed properties in the Office 365 audit log

Microsoft Cloud App Security


Microsoft Cloud App Security helps you discover other SaaS apps in use across your networks and sensitive data
that is sent to and from these apps.
Microsoft Cloud App Security is a comprehensive service providing deep visibility, granular controls and enhanced
threat protection for your cloud apps. It identifies more than 15,000 cloud applications in your network-from all
devices-and provides risk scoring and ongoing risk assessment and analytics. No agents required: information is
collected from your firewalls and proxies to give you complete visibility and context for cloud usage and shadow IT.
To better understand your cloud environment, Cloud App Security investigate feature provides deep visibility into
all activities, files and accounts for sanctioned and managed apps. You can gain detailed information on a file level
and discover where data travels in the cloud apps.
For examples, the following illustration demonstrates two Cloud App Security policies that can help with GDPR.

The first policy alerts when files with a predefined PII attribute or custom expression that you choose is shared
outside the organization from the SaaS apps that you choose.
The second policy blocks downloads of files to any unmanaged device. You choose the attributes within the files to
look for and the SaaS apps you want the policy to apply to.
These attribute types are coming soon to Cloud App Security:
Office 365 sensitive information types
Unified labels across Office 365 and Azure Information Protection
Cloud App Security dashboard
If you haven’t yet started to use Cloud App Security, begin by starting it up. To access Cloud App Security:
https://portal.cloudappsecurity.com.
Note: Be sure to enable ‘Automatically scan files for Azure Information Protection classification labels’ (in General
settings) when getting started with Cloud App Security or before you assign labels. After setup, Cloud App
Security does not scan existing files again until they are modified.

More information:
Deploy Cloud App Security
More information about Microsoft Cloud App Security
Block downloads of sensitive information using the Microsoft Cloud App Security proxy

Example file and activity policies to detect sharing of personal data


Detect sharing of files containing PII — Credit card number
Alert when a file containing a credit card number is shared from an approved cloud app.

CONTROL SETTINGS

Policy type File policy

Policy template No template

Policy severity High

Category DLP

Filter settings Access level = Public (Internet), Public, External


App = <select apps> (use this setting if you want to limit
monitoring to specific SaaS apps)

Apply to All files, all owners


CONTROL SETTINGS

Content inspection Includes files that match a present expression: All


countries: Finance: Credit card number
Don’t require relevant context: unchecked (this will match
keywords as well as regex)
Includes files with at least 1 match
Unmask the last 4 characters of the violation: checked

Alerts Create an alert for each matching file: checked


Daily alert limit: 1000
Select an alert as email: checked
To: infosec@contoso.com

Governance Microsoft OneDrive for Business


Make private: check Remove External Users
All other settings: unchecked
Microsoft SharePoint Online
Make private: check Remove External Users
All other settings: unchecked

Similar policies:
Detect sharing of Files containing PII - Email Address
Detect sharing of Files containing PII - Passport Number
Detect Customer or HR Data in Box or OneDrive for Business
Alert when a file labeled as Customer Data or HR Data is uploaded to OneDrive for Business or Box.
Notes:
Box monitoring requires a connector be configured using the API Connector SDK.
This policy requires capabilities that are currently in private preview.

CONTROL SETTINGS

Policy type Activity policy

Policy template No template

Policy severity High

Category Sharing Control

Act on Single activity


CONTROL SETTINGS

Filter settings Activity type = Upload File


App = Microsoft OneDrive for Business and Box
Classification Label (currently in private preview): Azure
Information Protection = Customer Data, Human
Resources—Salary Data, Human Resources—Employee
Data

Alerts Create an alert: checked


Daily alert limit: 1000
Select an alert as email: checked
To: infosec@contoso.com

Governance All apps


Put user in quarantine: check
All other settings: unchecked
Office 365
Put user in quarantine: check
All other settings: unchecked

Similar policies:
Detect large downloads of Customer data or HR Data — Alert when a large number of files containing
customer data or HR data have been detected being downloaded by a single user within a short period of
time.
Detect Sharing of Customer and HR Data — Alert when files containing Customer or HR Data are shared.
GDPR discovery, protection, and reporting in the
Office 365 dev/test environment
8/29/2018 • 8 minutes to read • Edit Online

Summary: Demonstrate GDPR capabilities in Office 365.


This article describes how you configure and demonstrate personally identifiable information (PII) discovery,
protection, and reporting for the General Data Protection Regulation (GDPR ) in an Office 365 dev/test
environment.

Phase 1: Create and configure your trial Office 365 subscription


First, follow the steps in Phase 2 of the Office 365 dev/test environment article.
Next, use these steps to configure the eDiscovery manager:
1. Sign in to your Office 365 trial tenant with your global administrator account.
2. From the Office 365 home page, click Security & Compliance.
3. From the new Security & Compliance tab, click Permissions > eDiscovery Manager.
4. Click Edit for eDiscovery Manager, and then click Choose eDiscovery Manager.
5. Click + Add, search for your global administrator account name and add your global administrator account as
an eDiscovery Manager.
6. Click Done > Save > Close.

Phase 2: Add personally identifiable information to your tenant


In this phase, you create a document with PII for a set of example International Banking Account Numbers (IBANs)
and store it on a SharePoint Online site in your Office 365 dev/test environment.
1. On your local computer, open Microsoft Word.
2. Paste the following table in the Word file and save it as ‘IBANs.docx’ on your local computer.

NUMBER COUNTRY CODE IBAN

1 Austria SEPA AT AT611904300234573201

2 Bulgaria SEPA BG BG80BNBG966110203456


78

3 Denmark SEPA DK DK5000400440116243

4 Finland SEPA FI FI2112345600000785

5 France SEPA FR FR1420041010050500013


M02606

6 Germany SEPA DE DE893704004405320130


00
NUMBER COUNTRY CODE IBAN

7 Greece SEPA GR GR160110125000000001


2300695

8 Italy SEPA IT GR160110125000000001


2300695

9 Netherlands SEPA NL NL91ABNA0417164300

10 Poland SEPA PL PL2711402004000030020


1355387

Note:- This sample data set is derived from publicly available information and is intended to be used for test
purposes only.
3. In a new tab of your browser, type: https://<YourTenantName>.sharepoint.com
4. Click Documents to open the document library for this site. If you’re prompted for a new list experience tour,
click Next until it’s finished.
5. Click Upload > Files and select the IBANs.docx you created in step 2.

Phase 3: Demonstrate data discovery


In this phase, you demonstrate search to find the document created and stored in Phase 2, based on its content
containing IBANs.
1. From the Security & Compliance tab, click Home, and then click Search & investigation > Content
search.
2. Create a new search item by clicking on +.
3. In a new window, provide the following information:
a. Name: IBAN Search
b. Where do you want us to look?: Choose specific sites to search (click +), and then enter the site's URL:
https://<YourTenantName>.sharepoint.com/
c. Click Add, and then click OK. If you see a Warning, click OK.
d. Click Next on a New search window.
e. For What do you want us to look for?: SensitiveType:"International Banking Account Number
(IBAN )", and then click Search.
4. Make sure you see at least one item listed in the IBAN Search results.

Phase 4: Create a custom sensitive information type via PowerShell


In this phase, you create a custom sensitive information type for the fictional Contoso Corporation using Microsoft
PowerShell. Contoso uses a Contoso Customer Number (CCN ) to identify each customer in their customer
database. A CCN consists of the following structure:
Two digits to represent the year that the record was created.
Contoso was founded in 2002; therefore, the earliest possible value would be 02.
Three digits to represent the partner agency that created the record.
Possible agency values range from 000 to 999.
An alphabetic character to represent the line of business.
Possible values are a-z and should be case insensitive.
A four-digit serial number.
Possible serial number values range from 0000 to 9999.
Contoso always refers to customers by using a CCN in internal correspondence, external correspondence,
documents, and other forms. Contoso needs a custom sensitive item type to detect the use of CCNs in Office 365
content so that they may apply protection to the use of this form of personal identifiable information.
1. Use the instructions in Connect to Office 365 Security & Compliance Center PowerShell using multi-factor
authentication and connect to the Security & Compliance Center with UPN of your global administrator
account.
2. Run the following PowerShell commands.

#Create & start search for sample data


$searchName = "Sample Customer Information Search"
$searchQuery = "15080P9562 OR 14040O1119 OR 15020J8317 OR 14050E2330 OR 16050E2166 OR 17040O1118"
New-ComplianceSearch -Name $searchName -SharePointLocation All -ExchangeLocation All -ContentMatchQuery
$searchQuery
Start-ComplianceSearch -Identity $searchName#Create & start search for sample data
$searchName = "Sample Customer Information Search"
$searchQuery = "15080P9562 OR 14040O1119 OR 15020J8317 OR 14050E2330 OR 16050E2166 OR 17040O1118"
New-ComplianceSearch -Name $searchName -SharePointLocation All -ExchangeLocation All -ContentMatchQuery
$searchQuery
Start-ComplianceSearch -Identity $searchName

3. Run the following PowerShell commands and copy the generated GUIDs to an open instance of Notepad on
your computer in the order in which they are listed.

#Generate three unique GUIDs


Write-Host "GUID1 = "([guid]::NewGuid().Guid)
Write-Host "GUID2 = "([guid]::NewGuid().Guid)
Write-Host "GUID3 = "([guid]::NewGuid().Guid)

4. On your local computer, open another instance of Notepad and paste in the following content:
<?xml version="1.0" encoding="utf-8"?>
<RulePackage xmlns="http://schemas.microsoft.com/office/2011/mce">
<RulePack id="GUID1">
<Version major="1" minor="0" build="0" revision="0" />
<Publisher id="GUID2" />
<Details defaultLangCode="en">
<LocalizedDetails langcode="en">
<PublisherName>Contoso Ltd.</PublisherName>
<Name>Contoso Rule Package</Name>
<Description>Defines Contoso's custom set of classification rules</Description>
</LocalizedDetails>
</Details>
</RulePack>
<Rules>
<!-- Contoso Customer Number (CCN) -->
<Entity id="GUID3" patternsProximity="300" recommendedConfidence="85">
<Pattern confidenceLevel="85">
<IdMatch idRef="Regex_contoso_ccn" />
<Match idRef="Keyword_contoso_ccn" />
<Match idRef="Regex_eu_date" />
</Pattern>
</Entity>
<Regex id="Regex_contoso_ccn">[0-1][0-9][0-9]{3}[A-Za-z][0-9]{4}</Regex>
<Keyword id="Keyword_contoso_ccn">
<Group matchStyle="word">
<Term caseSensitive="false">customer number</Term>
<Term caseSensitive="false">customer no</Term>
<Term caseSensitive="false">customer #</Term>
<Term caseSensitive="false">customer#</Term>
<Term caseSensitive="false">Contoso customer</Term>
</Group>
</Keyword>
<Regex id="Regex_eu_date"> (0?[1-9]|[12][0-9]|3[0-1])[\/-](0?[1-9]|1[0-2]|j\x00e4n(uar)?
|jan(uary|uari|uar|eiro|vier|v)?|ene(ro)?|genn(aio)? |feb(ruary|ruari|rero|braio|ruar|br)?
|f\x00e9vr(ier)?|fev(ereiro)?|mar(zo|o|ch|s)?|m\x00e4rz|maart|apr(ile|il)?|abr(il)?|avril |may(o)?
|magg(io)?|mai|mei|mai(o)?|jun(io|i|e|ho)?|giugno|juin|jul(y|io|i|ho)?|lu(glio)?|juil(let)?|ag(o|osto)?
|aug(ustus|ust)?|ao\x00fbt|sep|sept(ember|iembre|embre)?|sett(embre)?|set(embro)?|oct(ober|ubre|obre)?
|ott(obre)?|okt(ober)?|out(ubro)? |nov(ember|iembre|embre|embro)?|dec(ember)?|dic(iembre|embre)?
|dez(ember|embro)?|d\x00e9c(embre)?)[ \/-](19|20)?[0-9]{2}</Regex>
<LocalizedStrings>
<Resource idRef="GUID3">
<Name default="true" langcode="en-us">Contoso Customer Number (CCN)</Name>
<Description default="true" langcode="en-us">Contoso Customer Number (CCN) that looks for additional
keywords and EU formatted date</Description>
</Resource>
</LocalizedStrings>
</Rules>
</RulePackage>

5. Replace the values of GUID1, GUID2, and GUID3 in the XML text of step 4 with their values from step 3,
and then save the contents on your local computer with the name ContosoCCN.xml.
6. Fill in the path to your ContosoCCN.xml file and run the following commands.

#Create new Sensitive Information Type


$path="<path to the ContosoCCN.xml file, such as C:\Scripts\ContosoCCN.xml>"
New-DlpSensitiveInformationTypeRulePackage -FileData (Get-Content -Path $path -Encoding Byte -ReadCount
0)

7. From the Security & Compliance tab, click Classifications > Sensitive information types. You should see
the Contoso Customer Number (CCN ) in the list.

Phase 5: Demonstrate data protection


Protection of personal information in Office 365 includes using data loss prevention (DLP ) capabilities. With DLP
policies in the Office 365 Security & Compliance Center, you can automatically protect sensitive information across
Office 365.
There are multiple ways you can apply the protection. Educating and raising awareness to where EU resident data
is stored in your environment and how your employees are permitted to handle it represents one level of
information protection using Office 365 DLP.
In this phase, you create a new DLP policy and demonstrate how it gets applied to the IBANs.docx file you stored in
SharePoint Online in Phase 2 and when you attempt to send an email containing IBANs.
1. From the Security & Compliance tab of your browser, click Home.
2. Click Data loss prevention > Policy.
3. Click + Create a policy.
4. In Start with a template or create a custom policy, click Custom > Custom policy > Next.
5. In Name your policy, provide the following details and then click Next: a. Name: EU Citizen PII Policy b.
Description: Protect the personally identifiable information of European citizens
6. In Choose locations, select All locations in Office 365. This will include content in Exchange email and
OneDrive and SharePoint documents. And then click Next.
7. In Customize the type of content you want to protect, click Find content that contains: and then click
Edit.
8. In Choose the types of content to protect, click Add > Sensitive info types.
9. In Sensitive info types, click + Add.
10. In Sensitive info types, search for IBAN, select the check box for International Banking Account Number
(IBAN ), and then click Add.
11. Confirm that the International Banking Account Number (IBAN ) sensitive information type was added,
and then click Done.
12. In Content contains, confirm that the sensitive information types were added and then click Save.
13. In Customize the type of content you want to protect, confirm Find content that contains: contains the
International Banking Account Number (IBAN ), and then click Next.
14. In Detect when content that's being shared contains:, change the value from 10 to 1, and then click Next.
15. In Do you want to turn on the policy or test things out first?, choose the following settings, and then click
Next.
a. Select the option for I'd like to test it out first
b. Select the check box for Show policy tips while in test mode
16. In Review your settings, click Create after reviewing the settings. NOTE: After you create a new DLP policy, it
will take a while for it to take effect.
17. On your local computer, open a private instance of your browser.
18. In the address bar, type https://<YourTenantName>.sharepoint.com and sign in using your global
administrator account.
19. Click Documents.
20. Click the file named ‘IBANs.docx’. You should see ‘Policy tip for IBANs.docx’. The IBANs.docx file was shared
with external recipients, which violates the DLP policy.
21. In the address bar, type: https://outlook.office365.com
22. Click New - Email message and provide the following:
To: <a personal email address>
Subject: GDPR Test
Body: Copy in the table of values shown below.
NUMBER COUNTRY CODE IBAN

1 Austria SEPA AT AT61190430023457320


1

2 Bulgaria SEPA BG BG80BNBG9661102034


5678

3 Denmark SEPA DK DK5000400440116243

4 Finland SEPA FI FI2112345600000785

5 France SEPA FR FR14200410100505000


13M02606

6 Germany SEPA DE DE89370400440532013


000

7 Greece SEPA GR GR16011012500000000


12300695

8 Italy SEPA IT GR16011012500000000


12300695

9 Netherlands SEPA NL NL91ABNA0417164300

10 Poland SEPA PL PL27114020040000300


201355387

Note:- This sample data set is derived from publicly available information and is intended to be used for test
purposes only.
23. You will see that the DLP policy recognized that body of the email contains IBANs and provides you with the
policy tip at the top of the message window.
24. Close the private instance of your browser.

Phase 6: Demonstrate reporting


In this phase, you demonstrate Office 365 reporting based on the DLP policy configured in Phase 5.
1. From the Security & Compliance tab of your browser, click Home.
2. Click Reports > Dashboard > DLP policy matches.
3. Your DLP policy helps identify and protect organization's sensitive information. For example, in the report you
will see that the policy identified the document that contains IBANs stored in SharePoint Online.

See Also
Office 365 Information Protection for GDPR
GDPR for Microsoft 365
GDPR for Office on-premises Servers
8/28/2018 • 2 minutes to read • Edit Online

The General Data Protection Regulation (GDPR ) introduces requirements for organizations to protect personal
data and respond appropriately to data subject requests. This series of articles provides recommended approaches
for on-premises workloads:
SharePoint Server
Exchange Server
Skype for Business Server
Project Server
Office Web Apps Server and Office Online Server
On-premises file shares
For more information about the GDPR and how Microsoft can help you, see the Microsoft Trust Center.
Before doing any work with on-premises data, consult with your legal and compliance teams to seek guidance and
to learn about existing classification schemas and approaches to working with personal data. Microsoft provides
recommendations for developing and extending classifications schemas in the Microsoft GDPR Data Discovery
Toolkit at http://aka.ms/gdprpartners. This toolkit also describes approaches for moving on-premises data to the
cloud where you can use more sophisticated data governance capabilities, if this is desired. The articles in this
section provide recommendations for data that is intended to remain on premises.
The following illustration lists recommended capabilities to use across each of these workloads to discover, classify,
protect, and monitor personal data. See the articles in this section for more information.
Illustration description
For accessibility, the following table provides the same examples in the illustration.

WINDOWS SERVER SHAREPOINT SKYPE FOR


FILE SHARES SERVER EXCHANGE SERVER BUSINESS PROJECT SERVER

Discover Azure Search Center or Exchange Exchange SQL scripts for


Information eDiscovery (after eDiscovery Portal eDiscovery portal discovery and
Protection data is classified); exporting
scanner* Azure
Information
Protection
scanner*

Classify Azure Azure Exchange Exchange


Information Information retention tags retention tags
Protection Protection and retention and retention
scanner*; Office scanner*; Office policies policies
365 sensitive 365 sensitive
information types information types

Protect Exchange Server Exchange Server


data loss data loss
prevention rules; prevention rules;
Permissions, IRM integration
IRM-protection with Exchange
for libraries Server

Monitor Integrate logs Integrate logs Integrate logs Integrate logs Integrate logs
with SIEM tools with SIEM tools with SIEM tools with SIEM tools with SIEM tools
*Note that protection encrypts the file. Consequently, SharePoint Server can’t find the sensitive information types
in protected files.
GDPR for SharePoint Server
8/28/2018 • 9 minutes to read • Edit Online

As part of safeguarding personal information, we recommend the following:


Classify your data, using Azure Information Protection.
Run SharePoint Server in a least-privileged configuration. See Plan for least-privileged administration in
SharePoint Server and Security for SharePoint Server for more information.
Enable BitLocker encryption on your servers .

User Generated content


The basic recommended approach for user generated content contained in SharePoint Server sites and libraries is:
Use Azure Information Protection to label sensitive data.
Use SharePoint Server search and eDiscovery to retrieve sensitive data.
The recommended approach for files shares and SharePoint sites and libraries includes these steps:
1. Install and configure Azure Information Protection scanner.
Decide which sensitive data types to use.
Specify which SharePoint sites to use.
2. Complete a discovery cycle.
Run the scanner in discovery mode and validate the findings.
If needed, optimize the conditions and sensitive information types.
Assess the expected impact of automatically applying labels.
3. Run the Azure Information Protection scanner to apply labels to qualifying documents.
4. For protection:
a. Configure Exchange data loss prevention rules to protect documents with the desired label.
b. Be sure permissions to limit who can access files.
c. For SharePoint, use IRM -protection for libraries.
5. For monitoring, integrate Windows Server logs with a SIEM tool.
a. To find personal data for data subject requests, use Search Center or eDiscovery.
When applying labels to sensitive data, be sure to use a label that is not configured with protection. Protection
includes encryption which prevents services from detecting sensitive data in the files.
For more information on using Azure Information Protection scanner to find and label personal data, see the
Microsoft GDPR Data Discovery Toolkit (http://aka.ms/gdprpartners).
For information on configuring the scanner for conditions and using the Office 365 data loss prevention (DLP )
sensitive information types, see How to configure conditions for automatic and recommended classification for
Azure Information Protection. Note that new Office 365 sensitive information types will not be immediately
available to use with the scanner and custom sensitive information types cannot be used with the scanner.

Removing personal information from Office files


Removing personal information (such as metadata or comments in a Word document) from Office files that are
stored in a SharePoint document library must be done manually. Follow these steps:
1. Download a copy of the document from SharePoint Server to your local disk.
2. Delete the document from the SharePoint document library.
3. Follow the steps in Remove hidden data and personal information by inspecting documents.
4. Upload the document back to the SharePoint document library.

Telemetry and log files


ULS Logs
Unified Logging Service (ULS ) and Usage logging in SharePoint Server track a variety of system functions and can
contain user information. ULS logs and usage logs are text files and can be searched using a variety of searching
tools. The Merge-SPLogFile PowerShell cmdlet provides a way to return records from the ULS logs on multiple
servers in a farm.
Consider setting log retention policies to the minimum value needed for your business purposes. For information
about configuring logging in SharePoint Server, see Configure diagnostic logging in SharePoint Server.
Note that some system events are also logged to the Windows Event Log.
Usage Database
The SharePoint Server Usage database (default name WSS_Logging) contains a subset of the information found
in the ULS logs. The maximum retention of data in this database is 30 days. We recommend that you configure it
for the shortest duration allowable by your business needs. For more information, see Configure diagnostic
logging in SharePoint Server.

Personal information and search


The search query history and usage records contain references to user names.
Query history and favorite queries
In SharePoint Server, query histories and ‘favorite’ queries automatically expire after 365 days. If a user leaves
your organization, it is possible to remove references to a user's name from the query history using the steps
below.
The following SQL queries apply to SharePoint Server and make it possible to:
Export a user’s query history or favorite queries
Remove references to user names in the query history
Export a user’s queries since a specific date
Use the following procedure to export queries from the Link Store query log tables, performed by @UserName
since @StartTime.
[In dbo].[LinkStore_<ID>]:
CREATE PROCEDURE proc_MSS_GetQueryTermsForUser
(
@UserName nvarchar(256),
@StartTime datetime
)
AS
BEGIN
SET NOCOUNT ON;
SELECT searchTime, queryString
FROM
dbo.MSSQLogPageImpressionQuery
WITH
(NOLOCK)
WHERE
userName = @UserName AND
searchTime > @StartTime
END
GO

Export a user’s queries from the past 100 days

DECLARE @FROMDATE datetime


SET @FROMDATE = DATEADD(day, -100, GETUTCDATE())
EXECUTE proc_MSS_GetQueryTermsForUser '0#.w|domain\username', @FROMDATE

Export a user’s favorite queries


Use the following procedure to export a user's favorite queries from the Search Admin DB personal result tables,
performed by @UserName, since .

In [dbo].[Search_<ID>]:
CREATE PROCEDURE proc_MSS_GetPersonalFavoriteQueries
(
@UserName nvarchar(256),
@SearchTime datetime
)
AS
BEGIN
SET NOCOUNT ON;
SELECT max(queries.SearchTime) as SearchTime,
max(queries.querystring) as queryString,
max(url.url) as URL
FROM MSSQLogOwner owners WITH(NOLOCK)
JOIN MSSQLogPersonalResults results WITH(NOLOCK) on owners.OwnerId = results.OwnerId
JOIN MSSQLogUrl url WITH(NOLOCK) on results.ClickedUrlId = url.urlId
JOIN MSSQLogPersonalQueries queries WITH(NOLOCK) on results.OwnerId = queries.OwnerId
WHEREqueries.SearchTime > @SearchTime
AND queries.UserName = @UserName
GROUP BY queries.QueryString,url.url
END
GO

Export a user’s favorite queries from the past 100 days

DECLARE @FROMDATE datetime


SET @FROMDATE = DATEADD(day, -100, GETUTCDATE())
EXECUTE proc_MSS_GetPersonalFavoriteQueries '0#.w|domain\username', @FROMDATE

Remove references to user names that are more than X days old
Use the following procedure to remove references to all user names that are more than @Days old, from the Links
Store query log tables. The procedure only removes references backwards in time until it reaches the
@LastCleanupTime.

In [dbo].[LinksStore_<ID>]:
CREATE PROCEDURE proc_MSS_QLog_Cleanup_Users
(
@LastCleanupTime datetime,
@Days int
)
AS
BEGIN
DECLARE @TooOld datetime
SET @TooOld = DATEADD(day, -@Days, GETUTCDATE())
DECLARE @FromLast datetime
SET @FromLast = DATEADD(day, -@Days, @LastCleanupTime)
BEGIN TRANSACTION
UPDATE MSSQLogPageImpressionQuery
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld
UPDATE MSSQLogO14PageClick
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld
COMMIT TRANSACTION
END
GO

Remove references to a specific user name that’s more than X days old
Use the following procedure to remove references to a specific user name from the Links Store query log tables,
where the references are more than @Days old. The procedure only removes references backwards in time until it
reaches the @LastCleanupTime.

In [dbo].[LinksStore_<ID>]:
CREATE PROCEDURE proc_MSS_QLog_Cleanup_Users
(
@UserName nvarchar(256),
@LastCleanupTime datetime,
@Days int
)
AS
BEGIN
DECLARE @TooOld datetime
SET @TooOld = DATEADD(day, -@Days, GETUTCDATE())
DECLARE @FromLast datetime
SET @FromLast = DATEADD(day, -@Days, @LastCleanupTime)
BEGIN TRANSACTION
UPDATE MSSQLogPageImpressionQuery
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld AND userName = @UserName
UPDATE MSSQLogO14PageClick
SET userName = 'NA'
WHERE @FromLast <= searchTime AND searchTime < @TooOld AND userName = @UserName
COMMIT TRANSACTION
END
GO

Remove references to all user names in the query history from a date and up to the past 30 days

EXECUTE proc_MSS_QLog_Cleanup_Users '1-1-2017', 30

Delete usage records


SharePoint Server automatically deletes usage records after 3 years. You can manually delete such records using
the procedure below:
To delete all usage records associated with deleted documents:
1. Ensure that you have the latest SharePoint update installed.
2. Start a SharePoint Management shell.
3. Stop and Clear the Usage Analytics analysis:

$tj = Get-SPTimerJob -Type Microsoft.Office.Server.Search.Analytics.UsageAnalyticsJobDefinition


$tj.StopAnalysis()
$tj.ClearAnalysis()

4. Wait for the analysis to start again (might take up to 24 hours).


5. On the next run of the analysis, it will dump all records from the Analytics Reporting database. This full
dump may take a while for a large database with many entries.
6. Wait for 10 days. The analysis runs daily, and records associated with deleted documents will be removed
after the 10^th^ run. This run may take longer than normal if many records need to be deleted.
Personal information and search in SharePoint Server 2010
FAST Search Server 2010 for SharePoint
In addition to storing files in the index, the FAST Search Server 2010 Add-On also stores files in an intermediate
format called FixML. FiXML files are compacted regularly, by default between 3 am and 5 am every night.
Compaction removes deleted files from the FiXML files automatically. To ensure timely removal of information
belonging to deleted users or documents, ensure that compaction is always enabled.
Hybrid Search
The recommended actions for hybrid search solutions are the same as for search in SharePoint Server or
SharePoint Online. There are two hybrid search solutions:
The cloud hybrid search solution - With the cloud hybrid search solution for SharePoint, you index all your
crawled content, including on-premises content, in your search index in Office 365. When users query your search
index in Office 365, they get search results from both on-premises and Office 365 content. When documents are
deleted from the SharePoint Server environment, they are also deleted from the search index in Office 365. Read
more about the cloud hybrid search solution and how search components and databases interact in cloud hybrid
search to understand better how GDPR affects the hybrid environment.
The hybrid federated search solution - With the hybrid federated search solution, you use both your index in
SharePoint Server and your index in Office 365. Both SharePoint Server and SharePoint Online Search services
can query the search index in the other environment and return federated results. When users search from a
Search Center, the search results come from both your search index in SharePoint Server and your search index in
Office 365. Read more about the hybrid federated search solution to understand better how GDPR affects the
hybrid environment.

On Prem to Cloud Migrations


While migrating data from SharePoint Server to SharePoint Online, duplicate data may exist in both locations for a
time. If you have data that you need to delete that is in mid-migration, we recommend that you complete the
migration first, and then delete the data from both locations. You can query data for export from either location.

User Profile data


The User Profile Service allows for import of profile data from a variety of external sources. Queries for and
update of such user profile data should be handled in the systems in which the data is mastered. If you make
updates to the external system, be sure to synchronize the user profiles in SharePoint Server again.
Follow these basic steps to remove a user’s personal information from their SharePoint Server user profile:
1. Remove the user information from any external systems that feed into the SharePoint Server user profile. If
you are using directory synchronization, the user must be removed from the on-premises Active Directory
environment.
2. Run a profile synchronization on SharePoint Server.
3. Delete the profile from SharePoint Server. Once this is done, SharePoint Server will fully remove the profile
from the User Profile Database in 30 days. The user’s profile page and personal site will be deleted.
After deleting a user’s profile, some limited information (such as user ID ) may still be recorded in site collections
that the user has visited. If you choose to delete this data from a given site collection, this can be done using
CSOM. A sample script is provided below:

$username = "<admin@company.sharepoint.com>"
$password = "password"
$url = "<https://site.sharepoint.com>"
$securePassword = ConvertTo-SecureString $Password -AsPlainText -Force

# the path here may need to change if you used e.g. C:Lib.
Add-Type -Path "c:\Program Files\Common Files\microsoft shared\Web Server
Extensions\16ISAPIMicrosoft.SharePoint.Client.dll"
Add-Type -Path "c:\Program Files\Common Files\microsoft shared\Web Server
Extensions\16ISAPIMicrosoft.SharePoint.Client.Runtime.dll"

# connect/authenticate to SharePoint Online and get ClientContext object.


$clientContext = New-Object Microsoft.SharePoint.Client.ClientContext($url)
$credentials = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($username, $securePassword)
$clientContext.Credentials = $credentials
if (!$clientContext.ServerObjectIsNull.Value)
{
Write-Host "Connected to SharePoint Online site: '$Url'" -ForegroundColor Green
}

# Get user
$user = $clientContext.Web.SiteUsers.GetByLoginName("i:0#.f|membership|user@company.sharepoint.com")

# Redact user
$user.Email = "Redacted"
$user.Title = "Redacted"
$user.Update()
$clientContext.Load($user)
$clientContext.ExecuteQuery()

# Get users
$users = $clientContext.Web.SiteUsers

# Remove user from site


$users.RemoveById($user.Id)
$clientContext.Load($users)
$clientContext.ExecuteQuery()
GDPR for Exchange Server
8/28/2018 • 4 minutes to read • Edit Online

As part of safeguarding personal information, we recommend the following:


Use Retention Tags and Policies in Exchange Server to implement an email life cycle policy.
Deploy Information Rights Management to limit who has access to information stored in Exchange Server.
Enable BitLocker encryption on your servers.

Identifying In-scope Content


Exchange uses two primary storage repositories for end user generated content: mailboxes and public folders.
Content stored in an individual user’s mailbox is uniquely associated to that user and represents their default
repository within Exchange. The data stored in a user mailbox includes content created using Outlook, Outlook on
the web (formerly known as Outlook Web App), Exchange ActiveSync, Skype for Business clients and other third-
party tools that connect to Exchange servers using POP, IMAP or Exchange Web Services (EWS ). Examples of
these items include: messages, calendar items (meetings and appointments), contacts, notes and tasks. Deleting an
individual user’s mailbox removes content generated by or sent directly to the user in the context of their mailbox.
You can delete user mailboxes by using the Exchange admin center (EAC ) or the Remove-Mailbox cmdlet in the
Exchange Management Shell.
Note: The Permanent parameter on the Remove-Mailbox cmdlet should be used with caution as the data will not
be recoverable if this option is used.
Exchange also provides shared mailboxes that allow one or more users access to send and receive content that’s
stored in a common mailbox. The shared mailbox is a unique entity that’s not associated with a single account.
Instead, multiple users are granted access to send, receive and review email content in the shared mailbox. Shared
mailboxes are administered using the Exchange admin center and the same cmdlets used to manage regular user
mailboxes. If you need to remove individual messages from a mailbox, there are different options available
depending upon the version of Exchange. In Exchange Server 2010 and 2013, you can use the Search-Mailbox
cmdlet with the DeleteContent parameter to identify and remove messages from a mailbox. In Exchange Server
2016 and later, you need to use the New -ComplianceSearch functionality.
Public folders are a shared storage implementation that’s not associated with a specific user. Instead, users are
granted access to public folders to generate content. The actual implementation of public folders varies depending
upon the version of Exchange (Exchange Server 2010 uses a different implementation than Exchange Server 2013
and later). Limited tools exist to manage the content in public folders. Client tools (for example, Outlook) are the
primary mechanism for managing content in public folders. There are cmdlets for managing public folder objects,
but not for managing individual content items within the public folder. A custom script that leverages Exchange
Web Services (EWS ) or other third-party tools will likely be needed to manage individual public folder items.
The primary requirement will likely be managing individual user mailbox content. This requirement will be easily
addressed through the graphical or cmdlet-based tools that you regularly use to manage mailboxes. If you need to
process content across multiple mailboxes or types of resources, eDiscovery is the preferred mechanism within
Exchange to identify in-scope content.

Deleted Item Retention


When you delete individual messages or items from a mailbox (not the entire mailbox or public folder resource
itself) the content is retained in a recoverable form based on the value of the DeletedItemRetention parameter for
the mailbox database or public folder database. The default value is 14 days, but this value is configurable by an
Exchange administrator.

Removing Soft-Deleted and Disconnected Mailboxes


When an Exchange mailbox is disabled, deleted or moved between databases (for example, as a part of load
balancing), the mailbox is placed into a disabled, soft-deleted or disconnected state depending on the operation.
While the mailbox is in any of these states, Exchange maintains the mailbox (which includes its contents) based on
the current value of the MailboxRetention parameter that’s specified on the mailbox database. The default value is
30 days, but this value is configurable by an Exchange administrator. You can use the Remove-StoreMailbox cmdlet
to force Exchange to permanently remove (purge) all data associated with a mailbox prior to the retention period
expiring naturally.

IMPORTANT
Use the Remove-StoreMailbox cmdlet with caution as it results in an unrecoverable loss of data for the target mailbox.

On-Prem to Cloud Migrations


While migrating data from Exchange Server to Exchange Online, migrated data may continue to reside on the
source on-premises Exchange Server in a form that’s recoverable by an Exchange administrator. By default, this
data will be automatically removed from the database within 30 days (see the Removing Soft-Deleted and
Disconnected Mailboxes section above).

Automatic Data Collection Reported to Microsoft by Exchange Server


Exchange Servers deployed in on-premises environments do not provide any type of automated reporting or end
user data capture to Microsoft. Exchange Servers that have Watson crash dump reporting enabled in the Windows
Operating System may receive limited contents of memory at the time the crash report is produced.
GDPR for Skype for Business Server and Lync Server
8/28/2018 • 2 minutes to read • Edit Online

Most Skype for Business Server and Lync Server data is stored in Exchange Server. This includes:
Conversation history
Voicemail notifications and transcriptions
Meeting invites
Use the procedures outlined for GDPR for Exchange Server to find, export, or delete these types of data for GDPR
requests.
Contact lists are stored in the SQL Server database. They can be exported in the following ways:
End users themselves can export the contacts by right clicking the group header and selecting Copy. This
will copy all the contacts in that group into the clipboard, which can then be pasted into any app.
You can use the Export-CsUserData cmdlet to export this data.
Content uploaded into meetings (such as PowerPoint files or handouts) or content generated in a meeting (such as
whiteboard, polls, or Q/A) is stored in the filer. This can also be exported if end users log back into any meeting
that has not expired and download any uploaded content or take screenshots in the case of generated content.
MeetNow meetings that are not in the Exchange Calendar and Contact List and contact rights (family, co-worker,
etc.) are in the User Database. In Lync Server 2013 and later, you can use the Export-CsUserData cmdlet to export
this data.
GDPR for Project Server
8/28/2018 • 2 minutes to read • Edit Online

Project Server uses custom scripts to export and redact user data in Project Web App. The basic process is:
1. Find the Project Web App sites in your farm.
2. Find the projects in each site that contain the user.
3. Export and review the types of data that you want to review.
4. Redact data as needed.
These steps are covered in detail in the following articles:
Export user data from Project Server
Delete user data from Project Server
Note that Project Server is built on top of SharePoint Server and logs events to the SharePoint ULS logs and
Usage database. See GDPR for SharePoint Server for more information.
GDPR for Office Web Apps Server and Office Online
Server
8/28/2018 • 2 minutes to read • Edit Online

Office Online Server and Office Web Apps Server telemetry data is stored in the form of ULS logs. You can use
ULS Viewer to view ULS logs from your on-premises tenant.
Every log line contains a CorrelationID. Related log lines share the same CorrelationID. Each CorrelationID is tied
to a single SessionID, and one SessionID may be related to many CorrelationIDs. Each SessionID may be related
to a single UserID, although some sessions can be anonymous and therefore not have an associated UserID. In
order to determine what data is associated with a particular user, it is therefore possible to map from a single
UserID to the SessionIDs associated with that user, from those SessionIDs to the associated CorrelationIDs, and
from those CorrelationIDs to all the logs in those correlations. See the below diagram for the relationship between
the different IDs.

Gathering Logs
In order to gather all logs associated with UserID 1, for example, the first step would be to gather all sessions
associated with UserID 1 (i.e. SessionID 1 and SessionID2). The next step would be to gather all correlations
associated with SessionID 1 (i.e. CorrelationIDs 1, 2, and 3) and with SessionID 2 (i.e. CorrelationID 4). Finally,
gather all logs associated with each of the correlations in the list.
1. Launch UlsViewer
2. Open up the uls log corresponding to the intended timeframe; ULS logs are stored in
%PROGRAMDATA%\Microsoft\OfficeWebApps\Data\Logs\ULS
3. Edit | Modify Filter
4. Apply a filter that is:
EventID equals apr3y Or
EventID equals bp2d6
5. Hashed UserIds will be in the Message of either one of these two events
6. For apr3y, the Message will contain a UserID value and a PUID value
7. For bp2d6, the Message will contain quite a bit of information. The LoggableUserId Value field is the hashed
UserID.
8. Once the hashed UserId is obtained from either of these two tags, the WacSessionId value of that row in
ULSViewer will contain the WacSessionId associated with that user
9. Collect all of the WacSessionId values associated with the user in question
10. Filter for all EventId equals "xmnv", Message equals "UserSessionId=<WacSessionId>" for the first
WacSessionId in the list (replacing the <WacSessionId> part of the filter with your WacSessionId)
11. Collect all values of Correlation that match that WacSessionId
12. Repeat steps 10-11 for all values of WacSessionId in your list for the user in question
13. Filter for all Correlation equals the first Correlation in your list
14. Collect all logs matching that Correlation
15. Repeat steps 13-14 for all values of Correlation in your list for the user in question

Types of Data
Office Online logs contain a variety of different types of data. The following are examples of the data that ULS logs
may contain:
Error codes for issues encountered during use of the product
Button clicks and other pieces of data about app usage
Performance data about the app and/or particular features within the app
General location information about where the user’s computer is (e.g. country / region, state, and city,
derived from the IP address), but not precise geolocation
Basic metadata about the browser, e.g. browser name and version, and the computer, e.g. OS type and
version
Error messages from the document host (e.g. OneDrive, SharePoint, Exchange)
Information about processes internal to the app, unrelated to any action the user has taken
GDPR for on-premises Windows Server file shares
8/28/2018 • 2 minutes to read • Edit Online

The basic recommended approach for file shares is:


Use Azure Information Protection to label sensitive data.
Use Azure Information Protection scanner to find data.
The recommended approach for files shares includes these steps:
1. Install and configure Azure Information Protection scanner.
Decide which sensitive data types to use.
Specify local folders and network shares to use.
2. Complete a discovery cycle.
Run the scanner in discovery mode and validate the findings.
If needed, optimize the conditions and sensitive information types.
Assess the expected impact of automatically applying labels.
3. Run the Azure Information Protection scanner to apply labels to qualifying documents.
4. For protection:
Configure Exchange data loss prevention rules to protect documents with the desired label.
Be sure to use permissions to limit who can access files.
5. For monitoring, integrate Windows Server logs with a SIEM tool.
To find personal data for data subject requests, use Azure Information Protection scanner. You can also
configure SharePoint Server search to crawl file shares.
For more information on using Azure Information Protection scanner to find and label personal data, see the
Microsoft GDPR Data Discovery Toolkit at http://aka.ms/gdprpartners.
For information on configuring the scanner for conditions and using the Office 365 data loss prevention (DLP )
sensitive information types, see How to configure conditions for automatic and recommended classification for
Azure Information Protection. Note that new Office 365 sensitive information types will not be immediately
available to use with the scanner and custom sensitive information types cannot be used with the scanner.
Office 365 Security Incident Response
10/10/2018 • 2 minutes to read • Edit Online

Summary: This solution tells you what the indicators are for the most common cyber-security attacks in Office
365, how to positively confirm any given attack, and how to respond to it.

Overview
Not all cyber attacks can be thwarted. Attackers are constantly looking for new weaknesses in your defensive
strategy or they are exploiting old ones. Knowing how to recognize an attack allows you to respond to it faster,
which shortens the duration of the security incident.
This series of article helps you understand what a particular type of attack might look like in Office 365 and gives
you steps you can take to respond. They are quick entry points to understanding:
What the attack is and how it works.
What signs, called indicators of compromise (IOC ), to look for and how to look for them.
How to positively confirm the attack.
Steps to take to cut off the attack and better protect your organization in the future.
Links to in-depth information on each attack type.
Check back here monthly as more articles will be added over time.

Detect and remediate articles


Detect and Remediate Illicit Consent Grants in Office 365
Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365

Incident response articles


Responding to a Compromised Email Account in Office 365

Secure Office 365 like a cybersecurity pro


Your Office 365 subscription comes with a powerful set of security capabilities that you can use to protect your
data and your users. Use the Office 365 security roadmap: Top priorities for the first 30 days, 90 days, and beyond
to implement Microsoft recommended best practices for securing your Office 365 tenant.
Tasks to accomplish in the first 30 days. These have immediate affect and are low -impact to your users.
Tasks to accomplish in 90 days. These take a bit more time to plan and implement but greatly improve your
security posture
Beyond 90 days. These enhancements build in your first 90 days work.
Detect and Remediate Illicit Consent Grants in Office
365
12/3/2018 • 7 minutes to read • Edit Online

Summary Learn how to recognize and remediate the illicit consent grants attack in Office 365.

What is the illicit consent grant attack in Office 365?


In an illicit consent grant attack, the attacker creates an Azure-registered application that requests access to data
such as contact information, email, or documents. The attacker then tricks an end user into granting that
application consent to access their data either through a phishing attack, or by injecting illicit code into a trusted
website. After the illicit application has been granted consent, it has account-level access to data without the need
for an organizational account. Normal remediation steps, like resetting passwords for breached accounts or
requiring Multi-Factor Authentication (MFA) on accounts, are not effective against this type of attack, since these
are third-party applications and are external to the organization. These attacks leverage an interaction model which
presumes the entity that is calling the information is automation and not a human.

What does an illicit consent grant attack look like in Office 365?
You need to search the Office 365 audit log to find signs, also called Indicators of Compromise (IOC ) of this
attack. For organizations with many Azure-registered applications and a large user base, the best practice is to
review your organizations consent grants on a weekly basis.
Steps for finding signs of this attack
1. Open the Security and Compliance Center in your Office 365 tenant.
2. Navigate to the Search & investigation node and select audit log search.
3. Create a search (all activities and all users) and filter the results for Consent to application, and Add
OAuth2PermissionGrant.
4. Examine the Extended Properties and check to see if IsAdminContent is set to True.
If this value is true, it indicates that someone with Global Administrator access may have granted broad access to
data. If this is unexpected, take steps to confirm an attack.

How to confirm an attack


If you have one or more instances of the IOCs listed above, you need to do further investigation to positively
confirm that the attack occurred. You can use any of these three methods to confirm the attack.
Inventory applications and their permissions using the Azure Active Directory portal. This method is thorough,
but you can only check one user at a time which can be very time consuming if you have many users to check.
Inventory applications and their permissions using PowerShell. This is the fastest and most thorough method,
with the least amount of overhead.
Have your users individually check their apps and permissions and report the results back to the administrators
for remediation.

Inventory apps with access in your organization


You can do this for your users with either the Azure Active Directory Portal, or PowerShell or have your users
individually enumerate their application access.
Steps for using the Azure Active Directory Portal
You can look up the applications to which any individual user has granted permissions by using the Azure Active
Directory Portal.
1. Sign in to the Azure Portal with administrative rights.
2. Select the Azure Active Directory blade.
3. Select Users.
4. Select the user that you want to review.
5. Select Applications.
This will show you the apps that are assigned to the user and what permissions the applcations have.
Steps for having your users enumerate their application access
Have your users go to https://myapps.microsoft.com and review their own application access there. They should be
able to see all the apps with access, view details about them (including the scope of access), and be able to revoke
privileges to suspicious or illicit apps.
Steps for doing this with PowerShell
The simplest way to verify the Illicit Consent Grant attack is to run Get-AzureADPSPermissions.ps1, which will
dump all the OAuth consent grants and OAuth apps for all users in your tenancy into one .csv file.
Pre-requisites
The Azure AD PowerShell library installed.
Global administrator rights on the tenant that the script will be run against.
Local Administrator on the computer from which will run the scripts.

IMPORTANT
We highly recommend that you require multi-factor authentication on your administrative account. This script supports MFA
authentication.

1. Sign in to the computer that you will run the script from with local administrator rights.
2. Download or copy the Get-AzureADPSPermissions.ps1 script from GitHub to a folder from which you will run
the scruipt. This will be the same folder to which the output “permissions.csv” file will be written.
3. Open a PowerShell instance as an administrator and open to the folder you saved the script to.
4. Connect to your directory using the Connect-AzureAD cmdlet.
5. Run this PowerShell command line as follows:
.Get-AzureASPSPermissions.ps1 | Export-csv -path "Permissions.csv" -NoTypeInformation

The script produces one file named Permissions.csv. Follow these steps to look for illicit application permission
grants:
1. In the ConsentType column (column G ) search for the value “AllPrinciples”. The AllPrincipals permission allows
the client application to access everyone’s content in the tenancy. Native Office 365 applications need this
permission to work correctly. Every non-Microsoft application with this permission should be reviewed
carefully.
2. In the Permission column (column F ) review the permissions that each delegated application has to content.
Look for “Read” and “Write” permission or “*.All” permission, and review these carefully because they may not
be appropriate.
3. Review the specific users that have consents granted. If high profile or high impact users have inappropriate
consents granted, you should investigate further.
4. In the ClientDisplayName column (column C ) look for apps that seem suspicious. Apps with misspelled names,
super bland names, or hacker-sounding names should be reviewed carefully.
Determine the scope of the attack
After you have finished inventorying application access, review the Office 365 audit log to determine the full
scope of the breach. Search on the affected users, the time frames that the illicit application had access to your
organization, and the permissions the app had. You can search the audit log in the Office 365 Security and
Compliance Center.

IMPORTANT
Mailbox auditing and Activity auditing for admins and users must have been enabled prior to the attack for you to get this
information.

How to stop and remediate an illicit consent grant attack


After you have identified an application with illicit permissions, you have several ways to remove that access.
You can revoke the application's permission in the Azure Active Directory Portal by:
Navigate to the affected user in the Azure Active Directory User blade.
Select Applications.
Select the illicit application.
Click Remove in the drill down.
You can revoke the OAuth consent grant with PowerShell by following the steps in Remove-
AzureADOAuth2PermissionGrant.
You can revoke the Service App Role Assignment with PowerShell by following the steps in Remove-
AzureADServiceAppRoleAssignment.
You can also disable sign-in for the affected account altogether, which will in turn disable app access to data in
that account. This isn't ideal for the end user's productivity, of course, but if you are working to limit impact
quickly, it can be a viable short-term remediation.
You can turn integrated applications off for your tenancy. This is a drastic step that disables the ability for end
users to grant consent on a tenant-wide basis. This prevents your users from inadvertently granting access to a
malicious application. This isn't strongly recommended as it severely impairs your users' ability to be productive
with third party applications. You can do this by following the steps in Turning Integrated Apps on or off.

Secure Office 365 like a cybersecurity pro


Your Office 365 subscription comes with a powerful set of security capabilities that you can use to protect your
data and your users. Use the Office 365 security roadmap: Top priorities for the first 30 days, 90 days, and beyond
to implement Microsoft recommended best practices for securing your Office 365 tenant.
Tasks to accomplish in the first 30 days. These have immediate affect and are low -impact to your users.
Tasks to accomplish in 90 days. These take a bit more time to plan and implement but greatly improve your
security posture.
Beyond 90 days. These enhancements build in your first 90 days work.

See also:
Unexpected application in my applications list walks administrators through various actions they may want to
take after realizing there are unexpected applications with access to data.
[Integrating applications with Azure Active Directory] (https://docs.microsoft.com/azure/active-directory/active-
directory-apps-permissions-consent) is a high-level overview of consent and permissions. Pay particular
attention to the Overview of the consent framework section.
Problems developing my application provides links to various consent related articles.
Application and service principal objects in Azure Active Directory (Azure AD ) provides an overview of the
Application and Service principal objects that are core to the application model.
Manage access to apps is an overview of the capabilities that administrators have to manage user access to
apps.
Detect and Remediate Outlook Rules and Custom
Forms Injections Attacks in Office 365
8/21/2018 • 12 minutes to read • Edit Online

Summary Learn how to recognize and remediate the Outlook rules and custom Forms injections attacks in Office
365.

What is the Outlook Rules and Custom Forms injection attack?


After an attacker has breached an account in your tenancy and gets in, they're are going to try and establish a way
to stay in or a way to get back in after they are discovered and removed. This is called establishing a persistence
mechanism. Two ways that they can do this are by exploiting Outlook rules or by injecting custom forms into
Outlook. In both cases, the rule or form is synced from the cloud service down to the desktop client, so a full
format and re-install of the client software doesn't eliminate the injection mechanism. This is because when the
Outlook client software reconnects to the mailbox in the cloud it will re-download the rules and forms from the
cloud. Once the rules and forms are in place, the attacker uses them to execute remote or custom code, usually to
install malware on the local machine. The malware then re-steals credentials or performs other illicit activity. The
good news here is that if you keep your clients patched to the latest version, you are not vulnerable to the threat as
current Outlook client defaults block both mechanisms.
The attacks typically follow these patterns:
The Rules Exploit
1. The attacker steals the username and password of one of your users.
2. The attacker then signs in to that users Exchange mailbox. The mailbox can either be in Exchange online or in
Exchange on-premises.
3. The attacker then creates a forwarding rule in the mailbox that is triggered when the mailbox receives an email
that matches the criteria of the rule. The criteria of rule and the contents of the trigger email are tailor-made for
each other.
4. The attacker sends the trigger email to the user who is using their mailbox normally.
5. When the email is received, the rule is triggered. The action of the rule is usually to launch an application on a
remote (WebDAV ) server.
6. The application typically installs malware, such as Powershell Empire, locally on the user’s machine.
7. The malware allows the attacker to re-steal the user’s username and password or other credentials from local
machine and perform other malicious activities.
The Forms Exploit
1. The attacker steals the username and password of one of your users.
2. The attacker then sign in to that users Exchange mailbox. The mailbox can either be in Exchange online or in
Exchange on-premises.
3. The attacker then creates a custom mail form template and inserts it into the user’s mailbox. The custom form
is triggered when the mailbox receives an email that requires the mailbox to load the custom form. The custom
form and the format of email are tailor-made for each other.
4. The attacker sends the trigger email to the user, who is using their mailbox normally.
5. When the email is received, the form is loaded. The form launches an application on a remote (WebDAV ) server.
6. The application typically installs malware, such as Powershell Empire, locally on the user’s machine.
7. The malware allows the attacker to re-steal the user’s username and password or other credentials from local
machine and perform other malicious activities.

What a Rules and Custom Forms Injection attack might look like Office
365?
These persistence mechanisms are unlikely to be noticed by your users and may in some cases even be invisible to
them. This article tells you how to look for any of the seven signs (Indicators of Compromise) listed below. If you
find any of these, you need to take remediation steps.
Indicators of the Rules compromise
Rule Action is to start an application.
Rule References an EXE, ZIP, or URL.
On the local machine, look for new process starts that originate from the Outlook PID.
Indicators of the Custom forms compromise
Custom form present saved as their own message class.
Message class contains executable code.
Usually stored in Personal Forms Library or Inbox folders.
Form is named IPM.Note.[custom name].

Steps for finding signs of this attack and confirming it


You can use either of these two methods to confirm the attack.
Manually examine the rules and forms for each mailbox using the Outlook client. This method is thorough, but
you can only check mailbox user at a time which can be very time consuming if you have many users to check.
It can also result in a breach of the computer that you are running the check from.
Use the Get-AllTenantRulesAndForms.ps1 PowerShell script to automatically dump all the mail forwarding
rules and custom forms for all the users in your tenancy. This is the fastest and safest method with the least
amount of overhead.
Confirm the Rules Attack Using the Outlook client
1. Open the users Outlook client as the user. The user may need your help in examining the rules on their mailbox.
2. Refer to Manage email messages by using rules article for the procedures on how to open the rules interface in
either the 2007, 2010 or 2013 versions of Outlook.
3. Look for rules that the user did not create, or any unexpected rules or rules with suspicious names.
4. Look in the rule description for rule actions that start and application or refer to an .EXE, .ZIP file or to
launching a URL.
5. Look for any new processes that start using the Outlook process ID. Refer to Find the Process ID.
Steps to confirm the Forms attack using the Outlook client
1. Open the user Outlook client as the user.
2. Follow the steps in, Show the Developer tab for the users version of Outlook.
3. Open the now visible developer tab in Outlook and click design a form.
4. Select the Inbox from the Look In list. Look for any custom forms. Custom forms are rare enough that if you
have any custom forms at all, it is worth a deeper look.
5. Investigate any custom forms, especially those marked as hidden.
6. Open any custom forms and in the Form group click View Code to see what runs when the form is loaded.
Steps to confirm the Rules and Forms attack using PowerShell
The simplest way to verify a rules or custom forms attack is to run the Get-AllTenantRulesAndForms.ps1
PowerShell script. This script connects to every mailbox in your tenant and dumps all the rules and forms into two
.csv files.
Pre-requisites
You will need to have a global administrator rights to run the script because the script connects to every mailbox in
the tenancy to read the rules and forms.
1. Sign in to the machine that you will run the script from with local administrator rights.
2. Download or copy the Get-AllTenantRulesAndForms.ps1 script from GitHub to a folder from which you will
run it. The script will create two date stamped files to this folder, MailboxFormsExport-yyyy-mm-dd.csv, and
MailboxRulesExport-yyyy-mm-dd.csv.
3. Open a PowerShell instance as an administrator and open the folder you saved the script to.
4. Run this PowerShell command line as follows .\Get-AllTenantRulesAndForms.ps1 .\Get-
AllTenantRulesAndForms.ps1
Interpreting the output
MailboxRulesExport-yyyy-mm -dd.csv – examine the rules (one per row ) for action conditions that include
applications or executables.
ActionType (column A) – if you see the value “ID_ACTION_CUSTOM”, the rule is likely malicious.
IsPotentiallyMalicious (column D ) – if this value is “TRUE”, the rule is likely malicious.
ActionCommand (column G ) – if this lists an application or any file with a .exe, .zip extension or an entry that
refers to a URL, that is not supposed to be there, the rule is likely malicious.
MailboxFormsExport-yyyy-mm -dd.csv – in general, the use of custom forms is very rare. If you find any in this
workbook, you open that user’s mailbox and examine the form itself. If your organization did not put it there
intentionally, it is likely malicious.

How to stop and remediate the Outlook Rules and Forms attack
If you find any evidence of either of these attacks, remediation is simple, just delete the rule or form from the
mailbox. You can do this with the Outlook client or using remote PowerShell to remove rules.
Using Outlook
1. Identify all the devices that the user has used with Outlook. They will all need to be cleaned of potential
malware. Do not allow the user to sign on and use email until all the devices are cleaned.
2. Follow the steps in Delete a rule for each device.
3. If you are unsure about the presence of other malware, you can format and re-install all the software on the
device. For mobile devices you can follow the manufacturers steps to reset the device to the factory image.
4. Install the most up-to-date versions of Outlook. Remember that the current version of Outlook blocks both
types of this attack by default.
5. Once all offline copies of the mailbox have been removed, reset the user's password (use a high-quality one)
and follow the steps in Setup multi-factor authentication for Office 365 users if MFA has not already been
enabled. This ensures that the user's credentials are not exposed via other means (such as phishing or password
re-use).
Using PowerShell
There are two remote PowerShell cmdlets you can use to remove or disable dangerous rules. Just follow the steps.
Steps for mailboxes that are on an Exchange server
1. Connect to the Exchange server using remote PowerShell. Follow the steps in Connect to Exchange servers
using remote PowerShell.
2. If you want to completely remove a single rule, multiple rules, or all rules from a mailbox use the Remove-Inbox
Rule cmdlet - use this to completely remove one, multiple, or all rules from the mailbox.
3. If you want to retain the rule and its contents for further investigation use the Disable-InboxRule cmdlet.
Steps for mailboxes in Exchange Online
1. Follow the steps in Connect to Exchange Online using PowerShell.
2. If you want to completely remove a single rule, multiple rules, or all rules from a mailbox use the Remove-Inbox
Rule cmdlet.
3. If you want to retain the rule and its contents for further investigation use the Disable-InboxRule cmdlet.

How to minimize future attacks


First: protect your accounts
The Rules and Forms exploits are only used by an attacker after they have stolen or breached one of your user’s
accounts. So, your first step to preventing the use of these exploits against your organization is to aggressively
protect your user accounts. Some of the most common ways that accounts are breached are through phishing or
password spraying attacks.
The best way to protect your user accounts, and especially your administrator accounts, is to set up multi-factor
authentication for Office 365 users. You should also:
1. Monitor how your user accounts are accessed and used. You may not prevent the initial breach, but you will
shorten the duration and the impact of the breach by detecting it sooner. You can use these: Office 365 Cloud
App Security policies to monitor you accounts and alert on unusual activity.
a. Multiple failed login attempts This policy profiles your environment and triggers alerts when users
perform multiple failed login activities in a single session with respect to the learned baseline, which
could indicate an attempted breach.
b. Impossible travel - This policy profiles your environment and triggers alerts when activities are
detected from the same user in different locations within a time period that is shorter than the expected
travel time between the two locations. This could indicate that a different user is using the same
credentials. Detecting this anomalous behavior necessitates an initial learning period of seven days
during which it learns a new user’s activity pattern.
c. Unusual impersonated activity (by user) - This policy profiles your environment and triggers alerts
when users perform multiple impersonated activities in a single session with respect to the baseline
learned, which could indicate an attempted breach.
2. Leverage a tool like the Office 365 Secure Score to manage account security configurations and behaviors.
Second: Keep your Outlook clients current
Fully-updated and patched versions of Outlook 2013, and 2016 disable the “Start Application” rule/form action by
default. This will ensure that, even if an attacker breaches the account, the rule and form actions will be blocked.
You can install the latest updates and security patches by following the steps in Install Office updates.
Here are the patch versions for your Outlook 2013 and 2016 clients:
Outlook 2013: 15.0.4937.1000 or greater
Outlook 2016: 16.0.4534.1001 or greater
For more information on the individual security patches, see:
Outlook 2013 Security Patch
Outlook 2016 Security Patch
Third: Monitor your Outlook clients
Note that even with the patches and updates installed, it is possible for an attacker to change the local machine
configuration to re-enable the “Start Application” behavior. You can use Advanced Group Policy Management to
monitor and enforce local machine policies on your clients.
You can to see if “Start Application” has been re-enabled through an override in the registry by using the
information in How to view the system registry by using 64-bit versions of Windows. Check these subkeys:
Outlook 2016: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security\
Outlook 2013: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Security\
Look for the key EnableUnsafeClientMailRules. If it is there and is set to 1, the Outlook security patch has been
overridden and the computer is vulnerable to the Form/Rules attack. If the value is 0, the “Start Application” action
is disabled. If the updated and patched version of Outlook is installed and this registry key is not present, then a
system is not vulnerable to these attacks.
Customers with on-premises Exchange installations should consider blocking older versions of Outlook that do
not have patches available. Details on this process can be found in the article Configure Outlook client blocking.

Secure Office 365 like a cybersecurity pro


Your Office 365 subscription comes with a powerful set of security capabilities that you can use to protect your
data and your users. Use the Office 365 security roadmap: Top priorities for the first 30 days, 90 days, and beyond
to implement Microsoft recommended best practices for securing your Office 365 tenant.
Tasks to accomplish in the first 30 days. These have immediate affect and are low -impact to your users.
Tasks to accomplish in 90 days. These take a bit more time to plan and implement but greatly improve your
security posture.
Beyond 90 days. These enhancements build in your first 90 days work.

See also:
Malicious Outlook Rules by SilentBreak Security Post about Rules Vector provides a detailed review of how the
Outlook Rules.
MAPI over HTTP and Mailrule Pwnage on the Sensepost blog about Mailrule Pwnage discusses a tool called
Ruler that lets you exploit mailboxes through Outlook rules.
Outlook forms and shells on the Sensepost blog about Forms Threat Vector.
Ruler Codebase
Ruler Indicators of Compromise
Responding to a Compromised Email Account in
Office 365
9/27/2018 • 7 minutes to read • Edit Online

Summary Learn how to recognize and respond to a compromised email account in Office 365.

What is a Compromised Email Account in Office 365?


Access to Office 365 mailboxes, data and other services, is controlled through the use of credentials, for example a
user name and password or PIN. When someone other than the intended user steals those credentials, the stolen
credentials are considered to be compromised. With them the attacker can sign in as the original user and perform
illicit actions. Using the stolen credentials, the attacker can access the user’s Office 365 mailbox, SharePoint folders,
or files in the user's OneDrive. One action commonly seen is the attacker sending emails as the original user to
recipients both inside and outside of the organization. When the attacker emails data to external recipients, this is
called data exfiltration.

Symptoms of a Compromised Office 365 Email Account


Users might notice and report unusual activity in their Office 365 mailboxes. Here are some common symptoms:
Suspicious activity, such as missing or deleted emails.
Other users might receive emails from the compromised account without the corresponding email existing in
the Sent Items folder of the sender.
The presence of inbox rules that weren't created by the intended user or the administrator. These rules may
automatically forward emails to unknown addresses or move them to the Notes, Junk Email, or RSS
Subscriptions folders.
The user's display name might be changed in the Global Address List.
The user's mailbox is blocked from sending email.
The Sent or Deleted Items folders in Microsoft Outlook or in Microsoft Outlook Web App contain common
hacked-account messages, such as "I'm stuck in London, send money."
Unusual profile changes, such as the name, the telephone number, or the postal code were updated.
Unusual credential changes, such as multiple password changes are required.
Mail forwarding was recently added.
An unusual signature was recently added, such as a fake banking signature or a prescription drug signature.
If a user reports any of the above symptoms, you should perform further investigation. The Office 365 Security &
Compliance Center and the Azure Portal offer tools to help you investigate the activity of a user account that you
suspect may be compromised.
Office 365 Unified Audit Logs in the Security & Compliance Center - Review all the activities for the suspected
account by filtering the results for the date range spanning from immediately before the suspicious activity
occurred to the current date. Do not filter on the activities during the search.
Use the Azure AD Sign-in logs and other risk reports that are available in the Azure AD portal. Examine the
values in these columns:
Review IP address
sign-in locations
sign-in times
sign-in success or failure
How to secure and restore email function to a suspected compromised
Office 365 account and mailbox
Even after you've regained access to your account, the attacker may have added back-door entries that enable the
attacker to resume control of the account.
You must perform all the following steps to regain access to your account the sooner the better to make sure that
the hijacker doesn't resume control your account. These steps help you remove any back-door entries that the
hijacker may have added to your account. After you perform these steps, we recommend that you run a virus scan
to make sure that your computer isn't compromised.
Step 1 Reset the user's password

WARNING
Do not send the new password to the intended user through email as the attacker still has access to the mailbox at this
point.

1. Follow the Reset an Office 365 business password for someone else procedures in Admins: Reset Office 365
business passwords
Notes:
Make sure that the password is strong and that it contains upper and lowercase letters, at least one number, and
at least one special character.
Don't reuse any of your last five passwords. Even though the password history requirement lets you reuse a
more recent password, you should select something that the attacker can't guess.
If your on-premises identity is federated with Office 365, you must change your password on-premises, and
then you must notify your administrator of the compromise.

TIP
It is highly recommended that you enable Multi-Factor Authentication (MFA) in order to prevent compromise, especially for
accounts with administrative privileges. You can learn more here.

Step 2 Remove suspicious email forwarding addresses


1. Open the Office 365 Admin Center > Active Users.
2. Find the user account in question and expand Mail Settings.
3. For Email forwarding, click Edit.
4. Remove any suspicious forwarding addresses.
Step 3 Disable any suspicious inbox rules
1. Sign in to the user's mailbox using Outlook Web App (OWA).
2. Click on the gear icon and click Mail.
3. Click Inbox and sweep rules and review the rules.
4. Disable or delete suspicious rules.
Step 4 Unblock the user from sending mail
If the suspected compromised mailbox was used illicitly to send spam email, it is likely that the mailbox has been
blocked from sending mail.
1. To unblock a mailbox from sending mail, follow the procedures in Removing a user, domain, or IP Address from
a block list after sending spam email.
Step 5 Optional: Block the user account from signing-in

IMPORTANT
You can block the suspected compromised account from signing-in until you believe it is safe to re-enable access.

1. Go to the Office 365 admin center.


2. In the Office 365 admin center, select Users.
3. Select the employee that you want to block, and then choose Edit next to Sign-in status in the user pane
4. On the Sign-in status pane, choose Sign-in blocked and then Save.
5. In the Office 365 admin center, in the lower-left navigation pane, expand Admin Centers and select Exchange.
6. In the Exchange admin center, navigate to Recipients > Mailboxes.
7. Select the user, and on the user properties page, under Mobile Devices, click Disable Exchange ActivcSync
and Disable OWA for Devices and answer yes to both.
8. Under Email Connectivity, Disable and answer yes.
Step 6 Optional: Remove the suspected compromised account from all administrative role groups

NOTE
Administrative role group membership can be restored after the account has been secured.

1. Sign in to the Office 365 Admin Center with a global administrator account and open Active Users.
2. Find the suspected compromised account and manually check to see if there are any administrative roles
assigned to the account.
3. Open the Security & Compliance Center.
4. Click Permissions.
5. Manually review the role groups to see if the suspected compromised account is a member of any of them. If it
is: a. Click the role group and click Edit Role Group. b. Click Chose Members and Edit to remove the user
from the role group.
6. Open the Exchange Admin Center
7. Click Permissions.
8. Manually review the role groups to see if the suspected compromised account is a member of any of them. If it
is: a. Click the role group and click Edit. b. Use the members section to remove the user from the role group.
Step 7 Optional: Additional precautionary steps
1. Make sure that you verify your sent items. You may have to inform people on your contacts list that your
account was compromised. The attacker may have asked them for money, spoofing, for example, that you were
stranded in a different country and needed money, or the attacker may send them a virus to also hijack their
computers.
2. Any other service that used this Exchange account as its alternative email account may have been
compromised. First, perform these steps for your Office 365 subscription, and then perform these steps for
your other accounts.
3. Make sure that your contact information, such as telephone numbers and addresses, is correct.

Secure Office 365 like a cybersecurity pro


Your Office 365 subscription comes with a powerful set of security capabilities that you can use to protect your
data and your users. Use the Office 365 security roadmap: Top priorities for the first 30 days, 90 days, and beyond
to implement Microsoft recommended best practices for securing your Office 365 tenant.
Tasks to accomplish in the first 30 days. These have immediate affect and are low -impact to your users.
Tasks to accomplish in 90 days. These take a bit more time to plan and implement but greatly improve your
security posture.
Beyond 90 days. These enhancements build in your first 90 days work.

See also:
Security best practices for Office 365
Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365
Internet Crime Complaint Center
Securities and Exchange Commission - "Phishing" Fraud
Service assurance in the Office 365 Security &
Compliance Center
9/26/2018 • 5 minutes to read • Edit Online

Use Service assurance in the Office 365 Security & Compliance Center to access documents that describe a variety
of topics, including:
Microsoft security practices for customer data that is stored in Office 365.
Independent third-party audit reports of Office 365.
Implementation and testing details for security, privacy, and compliance controls that Office 365 uses to
protect your data.
You can also find out how Office 365 can help customers comply with standards, laws, and regulations across
industries, such as the:
International Organization for Standardization (ISO ) 27001 and 27018
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Federal Risk and Authorization Management Program (FedRAMP )

Who can access Office 365 Service assurance, and how?


New customers, and customers evaluating Microsoft online services can access Service assurance which is
included with Office 365 Enterprise E3 and E5 plans (both trial and paid subscriptions). If you don't have one of
these plans and want to try Service assurance, you can sign-up for a trial of Office 365 Enterprise E5.
Existing customers of Office 365 for business can access Service assurance. If you're the Office 365 global
admin (sometimes called company administrator) for your organization, you'll already have access to Service
assurance, and you can onboard others. If you're not the Office 365 global admin for your organization, and you
need access to Service assurance, ask your admin to add you to the Service Assurance User role group.
O365 Subscription Members can access the Service assurance section in the Office365 Protection Center by
default if Service assurance roles-based access has not been implemented in your subscription. Service assurance
provides reports and documents that describe Microsoft's security practices for customer data that's stored in
Office 365. It also provides independent third-party audit reports on Office 365.

NOTE
Note: If your company has implemented Service Assurance Roles-Based Access in your Office 365 Subscription (which could
be if your organization has been provided access to custom reports), and you need access to Service assurance but it is not
included in the left pane of the Security & Compliance Center, ask your Office 365 administrator to add you to the Service
Assurance User role group on the Permissions page. For more information, see Onboard other Service assurance users or
groups.

Service assurance roles-based access-provisioned users If your company has implemented Service assurance
roles-based access, you can provide Service assurance access to all security and compliance personnel including
information security, risk management, compliance, and audit teams and personnel within your organization. For
details, see Onboard other Service assurance users or groups.
Service assurance is accessible by using the Security & Compliance Center. Here's how to get to there.
1. Go to https://protection.office.com.
2. Sign in to Office 365 using your work or school account.
3. In the left pane, select Service assurance. Next, Choose your industry and regional settings and Onboard
other Service assurance users or groups.

NOTE
If you need access to Service assurance, and it's not included in the left pane of the Security & Compliance Center, ask
your Office 365 administrator to add you to the Service Assurance User role group on the Permissions page.

Choose your industry and regional settings


When you access Service assurance for the first time, the first step is to configure your industry and regional
settings. You can change these settings at any time. Configuring these settings enables Service assurance to
provide you with content that is most relevant to your organization. To configure your industry and region settings:
1. After you access Service assurance, select Settings and the Region and industry settings page displays as
shown in the following screenshot.

2. On the Settings page, select the down arrow next to Region and check the appropriate regions for your
organization.
3. Select the down arrow next to Industry and check the appropriate industries for your organization.
4. Once you have selected regions and industries, select Save.

Find, review, and download compliance and trust content


To review and download content, select an option from the navigation pane:
Compliance reports to view independent audits and assessments of Office 365 and other Microsoft cloud
services as shown in the following screen shot.

Trust documents to view information about how Microsoft operates Office 365 as shown in the following
screen shot.
Audited controls to view information about how Office 365 controls meet security, compliance, and
privacy requirements, as shown in the following screen shot.

Select the report you want to download, and select Save to download it to your computer. For Audited controls,
select the report you want and then select Download. The table below describes the reports you can find on each
Service assurance page.

NOTE
Service assurance reports and documents are available to download for at least twelve months after publishing or until a new
version of the document becomes available.

SERVICE ASSURANCE PAGE CONTENT AVAILABLE DESCRIPTION

Compliance reports FedRamp Use service compliance reports to


GRC Assessment review audit assessments performed by
ISO third-party independent auditors of
SOC/SSAE Office 365 Service Delivery Operations.

Trust documents FAQ and White Papers Use white papers, FAQs, end-of-year
Risk Management Reports reports and other Microsoft
Confidential resources that are made
available to you under non-disclosure
agreement for your review / risk
assessments.
SERVICE ASSURANCE PAGE CONTENT AVAILABLE DESCRIPTION

Audited controls Global standards and regulations that Help with risk-assessment when you're
Office 365 has implemented. evaluating, onboarding, or using Office
365 services. Find out:

- How Office 365 controls meet security,


compliance, and privacy requirements.
- About testing of controls in Office
365, results of these tests, and when
they were completed.

Depending on your specific set-up, options included in your view might have some differences.

Onboard other Service assurance users or groups


For accessing default reports that are generally available across all Microsoft Cloud subscriptions, you don't need
to implement the Service Assurance roles-based access model and you can skip this step. However, if your
organization has been provided access to custom reports then please add other users or groups to the Service
Assurance roles. To add other users or groups:
1. In the Security & Compliance Center, select Permissions in the left pane as shown in the following
screenshot.

2. In the right pane, select Service Assurance User, and then select Edit Role Group, and under the
Members section, select Edit to add members to the Service Assurance User role as shown in the following
screenshot.
3. In the next dialog box, search for and choose individuals or groups that need to view Service assurance
compliance reports and trust resources, then select Add for each selection you make and click the X in the
upper right corner of the pane when you're finished.

4. Every user or group that you added to the Service Assurance User role can now find Service assurance and
download reports and other documents in the Security & Compliance Center.
Return to the Permissions page at any time to add more users, or remove existing ones.

Get help with Service assurance


Contact support for business products - Admin Help.

Frequently Asked Questions


Why am I getting an error saying that documents from Service assurance are corrupted?
Most Service assurance documents are in PDF format. Choose Save to save these files to, and then open them up
from, your local computer.
Tenant Isolation in Office 365
8/21/2018 • 2 minutes to read • Edit Online

One of the primary benefits of cloud computing is concept of a shared, common infrastructure across numerous
customers simultaneously, leading to economies of scale. This concept is called multi-tenancy. Microsoft works
continuously to ensure that the multi-tenant architectures of our cloud services support enterprise-level security,
confidentiality, privacy, integrity, and availability standards.
Based upon the significant investments and experience gathered from Trustworthy Computing and the Security
Development Lifecycle, Microsoft cloud services were designed with the assumption that all tenants are potentially
hostile to all other tenants, and we have implemented security measures to prevent the actions of one tenant from
affecting the security or service of another tenant, or accessing the content of another tenant.
The two primary goals of maintaining tenant isolation in a multi-tenant environment are:
1. Preventing leakage of, or unauthorized access to, customer content across tenants; and
2. Preventing the actions of one tenant from adversely affecting the service for another tenant
Multiple forms of protection have been implemented throughout Office 365 to prevent customers from
compromising Office 365 services or applications or gaining unauthorized access to the information of other
tenants or the Office 365 system itself, including:
Logical isolation of customer content within each tenant for Office 365 services is achieved through Azure
Active Directory authorization and role-based access control.
SharePoint Online provides data isolation mechanisms at the storage level.
Microsoft uses rigorous physical security, background screening, and a multi-layered encryption strategy to
protect the confidentiality and integrity of customer content. All Office 365 datacenters have biometric access
controls, with most requiring palm prints to gain physical access. In addition, all U.S.-based Microsoft
employees are required to successfully complete a standard background check as part of the hiring process. For
more information on the controls used for administrative access in Office 365, see Office 365 Administrative
Access Controls.
Office 365 uses service-side technologies that encrypt customer content at rest and in transit, including
BitLocker, per-file encryption, Transport Layer Security (TLS ) and Internet Protocol Security (IPsec). For specific
details about encryption in Office 365, see Data Encryption Technologies in Office 365.
Together, the above-listed protections provide robust logical isolation controls that provide threat protection and
mitigation equivalent to that provided by physical isolation alone.

Related Links
Isolation and Access Control in Azure Active Directory
Tenant Isolation in the Office Graph and Delve
Tenant Isolation in Office 365 Search
Tenant Isolation in Office 365 Video
Resource Limits
Monitoring and Testing Tenant Boundaries
Isolation and Access Control in Office 365
Isolation and Access Control in Azure Active
Directory
8/21/2018 • 2 minutes to read • Edit Online

Azure Active Directory was designed to host multiple tenants in a highly secure way through logical data isolation.
Access to Azure Active Directory is gated by an authorization layer. Azure Active Directory isolates customers
using tenant containers as security boundaries to safeguard a customer's content so that the content cannot be
accessed or compromised by co-tenants. Three checks are performed by Azure Active Directory's authorization
layer:
Is the principal enabled for access to Azure Active Directory tenant?
Is the principal enabled for access to data in this tenant?
Is the principal's role in this tenant authorized for the type of data access requested?
No application, user, server, or service can access Azure Active Directory without the proper authentication and
token or certificate. Requests are rejected if they are not accompanied by proper credentials.
Effectively, Azure Active Directory hosts each tenant in its own protected container, with policies and permissions
to and within the container solely owned and managed by the tenant.

The concept of tenant containers is deeply ingrained in the directory service at all layers, from portals all the way
to persistent storage. Even when multiple Azure Active Directory tenant metadata is stored on the same physical
disk, there is no relationship between the containers other than what is defined by the directory service, which in
turn is dictated by the tenant administrator. There can be no direct connections to Azure Active Directory storage
from any requesting application or service without first going through the authorization layer.
In the example below, Contoso and Fabrikam both have separate, dedicated containers, and even though those
containers may share some of the same underlying infrastructure, such as servers and storage, they remain
separate and isolated from each other, and gated by layers of authorization and access control.
In addition, there are no application components that can execute from within Azure Active Directory, and it is not
possible for one tenant to forcibly breach the integrity of another tenant, access encryption keys of another tenant,
or read raw data from the server.
By default, Azure Active Directory disallows all operations issued by identities in other tenants. Each tenant is
logically isolated within Azure Active Directory through claims-based access controls. Reads and writes of
directory data are scoped to tenant containers, and gated by an internal abstraction layer and a role-based access
control (RBAC ) layer, which together enforce the tenant as the security boundary. Every directory data access
request is processed by these layers and every access request in Office 365 is policed by the logic above.
Azure Active Directory has North America, U.S. Government, European Union, Germany, and World Wide
partitions. A tenant exists in a single partition, and partitions can contain multiple tenants. Partition information is
abstracted away from users. A given partition (including all the tenants within it) is replicated to multiple
datacenters. The partition for a tenant is chosen based on properties of the tenant (e.g., the country code). Secrets
and other sensitive information in each partition is encrypted with a dedicated key. The keys are generated
automatically when a new partition is created.
Azure Active Directory system functionalities are a unique instance to each user session. In addition, Azure Active
Directory uses encryption technologies to provide isolation of shared system resources at the network level to
prevent unauthorized and unintended transfer of information.
Monitoring and Testing Tenant Boundaries
8/21/2018 • 6 minutes to read • Edit Online

Microsoft continuously monitors and explicitly tests for weaknesses and vulnerabilities in tenant boundaries,
including monitoring for intrusion, permission violation attempts, and resource starvation. We also use multiple
internal systems to continuously monitor for inappropriate resource utilization, which if detected, triggers built-in
throttling.
Office 365 has internal monitoring systems that continuously monitor for any failure and drive automated
recovery when failure is detected. Office 365 systems analyze deviations in service behavior and initiate self-
healing processes that are built into the system. Office 365 also uses outside-in monitoring in which monitoring is
performed from multiple locations both from trusted third-party services (for independent SLA verification) and
our own datacenters to raise alerts. For diagnostics, we have extensive logging, auditing, and tracing. Granular
tracing and monitoring helps us isolate issues and perform fast and effective root cause analysis.
While Office 365 has automated recovery actions where possible, Microsoft on-call engineers are available 24x7 to
investigate all Severity 1 security escalations, and post-mortem reviews of every service incident contributes to
continuous learning and improvement. This team includes support engineers, product developers, program
managers, product managers, and senior leadership. Our on-call professionals provide timely backup and often
can automate recovery actions, so that next time an event occurs, it can be self-healed.
Microsoft performs a thorough post-incident review each time an Office 365 security incident occurs regardless of
the magnitude of impact. A post-incident review consists of an analysis of what happened, how we responded and
how we prevent similar incidents in the future. In the interest of transparency and accountability, we share post-
incident review for any major service incidents with affected customers. For specific details, see Office 365 Security
Incident Management.

Assume Breach Methodology


Based on detailed analysis of security trends, Microsoft advocates and highlights the need for additional
investments in reactive security processes and technologies that focus on detection and response to emerging
threats, rather than solely the prevention of those threats. Because of changes in the threat landscape and in-depth
analysis, Microsoft refined its security strategy beyond just preventing security breaches to one better equipped to
deal with breaches when they do occur – a strategy which considers major security events not as a matter of if, but
when.
While Microsoft's Assume Breach practices have been in place for many years, many customers are unaware of
the work being done behind the scenes to harden the Microsoft cloud. Assume Breach is a mindset that guides
security investments, design decisions and operational security practices. Assume Breach limits the trust placed in
applications, services, identities, and networks by treating them all—internal and external—as insecure and already
compromised. Although the Assume Breach strategy was not borne from an actual breach of any Microsoft
enterprise or cloud services, it was a recognition that many organizations, across the industry, were being breached
despite all attempts to prevent it. While preventing breaches is a critical part of any organization’s operations,
those practices must be continuously tested and augmented to effectively address modern adversaries and
advanced persistent threats. For any organization to prepare for a breach, they must first build and maintain
robust, repeatable, and thoroughly-tested security response procedures.
While Prevent Breach security processes, such as threat modeling, code reviews, and security testing are very
useful as part of the Security Development Lifecycle, Assume Breach provides numerous advantages that help
account for overall security by exercising and measuring reactive capabilities in the event of a breach.
At Microsoft, we set out to accomplish this through ongoing war-games exercises and live site penetration testing
of our security response plans with the goal of improving our detection and response capability. Microsoft
regularly simulates real-world breaches, conducts continuous security monitoring, and practices security incident
management to validate and improve the security of Office 365, Azure, and other Microsoft cloud services.
Microsoft executes its Assume Breach security strategy using two core groups:
Red Teams (attackers)
Blue Teams (defenders)
Both Microsoft Azure and Office 365 staff separate full-time red teams and blue teams.
Referred to as "Red Teaming", the approach is to test Azure and Office 365 systems and operations using the same
tactics, techniques and procedures as real adversaries, against the live production infrastructure, without the
foreknowledge of the Engineering or Operations teams. This tests Microsoft’s security detection and response
capabilities, and helps identify production vulnerabilities, configuration errors, invalid assumptions, and other
security issues in a controlled manner. Every red team breach is followed by full disclosure between both teams to
identify gaps, address findings, and improve breach response.
NOTE: No customer data is deliberately targeted during Red Teaming or live site penetration testing. The tests are
against Office 365 and Azure infrastructure and platforms, as well as Microsoft's own tenants, applications, and
data. Customer tenants, applications, and content hosted in Office 365 or Azure are never targeted.

Red Teams
The red team is a group of full-time staff within Microsoft that focuses on breaching Microsoft's infrastructure,
platform and Microsoft's own tenants and applications. They are the dedicated adversary (a group of ethical
hackers) performing targeted and persistent attacks against Online Services (Microsoft infrastructure, platforms,
and applications but not end-customers' applications or content).
The role of the red team is to attack and penetrate environments using the same steps as an adversary:

Among other functions, red teams specifically attempt to breach tenant isolation boundaries to find bugs or gaps
in our isolation design.

Blue Teams
The blue team is comprised of either a dedicated set of security responders or members from across the security
incident response, Engineering, and Operations organizations. Regardless of their make-up, they are independent
and operate separately from the red team. The blue team follows established security processes and uses the latest
tools and technologies to detect and respond to attacks and penetration. Just like real-world attacks, the blue team
does not know when or how the red team's attacks will occur or what methods may be used. Their job, whether it
is a red team attack or an actual assault, is to detect and respond to all security incidents. For this reason, the blue
team is continuously on-call and must react to red team breaches the same way they would for any other breach.
When an adversary, such as a red team, has breached an environment, the blue team must:
Gather evidence left by the adversary
Detect the evidence as an indication of compromise
Alert the appropriate Engineering and Operation team(s)
Triage the alerts to determine whether they warrant further investigation
Gather context from the environment to scope the breach
Form a remediation plan to contain or evict the adversary
Execute the remediation plan and recover from breach
These steps form the security incident response that runs parallel to the adversary's, as shown below:

Red team breaches allow for exercising the blue team's ability to detect and respond to real-world attacks end-to-
end. Most importantly, it allows for practiced security incident response prior to a genuine breach. Additionally,
because of red team breaches, the blue team enhances their situational awareness which can be valuable when
dealing with future breaches (whether from the red team or another adversary). Throughout the detection and
response process, the blue team produces actionable intelligence and gains visibility into the actual conditions of
the environment(s) they are trying to defend. Frequently this is accomplished via data analysis and forensics,
performed by the blue team, when responding to red team attacks and by establishing threat indicators, such as
indicators of compromise. Much like how the red team identifies gaps in the security story, blue teams identify
gaps in their ability to detect and respond. Furthermore, since the red teams model real-world attacks, the blue
team can be accurately assessed on their ability, or inability, to deal with determined and persistent adversaries.
Finally, red team breaches measure both readiness and impact of our breach response.
Resource Limits
8/21/2018 • 2 minutes to read • Edit Online

Resource limits are enforced using quotas (limits) and throttling. Azure Active Directory and the individual Office
365 services use both. Limits are service-specific and change over time as new capabilities are added. For details
on the current limits for the various services, see the following topics:
Azure Active Directory service limits and restrictions
Exchange Online Limits
Exchange Online Protection Limits
SharePoint Online software boundaries and limits
Skype for Business Limits
Yammer REST API and Rate Limits
File Size Limits in Sway
In addition to these limits, several throttling mechanisms are used throughout Azure Active Directory and Office
365. Throttling within the service is especially important, given that network resources in Microsoft's datacenters
are optimized for the broad set of customers that use the services. Throttling mechanisms include:
Azure Active Directory and Office 365 feature user-level throttling, which limit the number of transactions or
concurrent calls (by script or code) that can be performed by a single user.
A default PowerShell throttling policy is assigned to each tenant at tenant creation. These settings affect other
items, such as the maximum number of simultaneous PowerShell sessions that can be opened by a single
administrator.
Each Exchange Online customer has a default Exchange Web Services (EWS ) policy that is tuned for EWS client
operations, and throttling that applies to all Outlook clients.
Isolation and Access Control in Office 365
8/21/2018 • 5 minutes to read • Edit Online

Azure Active Directory and Office 365 use a highly complex data model that includes tens of services, hundreds of
entities, thousands of relationships, and tens of thousands of attributes (entities, relationships and attributes are
often application-specific). At a high level, Azure Active Directory and the service directories are the containers of
tenants and recipients, and they are kept in sync using state-based replication protocols. In addition to the
directory information held within Azure Active Directory, each of the services also have their own directory
services infrastructure (e.g., Exchange Online Directory Services, SharePoint Online Directory Services, etc.).

Within this model, there is no single source of directory data. Every individual piece of data is owned by a specific
system, but no single system holds all the data. Office 365 services cooperate with Azure Active Directory to
realize the data model. Azure Active Directory is the "system of truth" for shared data, which is typically small and
static data used often by every service. The federated model used within Office 365 and Azure Active Directory
provides the shared view of the data.
Office 365 uses both physical storage and Azure cloud storage. Exchange Online (including Exchange Online
Protection) and Skype for Business use their own storage for customer data. SharePoint Online leverages both its
SQL Server storage and Azure storage, which necessitates the need for additional isolation of customer data at the
storage level.

Exchange Online
Exchange Online stores customer data within mailboxes that are hosted within Extensible Storage Engine (ESE )
databases called mailbox databases. This includes user mailboxes, linked mailboxes, shared mailboxes and public
folder mailboxes. User mailboxes may also include saved Skype for Business content, such as conversation
histories. User mailbox content includes emails and email attachments, calendaring and free/busy information,
contacts, tasks, notes, Groups, and inference data.
Each mailbox database within Exchange Online contains mailboxes from multiple tenants. All mailboxes are
secured by authorization code, including within a tenancy. As with an on-premises deployment of Exchange, by
default only the assigned user has access to a mailbox. The access control list (ACL ) that secures a mailbox contains
an identity that is authenticated by Azure Active Directory at the tenant level. The mailboxes for a given tenant are
limited to identities authenticated against that tenant's authentication provider, which include only users from that
tenant. Content belonging to TenantA cannot in any way be obtained by users in TenantB, unless explicitly
approved by TenantA.

Skype for Business


Skype for Business stores data in a variety of places:
User and account information, which includes connection endpoints, tenant IDs, dial plans, roaming settings,
presence state, contact lists, etc., is stored in the Skype for Business Active Directory servers, as well as in
various Skype for Business database servers. Contact lists are stored in the user's Exchange Online mailbox if
the user is enabled for both products, or on Skype for Business servers if the user is not. Skype for Business
database servers are not partitioned per-tenant, but multi-tenancy isolation of data is enforced through RBAC.
Meeting content, such as content users upload during Skype for Business meetings, is stored on Distributed
File System shares. This content can also be archived in Exchange Online provided archiving is enabled. The
DFS shares are not partitioned per-tenant but the content is secured with ACLs and multi-tenancy is enforced
through RBAC.
Call detail records, which is the activity history, such as call history, IM sessions, application sharing, IM history,
etc., can also be stored in Exchange Online, but most call detail records are temporarily stored on call detail
record (CDR ) servers. Content is not partitioned per tenant, but multi-tenancy is enforced through RBAC.

SharePoint Online
There are several independent mechanisms unique to SharePoint Online that provide data isolation. SharePoint
Online stores objects as abstracted code within application databases. For example, when a user uploads a file to
SharePoint Online, that file is disassembled and translated into application code and stored in multiple tables
across multiple databases.
If a user could gain direct access to the storage containing the data, the content would not be interpretable to a
human or any system other than SharePoint Online. These mechanisms include security access control and
properties. As described above, all SharePoint Online resources are secured by the authorization code and RBAC
policy, including within a tenancy. The access control list (ACL ) that secures a resource contains an identity that is
authenticated at the tenant level. As with Exchange Online, in SharePoint Online, data for a given tenant are limited
to identities authenticated against that tenant's authentication provider, which include only users from that tenant.
In addition to the ACLs, a tenant level property that specifies the authentication provider (which is the tenant-
specific Azure Active Directory), is written once and cannot be changed once set. Once the authentication provider
tenant property has been set for a tenant, it cannot be changed using any APIs exposed to a tenant.
A unique SubscriptionId is also used for each tenant. All customer sites are owned by a tenant and are assigned a
SubscriptionId unique to the tenant. The SubscriptionId property on a site is written once and cannot be changed.
Once a site is assigned to a tenant, it cannot be moved to a different tenant later using the content store API. The
SubscriptionId is also the key that is used to create the security scope for the authentication provider and is tied to
the tenant.
SharePoint Online uses SQL Server and Azure storage for the storing of content. At the SQL level, the partition
key for the content store is SiteId. When running a SQL query, SharePoint Online uses a SiteId that has been
verified as part of a tenant-level SubscriptionId check.
SharePoint Online stores file binary blobs (e.g., the file streams) in Microsoft Azure. Each SharePoint Online farm
has its own Microsoft Azure account and all the blobs saved in Azure are encrypted individually using a key that is
stored in the SQL content store. The encryption key is not exposed directly to the end user, and is protected in code
by the authorization layer. Finally, SharePoint Online has real-time monitoring in place to detect when an HTTP
request reads or writes data for more than one tenant. It does this by tracking the SubscriptionId of the request
identity against the SubscriptionId of the resource being accessed. A request accessing resources of more than one
tenant should never happen by end-user. It can happen for service requests in a multi-tenant environment, though.
For example, the search crawler pulls content changes for an entire database all at once. This usually involves
querying sites of more than one tenant in a single service request, which is done for efficiency reasons.
Tenant Isolation in Office 365 Search
8/21/2018 • 3 minutes to read • Edit Online

SharePoint Online search uses a tenant separation model that balances the efficiency of shared data structures
with protection against information leaking between tenants. With this model, we prevent the Search features
from:
Returning query results that contain documents from other tenants
Exposing sufficient information in query results that a skilled user could infer information about other tenants
Showing schema or settings from another tenant
Mixing analytics processing information between tenants or store results in the wrong tenant
Using dictionary entries from another tenant
For each type of tenant data, we use one or more layers of protection in the code to prevent accidental leaking of
information. The most critical data has the most layers of protection to make sure that a single defect doesn't result
in actual or perceived information leakage.

Tenant Separation for the Search Index


The search index is stored on disk in the servers hosting the index components and the tenants share the index
files. A tenant's indexed documents are visible only for queries for that tenant. Three independent mechanisms
prevent information leakage:
Tenant ID filtering
Tenant ID term prefixing
ACL checks
All three mechanisms would have to fail for Search to return documents to the wrong tenant.

Tenant ID Filtering and Tenant ID Term Prefixing


Search prefixes every term that is indexed in the full-text index with the tenant ID. For example, when the term
"foo" is indexed for a tenant with an ID of "123", the entry in the full-text index is "123foo."
Every query is converted to include the tenant ID using a process called tenant ID filtering. For example, the query
"foo" is converted to "<guid>.foo AND tenantID:<guid>", where <guid> represents the tenant performing the
query. This query conversion occurs within each index node and neither query nor content processing can
influence it. Because the tenant ID is added to every query, the frequency of a term in other tenants can't be
inferred by looking at best match ranking in one tenant.
Tenant ID term prefixing occurs only in the full-text index. Fielded searches, such as "title:foo", go to a synthetic
search index where terms aren't prefixed by tenant ID. Instead, fielded searches are prefixed with the field name.
For example, the query "title:foo" is converted to "fields.title:foo AND fields.tenantID:<guid>." Because the
frequency of a term doesn't influence ranking of hits in the synthetic search index, there's no need for tenant
separation by term prefixing. For a fielded search like "title:foo", tenant content separation depends on tenant ID
filtering by query conversion.

Document Access Control List Checks


Search controls access to documents through ACLs that are saved in the search index. Every item is indexed with a
set of terms in a special ACL field. The ACL field contains one term per group or user that can view the document.
Every query is augmented with a list of access control entry (ACE ) terms, one for each group to which the
authenticated user belongs.
For example, a query like "<guid>.foo AND tenantID:<guid>" becomes: "<guid>.foo AND tenantID:<guid> AND
(docACL:<ace1> OR docACL:<ace2> OR docACL:<ace3> ...)"
Because user and group identifiers and hence ACEs are unique, this provides an extra level of security between
tenants for documents that are only visible to some users. The same is the case for the special "Everyone except
external users" ACE that grants access to regular users in the tenant. But since ACEs for "Everyone" are the same
for all tenants, tenant separation for public documents depends on tenant ID filtering. Deny ACEs are also
supported. The query augmentation adds a clause that removes a document from the result when there is a match
with a deny ACE.
In Exchange Online search, the index is partitioned on mailbox ID for individual user's mailboxes instead of tenant
ID (subscription ID ) as in SharePoint Online. The partitioning mechanism is the same as SharePoint Online, but
there is no ACL filtering.
Tenant Isolation in Office 365 Video
8/21/2018 • 2 minutes to read • Edit Online

NOTE
Office 365 Video will be replaced by Microsoft Stream. To learn more about the new enterprise video service that adds
intelligence to video collaboration and learn about the transition plans for current Office 365 Video customers, see Migrate
to Stream from Office 365 Video.

Introduction
Azure Storage is used to store data for multiple Office 365 services, including Office 365 Video and Sway. Azure
Storage includes Blob storage, which is a highly-scalable, REST-based, cloud object store that is used for storing
unstructured data. Azure Storage uses a simple access control model; each Azure subscription can create one or
more Storage Accounts. Each Storage Account has a single secret key that is used to control access to all data in
that Storage Account. This supports the typical scenario where storage is associated with applications and those
applications have full control over their associated data; for example, Sway storing content in Azure Storage. All
customer content for Sway is stored in shared Azure storage accounts. Each user's content is in a separate
directory tree of blobs in Azure storage.
The systems managing access to customer environments (e.g., the Azure Portal, SMAPI, etc.) are isolated within an
Azure application operated by Microsoft. This logically separates the customer access infrastructure from the
customer applications and storage layer.

Tenant Isolation in Office 365 Video


Office 365 Video is an enterprise portal that provides organizations with a highly secure, organization-wide
destination for posting, sharing, and discovering video content. In Office 365 Video, each tenant's videos are kept
isolated and encrypted in all locations, and are only available to authenticated users that have access and
permissions to the organization's videos. Office 365 Video uses a combination of technologies to accomplish this:
SharePoint Online is used for storing the video file and metadata (video title, description, etc.). It also provides
the security and compliance layer (including authentication), and search features.
Azure Media Services provides transcoding, adaptive streaming, secure delivery (using AES encryption), and
thumbnail features.
Azure Media Services is a platform-as-a-service offering for enabling end-to-end media workflows in the cloud.
The platform provides a REST API for uploading, encoding, encrypting (with PlayReady), and delivery of media
through Azure datacenters around the world.
All uploads for Office 365 Video occur via HTTPS. When a video file is uploaded, it is stored in SharePoint Online,
and a copy of the file is sent via an encrypted channel to Azure Media Services. Azure Media Services transcodes
the video into multiple formats that are optimized for viewing experience (e.g., mobile, low -bandwidth, high-
bandwidth, etc.). These files, along with the original file acquired during upload, are stored in Azure Blob storage.
The files are encrypted using AES 128 per the MPEG Common Encryption packaging algorithm (or an earlier
PlayReady version) for playback, and encrypted using AES 256 storage encryption before being stored in Azure
Blob storage. (Using the Azure Media Services Client SDK, customers can control which encryption is used. For
example, a customer could apply Azure Media Services storage encryption (AES 256) to a high-value media asset
before uploading it Azure Blob storage.)
Azure Media Services also generates a thumbnail for the video, which it transmits along with thumbnail metadata
to SharePoint Online via an encrypted channel.
Tenant Isolation in the Office Graph and Delve
8/21/2018 • 3 minutes to read • Edit Online

Tenant Isolation in the Office Graph


The Office Graph models activity in Office 365 services, including Exchange Online, SharePoint Online, Yammer,
Skype for Business, Azure Active Directory, and more, and in external services, such as other Microsoft services or
third-party services. Office Graph components are used throughout Office 365. The Office Graph represents a
collection of content and activity, and the relationships between them that happen across the entire Office suite. It
uses sophisticated machine learning techniques to connect people to the relevant content, conversations and
people around them. For example, the tenant index in SharePoint Online has an Office Graph index that is used to
serve Delve queries, the Analytics Processing Engine in SharePoint Online is used to store signals and calculate
insights, and Exchange Online calculates each user's recipient cache as input into tenant analytics.
The Office Graph contains information about enterprise objects, such as people and documents, as well as the
relationships and interactions among these objects. The relationships and interactions are represented as edges.
The Office Graph is segmented by tenant such that edges can only exist between nodes in the same tenancy. A
node is an entity with a Uniform Resource Identifier (URI), node type, access control list, and a set of facets
containing metadata and edges. Each node has associated metadata and edges, arranged into facets as in the
Common Knowledge Model. Metadata are named properties stored on a node which can be used for searching,
filtering, or analysis within the office graph. A facet is a logical collection of metadata and edges on a node. Each
facet describes one aspect of a node.
The Office Graph does not bring all the data into a single repository; rather, it stores metadata and relationships
about data that lives elsewhere. The Office Graph consists of several data stores and processing components:
The Tenant Graph Store provides bulk storage optimized for efficient analytics.
The Active Content Cache provides quick random access to active node and edges to drive user experiences.
The input router notifies components internal and external of changes to the tenant graph.
Analytics within each workload deduce insights relevant to the tenant-wide calculations and push them to the
tenant graph. Tenant analytics reasons over all activity in a tenancy to produce insights into patterns of behavior.
For example, Exchange Online calculates the recipient cache for each user with analytics that efficiently reason over
each user's mailbox. These per-user analytics produce a set of RecipientCache Edges on each person, which are in
turn pushed to the tenant graph. This keeps the as much of the analytics processing as close to the source data as
possible.

Tenant Isolation in Delve


As mentioned previously, the Office Graph powers experiences that help people discover and collaborate on
current activities in their enterprise, and provides an entity-centric platform for analytics to reason over content
and activity across workloads and beyond Office 365. Delve is the first such experience powered by the Office
Graph. Delve is an Office 365 web experience that surfaces content from Office 365 and Yammer Enterprise to
Office 365 users via the Office Graph. The web experience displays data as different boards, each with a certain
topic, such as Trending around me or Modified by me. Each board consists of several document cards that display
summary text and a picture from the document. The card lets users do things like open the document or a Yammer
page for the document. There is a page for each person in an Office 365 tenant that displays the most relevant
documents for this person, and icons that can invoke Exchange Online or Skype for Business for interacting with
that person. Because Delve is based on the Office Graph API, it is bound by the tenant-based isolation of that API.
Encryption in the Microsoft Cloud
8/21/2018 • 4 minutes to read • Edit Online

Customer data within Microsoft's enterprise cloud services is protected by a variety of technologies and processes,
including various forms of encryption. (Office 365 customer data in this document includes Exchange Online
mailbox content (e-mail body, calendar entries, and the content of e-mail attachments, and if applicable, Skype for
Business content), SharePoint Online site content and the files stored within sites, and files uploaded to OneDrive
for Business or Skype for Business.) Microsoft uses multiple encryption methods, protocols, and ciphers across its
products and services to help provide a secure path for customer data to travel through our cloud services, and to
help protect the confidentiality of customer data that is stored within our cloud services. Microsoft uses some of
the strongest, most secure encryption protocols available to provide barriers against unauthorized access to
customer data. Proper key management is also an essential element of encryption best practices, and Microsoft
works to ensure that all Microsoft-managed encryption keys are properly secured.
Regardless of customer configuration, customer data stored within Microsoft's enterprise cloud services is
protected using one or more forms of encryption. (Validation of our crypto policy and its enforcement is
independently verified by multiple third-party auditors, and reports of those audits are available on the Service
Trust Portal.)
Microsoft provides service-side technologies that encrypt customer data at rest and in transit. For example, for
customer data at rest, Microsoft Azure uses BitLocker and DM -Crypt, and Microsoft Office 365 uses BitLocker,
Azure Storage Service Encryption, Distributed Key Manager (DKM ), and Office 365 service encryption. For
customer data in transit, Azure, Office 365, Microsoft Commercial Support, Microsoft Dynamics 365, Microsoft
Power BI, and Visual Studio Team Services use industry-standard secure transport protocols, such as Internet
Protocol Security (IPsec) and Transport Layer Security (TLS ), between Microsoft datacenters and between user
devices and Microsoft datacenters.
In addition to the baseline level of cryptographic security provided by Microsoft, our cloud services also include
additional cryptography options that you can manage. For example, you can enable encryption for traffic between
their Azure virtual machines (VMs) and their users. With Azure Virtual Networks, you can use the industry-
standard IPsec protocol to encrypt traffic between your corporate VPN gateway and Azure as well as between the
VMs located on your Virtual Network. In addition, In addition, new Office 365 Message Encryption capabilities
allow you to send encrypted mail to anyone.
In accordance with the Public Key Infrastructure Operational Security Standard, which is a component of the
Microsoft Security Policy, Microsoft leverages the cryptographic capabilities included in the Windows operating
system for certificates and authentication mechanisms, which includes the use of cryptographic modules that meet
the U.S. government's Federal Information Processing Standards (FIPS ) 140-2 standard. (Relevant NIST certificate
numbers for Microsoft can be found at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm.)

[NOTE ] To access the Microsoft Security Policy as a resource, you must sign in using your work or school
account. If you don't have a subscription yet, you can sign up for a free trial.

FIPS 140-2 is a standard designed specifically for validating product modules that implement cryptography rather
than the products that use them. Cryptographic modules that are implemented within a service can be certified as
meeting the requirements for hash strength, key management, and the like. Any time cryptographic capabilities
are employed to protect the confidentiality, integrity, or availability of data in Microsoft's cloud services, the
modules and ciphers used meet the FIPS 140-2 standard.
Microsoft certifies the underlying cryptographic modules used in our cloud services with each new release of the
Windows operating system:
Azure and Azure U.S. Government
Dynamics 365 and Dynamics 365 U.S. Government
Office 365, Office 365 U.S. Government, and Office 365 U.S. Government Defense
Encryption of Office 365 customer data at rest is provided by multiple service-side technologies, including
BitLocker, DKM, Azure Storage Service Encryption, and service encryption in Exchange Online, Skype for
Business, OneDrive for Business, and SharePoint Online. Office 365 service encryption includes an option to use
customer-managed encryption keys that are stored in Azure Key Vault. This customer-managed key option, called
Office 365 Customer Key, is available for Exchange Online, SharePoint Online, Skype for Business, and OneDrive
for Business.
For customer data in transit, all Office 365 servers negotiate secure sessions using TLS by default with client
machines to secure customer data. This applies to protocols on any device used by clients, such as Skype for
Business, Outlook, and Outlook on the web, mobile clients, and web browsers.
(All customer-facing servers negotiate to TLS 1.2 by default, but we also support negotiating down to a lower
standard, if required.)

Related Links
Encryption in Azure
BitLocker and Distributed Key Manager (DKM ) for Encryption
Office 365 Service Encryption
Office 365 Encryption for Skype for Business, OneDrive for Business, SharePoint Online, and Exchange Online
Encryption for Data in Transit
Customer-Managed Encryption Features
Encryption Risks and Protections
Encryption in Microsoft Dynamics 365
Office 365 Service Encryption
8/21/2018 • 2 minutes to read • Edit Online

In addition to using volume-level encryption, Exchange Online, Skype for Business, SharePoint Online, and
OneDrive for Business also use Service Encryption to encrypt customer data. Service Encryption allows for two
key management options:
Microsoft manages all cryptographic keys. (This option is currently available in SharePoint Online, OneDrive
for Business, and Skype for Business. It is currently on the roadmap for Exchange Online.)
The customer supplies root keys used with service encryption and the customer manages these keys using
Azure Key Vault. Microsoft manages all other keys. This option is called Customer Key, and it is currently
available for Exchange Online, SharePoint Online, and OneDrive for Business. (Previously referred to as
Advanced Encryption with BYOK. See Enhancing transparency and control for Office 365 customers for the
original announcement.)
Service encryption provides multiple benefits. For example, it:
provides rights protection and management features on top of strong encryption protection.
includes a Customer Key option that enables multi-tenant services to provide per-tenant key management.
provides separation of Windows operating system administrators from access to customer data stored or
processed by the operating system.
enhances the ability of Office 365 to meet the demands of customers that have compliance requirements
regarding encryption.

Customer Key
Using Customer Key, you can generate your own cryptographic keys using either an on-premises HSM or Azure
Key Vault. Regardless of how the key is generated, customers use Azure Key Vault to control and manage the
cryptographic keys used by Office 365. Once your keys are stored in Azure Key Vault, they can be assigned to
workloads such as Exchange Online and SharePoint Online and used to as the root of the keychain used to encrypt
your mailbox data and files. One of the other benefits of using Customer Key is to control the ability of Microsoft to
process customer data. This capability exists so that a customer that wants to remove data from Office 365 (such
as when a customer terminates service with Microsoft or removes a portion of data stored in the cloud) can do so
and use Customer Key as a technical control to ensure that no one, including Microsoft, can access or process the
data. This is in addition (and a complement) to the Customer Lockbox feature that can be used to control access to
customer data by Microsoft personnel.
To learn how to set up Customer Key for Office 365 for Exchange Online, Skype for Business, SharePoint Online,
and OneDrive for Business, see Controlling your data in Office 365 using Customer Key. For additional
information, see the Customer Key for Office 365 FAQ, and Manage and control your data to help meet
compliance needs with Customer Key.
Office 365 encryption for data in transit
8/21/2018 • 2 minutes to read • Edit Online

In addition to protecting customer data at rest, Microsoft uses encryption technologies to protect Office 365
customer data in transit.
Data is in transit:
when a client machine communicates with an Office 365 server;
when an Office 365 server communicates with another Office 365 server; and
when an Office 365 server communicates with a non-Office 365 server (e.g., Exchange Online delivering email
to a foreign email server).
Inter-datacenter communications between Office 365 servers takes place over TLS or IPsec, and all customer-
facing servers negotiate a secure session using TLS with client machines (e.g., Exchange Online uses TLS 1.2 with
256-bit cipher strength is used (FIPS 140-2 Level 2-validated). (See Technical reference details about encryption in
Office 365 for a list of TLS cipher suites supported by Office 365.) This applies to the protocols that are used by
clients such as Outlook, Skype for Business, and Outlook on the web (e.g., HTTP, POP3, etc.).
The public certificates are issued by Microsoft IT SSL using SSLAdmin, an internal Microsoft tool to protect
confidentiality of transmitted information. All certificates issued by Microsoft IT have a minimum of 2048 bits in
length, and Webtrust compliance requires SSLAdmin to make sure that certificates are issued only to public IP
addresses owned by Microsoft. Any IP addresses that fail to meet this criterion are routed through an exception
process.
All implementation details such as the version of TLS being used, whether Forward Secrecy (FS ) is enabled, the
order of cipher suites, etc., are available publicly. One way to see these details is to use a third-party website, such
as Qualys SSL Labs (www.ssllabs.com). Below are the links to automated test pages from Qualys that display
information for the following services:
Office 365 Portal
Exchange Online
SharePoint Online
Skype for Business (SIP )
Skype for Business (Web)
Exchange Online Protection
Microsoft Teams
For Exchange Online Protection, URLs vary by tenant names; however, all customers can test Office 365 using
microsoft-com.mail.protection.outlook.com.
Customer-managed encryption features in Office 365
8/21/2018 • 5 minutes to read • Edit Online

Along with the encryption technologies in Office 365 managed by Microsoft, Office 365 also works with additional
encryption technologies that you can manage and configure, such as:
Azure Rights Management
Secure Multipurpose Internet Mail Extension
Office 365 Message Encryption
Secure mail flow with a partner organization
Additional information on these technologies can also be found in the Office 365 service descriptions.

Azure Rights Management


Azure Rights Management (Azure RMS ) is the protection technology used by Azure Information Protection. It
uses encryption, identity, and authorization policies to help secure your files and email across multiple platforms
and devices—phones, tablets, and PCs. Information can be protected both within and outside your organization
because protection remains with the data. Azure RMS provides persistent protection of all file types, protects files
anywhere, supports business-to-business collaboration, and a wide range of Windows and non-Windows devices.
Azure RMS protection can also augment data loss prevention (DLP ) policies. For more information about which
applications and services can use the Azure Rights Management service from Azure Information Protection, see
How applications support the Azure Rights Management service.
Azure RMS is integrated with Office 365 and available to all Office 365 customers. To configure Office 365 to use
Azure RMS, see Configure IRM to use Azure Rights Management and Set up Information Rights Management
(IRM ) in SharePoint admin center. If you operate on-premises Active Directory (AD ) RMS server then you can also
configure IRM to use an on-premises AD RMS server, but we strongly recommend you to migrate to Azure RMS
to use new features like secure collaboration with other organizations.
When you protect customer data with Azure RMS, Azure RMS uses a 2048-bit RSA asymmetric key with SHA-
256 hash algorithm for integrity to encrypt the data. The symmetric key for Office documents and email is AES
128-bit (CBC mode with PKCS#7 padding). For each document or email that is protected by Azure RMS, Azure
RMS creates a single AES key (the "content key"), and that key is embedded in the document, and persists through
editions of the document. The content key is protected with the organization's RSA key (the "Azure Information
Protection tenant key") as part of the policy in the document, and the policy is also signed by the author of the
document. This tenant key is common to all documents and emails that are protected by Azure RMS for the
organization and this key can only be changed by an Azure Information Protection administrator if the
organization is using a tenant key that is customer-managed. For more information about the cryptographic
controls used by Azure RMS, see How does Azure RMS work? Under the hood.
In a default Azure RMS implementation, Microsoft generates and manages the root key that is unique for each
tenant. Customers can manage the lifecycle of their root key in Azure RMS with Azure Key Vault Services by using
a key management method called Bring Your Own Key (BYOK) ) that allows you to generate your key in on-
premises HSMs, and stay in control of this key after transfer to Microsoft's FIPS 140-2 Level 2-validated HSMs.
Access to the root key is not given to any personnel as the keys cannot be exported or extracted from the hardware
security modules protecting them. In addition, you can access a near real-time log showing all access to the root
key at any time. For more information, see Logging and Analyzing Azure Rights Management Usage.
Azure Rights Management helps mitigates threats such as wire-tapping, man-in-the-middle attacks, data theft, and
unintentional violations of organizational sharing policies. At the same time, any unwarranted access of customer
data in-transit or at rest by an unauthorized user who does not have appropriate permissions is prevented via
policies that follow that data, thereby mitigating the risk of that data falling in the wrong hands either knowingly or
unknowingly and providing data loss prevention functions. If used as part of Azure Information Protection, Azure
RMS also provides Data Classification and labeling capabilities, content marking, document access tracking and
access revocation capabilities. To learn more about these capabilities, see What is Azure Information Protection,
Azure Information Protection deployment roadmap, and Quick start tutorial for Azure Information Protection.

Secure Multipurpose Internet Mail Extension


Secure/Multipurpose Internet Mail Extensions (S/MIME ) is a standard for public key encryption and digital signing
of MIME data. S/MIME is defined in RFCs 3369, 3370, 3850, 3851, and others. It allows a user to encrypt an email
and digitally sign an email. An email that is encrypted using S/MIME can only be decrypted by the recipient of the
email using their private key, which is only available to that recipient. As such the emails cannot be decrypted by
anybody other than the recipient of the email.
Microsoft supports S/MIME in Office 365. Public certificates are distributed to the customer's on-premises Active
Directory and stored in attributes that can be replicated to an Office 365 tenant. The private keys that correspond
to the public keys remain on-premises and are never transmitted to Office 365. Users can compose, encrypt,
decrypt, read, and digitally sign emails between two users in an organization using Outlook, Outlook on the web,
and Exchange ActiveSync clients. For more information, see S/MIME encryption now in Office 365.

Office 365 Message Encryption


Office 365 Message Encryption (OME ) built on top of Azure Information Protection (AIP ) enables you to send
encrypted and rights-protected mail to anyone. OME mitigates threats such as wire-tapping and man-in-the-
middle attacks, and other threats, such as unwarranted access of data by an unauthorized user who does not have
appropriate permissions. We have made investments that provide you with a simpler, more intuitive, secure email
experience built on top of Azure Information Protection. You can protect messages sent from Office 365 to anyone
inside or outside your organization. These messages can be viewed across a diverse set of mail clients using any
identity, including Azure Active Directory, Microsoft Account, and Google IDs. For more information on how your
organization can use encrypted messages, see Office 365 Message Encryption.

Transport Layer Security


If you want to ensure secure communication with a partner, you can use inbound and outbound connectors to
provide security and message integrity. You can configure forced inbound and outbound TLS on each connector,
using a certificate. Using an encrypted SMTP channel can prevent data from being stolen via a man-in-the-middle
attack. For more information, see How Exchange Online uses TLS to secure email connections.

Domain Keys Identified Mail


Exchange Online Protection (EOP ) and Exchange Online support inbound validation of Domain Keys Identified
Mail (DKIM ) messages. DKIM is a method for validating that a message was sent from the domain it says it
originated from and that it was not spoofed by someone else. It ties an email message to the organization
responsible for sending it, and is part of a larger paradigm of email encryption. For more information about the
three parts of this paradigm, see:
Set up SPF in Office 365 to help prevent spoofing
Use DKIM to validate outbound email sent from your custom domain in Office 365
Use DMARC to validate email in Office 365
Encryption Risks and Protections
8/21/2018 • 14 minutes to read • Edit Online

Microsoft follows a control and compliance framework that focuses on risks to the Office 365 service and to
customer data. Microsoft implements a large set of technology and process-based methods (referred to as
controls) to mitigate these risks. Identification, evaluation and mitigation of risks via controls is a continuous
process. The implementation of controls within various layers of our cloud services such as facilities, network,
servers, applications, users (such as Microsoft administrators) and data form a defense-in-depth strategy. The key
to this strategy is that many different controls are implemented at different layers to protect against the same or
similar risk scenarios. This multi-layered approach provides fail-safe protection in case a control fails for some
reason. Some risk scenarios and the currently available encryption technologies that mitigate them are listed
below. These scenarios are in many cases also mitigated via other controls implemented in Office 365.

ENCRYPTION
TECHNOLOGY SERVICES KEY MANAGEMENT RISK SCENARIO VALUE

BitLocker Exchange Online, Microsoft Disks or servers in BitLocker provides a


SharePoint Online, Office 365 are stolen fail-safe approach to
and Skype for or improperly protect against loss of
Business recycled. data due to stolen or
improperly recycled
hardware
(server/disk).

Service encryption SharePoint Online, Microsoft Internal or external The encrypted data
Skype for Business, hacker tries to access cannot be decrypted
and OneDrive for individual files/data as without access to
Business; Exchange a blob. keys. Helps to
Online (on roadmap) mitigate risk of a
hacker accessing data.

Customer Key SharePoint Online, Customer N/A (This feature is Helps customers meet
OneDrive for designed as a internal regulation
Business, Exchange compliance feature; and compliance
Online, and Skype for not as a mitigation for obligations, and the
Business any risk.) ability to leave the
Office 365 service and
revoke Microsoft’s
access to data

TLS between Office Exchange Online, Microsoft, Customer Man-in-the-middle or This implementation
365 and clients SharePoint Online, other attack to tap provides value to
OneDrive for the data flow between both Microsoft and
Business, Skype for Office 365 and client customers and
Business, Teams, and computers over assures data integrity
Yammer Internet. as it flows between
Office 365 and the
client.
ENCRYPTION
TECHNOLOGY SERVICES KEY MANAGEMENT RISK SCENARIO VALUE

TLS between Exchange Online, Microsoft Man-in-the-middle or This implementation


Microsoft datacenters SharePoint Online, other attack to tap is another method to
OneDrive for the customer data protect data against
Business, and Skype flow between Office attacks between
for Business 365 servers located in Microsoft datacenters.
different Microsoft
datacenters.

Azure Rights Exchange Online, Customer Data falls into the Azure Information
Management SharePoint Online, hands of a person Protection uses Azure
(included in Office and OneDrive for who should not have RMS which provides
365 or Azure Business access to the data. value to customers by
Information using encryption,
Protection) identity, and
authorization policies
to help secure files
and email across
multiple devices.
Azure RMS provides
value to customers
where all emails
originating from
Office 365 that match
certain criteria (i.e., all
emails to a certain
address) can be
automatically
encrypted before they
get sent to another
recipient.

S/MIME Exchange Online Customer Email falls into the S/MIME provides
hands of a person value to customers by
who is not the assuring that email
intended recipient. encrypted with
S/MIME can only be
decrypted by the
direct recipient of the
email.

Office 365 Message Exchange Online, Customer Email, including OME provides value
Encryption SharePoint Online protected to customers where
attachments, falls in all emails originating
hands of a person from Office 365 that
either within or match certain criteria
outside Office 365 (i.e., all emails to a
who is not the certain address) are
intended recipient of automatically
the email. encrypted before they
get sent to another
internal or an external
recipient.
ENCRYPTION
TECHNOLOGY SERVICES KEY MANAGEMENT RISK SCENARIO VALUE

SMTP TLS with Exchange Online Customer Email is intercepted This scenario provides
partner organization via a man-in-the- value to the customer
middle or other attack such that they can
while in transit from send/receive all emails
an Office 365 tenant between their Office
to another partner 365 tenant and their
organization. partner’s email
organization inside an
encrypted SMTP
channel.

The following tables summarize the encryption technologies available in Office 365 Multi-tenant and Government
Cloud Community environments.

KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

BitLocker Exchange Online AES 128-bit+ AES external key is Yes, for servers that
stored in a Secret Safe use AES 256-bit**
and in the registry of
the Exchange server.
The Secret Safe is a
secured repository
that requires high-
level elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

SharePoint Online AES 256-bit AES external key is Yes


stored in a Secret
Safe. The Secret Safe
is a secured
repository that
requires high-level
elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.

Skype for Business AES 256-bit AES external key is Yes


stored in a Secret
Safe. The Secret Safe
is a secured
repository that
requires high-level
elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Service Encryption SharePoint Online AES 256-bit The keys used to Yes
encrypt the blobs are
stored in the
SharePoint Online
Content Database.
The SharePoint Online
Content Databases is
protected by
database access
controls and
encryption at rest.
Encryption is
performed using TDE
in Azure SQL
Database. These
secrets are at the
service level for
SharePoint Online,
not at the tenant
level. These secrets
(sometimes referred
to as the master keys)
are stored in a
separate secure
repository called the
Key Store. TDE
provides security at
rest for both the
active database and
the database backups
and transaction logs.
When customers
provide the optional
key, the customer key
is stored in Azure Key
Vault, and the service
uses the key to
encrypt a tenant key,
which is used to
encrypt a site key,
which is then used to
encrypt the file level
keys. Essentially, a
new key hierarchy is
introduced when the
customer provides a
key.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Skype for Business AES 256-bit Each piece of data is Yes


encrypted using a
different randomly
generated 256-bit
key. The encryption
key is stored in a
corresponding
metadata XML file
which is also
encrypted by a per-
conference master
key. The master key is
also randomly
generated once per
conference.

Exchange Online AES 256-bit Each mailbox is Yes


encrypted using a
data encryption policy
that uses encryption
keys controlled by
Microsoft (on
roadmap) or by the
customer (when
Customer Key is
used).

TLS between Office Exchange Online Opportunistic TLS The TLS certificate for Yes, when TLS 1.2
365 and supporting multiple Exchange Online with 256-bit cipher
clients/partners cipher suites (outlook.office.com) is strength is used
a 2048-bit
SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for
Exchange Online is a
2048-bit SHA1RSA
certificate issued by
Baltimore CyberTrust
Root.

SharePoint Online TLS 1.2 with AES 256 The TLS certificate for Yes
SharePoint Online
(*.sharepoint.com) is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Data Encryption in The TLS root


OneDrive for Business certificate for
and SharePoint SharePoint Online is a
Online 2048-bit SHA1RSA
certificate issued by
Baltimore CyberTrust
Root.

Skype for Business TLS for SIP The TLS certificate for Yes
communications and Skype for Business
PSOM data sharing (*.lync.com) is a 2048-
sessions bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for Skype
for Business is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

Microsoft Teams TLS 1.2 with AES 256 The TLS certificate for Yes
Microsoft Teams
(teams.microsoft.com,
edge.skype.com) is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

Frequently asked The TLS root


questions about certificate for
Microsoft Teams – Microsoft Teams is a
Admin Help 2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

TLS between All Office 365 services TLS 1.2 with AES 256 Microsoft uses an Yes
Microsoft datacenters internally managed
and deployed
certification authority
for server-to-server
communications
between Microsoft
datacenters.

Secure Real-time
Transport Protocol
(SRTP)
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Azure Rights Exchange Online Supports Managed by Yes


Management Cryptographic Mode Microsoft.
(included in Office 2, an updated and
365 or Azure enhanced RMS
Information cryptographic
Protection) implementation. It
supports RSA 2048
for signature and
encryption, and SHA-
256 for hash in the
signature.

SharePoint Online Supports Managed by Yes


Cryptographic Mode Microsoft, which is
2, an updated and the default setting; or
enhanced RMS
cryptographic
implementation. It
supports RSA 2048
for signature and
encryption, and SHA-
256 for signature.

Customer-managed,
which is an alternative
to Microsoft-
managed keys.
Organization that
have an IT-managed
Azure subscription
can use BYOK and log
its usage at no extra
charge. For more
information, see
Implementing bring
your own key. In this
configuration, Thales
HSMs are used to
protect your keys. For
more information, see
Thales HSMs and
Azure RMS.

S/MIME Exchange Online Cryptographic Depends on the Yes, when configured


Message Syntax customer-managed to encrypt outgoing
Standard 1.5 (PKCS public key messages with 3DES
#7) infrastructure or AES256
deployed. Key
management is
performed by the
customer, and
Microsoft never has
access to the private
keys used for signing
and decryption.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Office 365 Message Exchange Online Same as Azure RMS Uses Azure Yes
Encryption (Cryptographic Mode Information
2 - RSA 2048 for Protection as its
signature and encryption
encryption, and SHA- infrastructure. The
256 for signature) encryption method
used depends on
where you obtain the
RMS keys used to
encrypt and decrypt
messages.

SMTP TLS with Exchange Online TLS 1.2 with AES 256 The TLS certificate for Yes, when TLS 1.2
partner organization Exchange Online with 256-bit cipher
(outlook.office.com) is strength is used
a 2048-bit
SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for
Exchange Online is a
2048-bit SHA1RSA
certificate issued by
Baltimore CyberTrust
Root.

*TLS certificates referenced in this table are for US datacenters; non-US datacenters also use 2048 -bit
SHA256RSA certificates.
**Most servers in the Exchange Online multi-tenant environment have been deployed with AES 256 -bit encryption
for BitLocker. Servers using AES 128 -bit are being phased out.

KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

BitLocker Exchange Online AES 256-bit AES external key is Yes


stored in a Secret Safe
and in the registry of
the Exchange server.
The Secret Safe is a
secured repository
that requires high-
level elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.

SharePoint Online AES 256-bit AES external key is Yes


stored in a Secret
Safe. The Secret Safe
is a secured
repository that
requires high-level
elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Skype for Business AES 256-bit AES external key is Yes


stored in a Secret
Safe. The Secret Safe
is a secured
repository that
requires high-level
elevation and
approvals to access.
Access can be
requested and
approved only by
using an internal tool
called Lockbox. The
AES external key is
also stored in the
Trusted Platform
Module in the server.
A 48-digit numerical
password is stored in
Active Directory and
protected by Lockbox.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Service Encryption SharePoint Online AES 256-bit The keys used to Yes
encrypt the blobs are
stored in the
SharePoint Online
Content Database.
The SharePoint Online
Content Databases is
protected by
database access
controls and
encryption at rest.
Encryption is
performed using TDE
in Azure SQL
Database. These
secrets are at the
service level for
SharePoint Online,
not at the tenant
level. These secrets
(sometimes referred
to as the master keys)
are stored in a
separate secure
repository called the
Key Store. TDE
provides security at
rest for both the
active database and
the database backups
and transaction logs.
When customers
provide the optional
key, the Customer
Key is stored in Azure
Key Vault, and the
service uses the key
to encrypt a tenant
key, which is used to
encrypt a site key,
which is then used to
encrypt the file level
keys. Essentially, a
new key hierarchy is
introduced when the
customer provides a
key.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Skype for Business AES 256-bit Each piece of data is Yes


encrypted using a
different randomly
generated 256-bit
key. The encryption
key is stored in a
corresponding
metadata XML file
which is also
encrypted by a per-
conference master
key. The master key is
also randomly
generated once per
conference.

Exchange Online AES 256-bit Each mailbox is Yes


encrypted using a
data encryption policy
that uses encryption
keys controlled by
Microsoft or by the
customer (when
Customer Key is
used).

TLS between Office Exchange Online Opportunistic TLS The TLS certificate for Yes, when TLS 1.2
365 and supporting multiple Exchange Online with 256-bit cipher
clients/partners cipher suites (outlook.office.com) is strength is used
a 2048-bit
SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for
Exchange Online is a
2048-bit SHA1RSA
certificate issued by
Baltimore CyberTrust
Root.

SharePoint Online TLS 1.2 with AES 256 The TLS certificate for Yes
SharePoint Online
(*.sharepoint.com) is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

The TLS root


certificate for
SharePoint Online is a
2048-bit SHA1RSA
certificate issued by
Baltimore CyberTrust
Root.

Skype for Business TLS for SIP The TLS certificate for Yes
communications and Skype for Business
PSOM data sharing (*.lync.com) is a 2048-
sessions bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for Skype
for Business is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

Microsoft Teams Frequently asked The TLS certificate for Yes


questions about Microsoft Teams
Microsoft Teams – (teams.microsoft.com;
Admin Help edge.skype.com) is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for
Microsoft Teams is a
2048-bit SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

TLS between Exchange Online, TLS 1.2 with AES 256 Microsoft uses an Yes
Microsoft datacenters SharePoint Online, internally managed
Skype for Business and deployed
certification authority
for server-to-server
communications
between Microsoft
datacenters.

Secure Real-time
Transport Protocol
(SRTP)
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Azure Rights Exchange Online Supports Managed by Yes


Management Service Cryptographic Mode Microsoft.
2, an updated and
enhanced RMS
cryptographic
implementation. It
supports RSA 2048
for signature and
encryption, and SHA-
256 for hash in the
signature.

SharePoint Online Supports Managed by Yes


Cryptographic Mode Microsoft, which is
2, an updated and the default setting; or
enhanced RMS
cryptographic
implementation. It
supports RSA 2048
for signature and
encryption, and SHA-
256 for hash in the
signature.

Customer-managed
(aka BYOK), which is
an alternative to
Microsoft-managed
keys. Organization
that have an IT-
managed Azure
subscription can use
BYOK and log its
usage at no extra
charge. For more
information, see
Implementing bring
your own key.

In the BYOK scenario,


Thales HSMs are used
to protect your keys.
For more information,
see Thales HSMs and
Azure RMS.

S/MIME Exchange Online Cryptographic Depends on the Yes, when configured


Message Syntax public key to encrypt outgoing
Standard 1.5 (PKCS infrastructure messages with 3DES
#7) deployed. or AES-256.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Office 365 Message Exchange Online Same as Azure RMS Uses Azure RMS as its Yes
Encryption (Cryptographic Mode encryption
2 - RSA 2048 for infrastructure. The
signature and encryption method
encryption, and SHA- used depends on
256 for hash in the where you obtain the
signature) RMS keys used to
encrypt and decrypt
messages.

If you use Microsoft


Azure RMS to obtain
the keys,
Cryptographic Mode
2 is used. If you use
Active Directory (AD)
RMS to obtain the
keys, either
Cryptographic Mode
1 or Cryptographic
Mode 2 is used. The
method used
depends on your on-
premises AD RMS
deployment.
Cryptographic Mode
1 is the original AD
RMS cryptographic
implementation. It
supports RSA 1024
for signature and
encryption and
supports SHA-1 for
signature. This mode
continues to be
supported by all
current versions of
RMS, except for BYOK
configurations that
use HSMs.

SMTP TLS with Exchange Online TLS 1.2 with AES 256 The TLS certificate for Yes
partner organization Exchange Online
(outlook.office.com) is
a 2048-bit
SHA256RSA
certificate issued by
Baltimore CyberTrust
Root.

The TLS root


certificate for
Exchange Online is a
2048-bit sha1RSA
certificate issued by
Baltimore CyberTrust
Root.
KEY EXCHANGE
ENCRYPTION ALGORITHM AND
TECHNOLOGY IMPLEMENTED BY STRENGTH KEY MANAGEMENT* FIPS 140-2 VALIDATED

Be aware that for


security reasons, our
certificates do change
from time to time.

*TLS certificates referenced in this table are for US datacenters; non-US datacenters also use 2048 -bit
SHA256RSA certificates.
Office 365 Encryption for Skype for Business,
OneDrive for Business, SharePoint Online, and
Exchange Online
8/21/2018 • 7 minutes to read • Edit Online

Office 365 is a highly secure environment that offers extensive protection in multiple layers: physical data center
security, network security, access security, application security, and data security.

Skype for Business


Skype for Business customer data may be stored at rest in the form of files or presentations that are uploaded by
meeting participants. The Web Conferencing server encrypts customer data using AES with a 256-bit key. The
encrypted customer data is stored on a file share. Each piece of customer data is encrypted using a different
randomly generated 256-bit key. When a piece of customer data is shared in a conference, the Web Conferencing
server instructs the conferencing clients to download the encrypted customer data via HTTPS. It sends the
corresponding key to clients so that the customer data can be decrypted. The Web Conferencing server also
authenticates conferencing clients before it allows the clients access to conference customer data. When joining a
Web conference, each conferencing client establishes a SIP dialog with the conferencing focus component running
inside the front-end server over TLS first. The conferencing focus passes to the conference client an authentication
cookie generated by the Web Conferencing server. The conferencing client then connects to the Web Conferencing
server presenting the authentication cookie to be authenticated by the server.

SharePoint Online and OneDrive for Business


All customer files in SharePoint Online are protected by unique, per-file keys that are always exclusive to a single
tenant. The keys are either created and managed by the SharePoint Online service, or when Customer Key is used,
created and managed by customers. When a file is uploaded, encryption is performed by SharePoint Online within
the context of the upload request, before being sent to Azure storage. When a file is downloaded, SharePoint
Online retrieves the encrypted customer data from Azure storage based on the unique document identifier and
decrypts the customer data before sending it to the user. Azure storage has no ability to decrypt, or even identify or
understand the customer data. All encryption and decryption happen in the same systems that enforce tenant
isolation, which are Azure Active Directory and SharePoint Online.
Several workloads in Office 365 store data in SharePoint Online, including Microsoft Teams, which stores all files
in SharePoint Online, and OneDrive for Business, which uses SharePoint Online for its storage. All customer data
stored in SharePoint Online is encrypted (with one or more AES 256-bit keys) and distributed across the
datacenter as follows. (Every step of this encryption process is FIPS 140-2 Level 2 validated. For additional
information about FIPS 140-2 compliance, see FIPS 140-2 Compliance.)
Each file is split into one or more chunks, depending on file size. Each chunk is encrypted using its own unique
AES 256-bit key.
When a file is updated, the update is handled in the same way: the change is split into one or more chunks, and
each chunk is encrypted with a separate unique key.
These chunks – files, pieces of files, and update deltas – are stored as blobs in Azure storage that are randomly
distributed across multiple Azure storage accounts.
The set of encryption keys for these chunks of customer data is itself encrypted.
The keys used to encrypt the blobs are stored in the SharePoint Online Content Database.
The Content Database is protected by database access controls and encryption at rest. Encryption is
performed using Transparent Data Encryption (TDE ) in Azure SQL Database. (Azure SQL Database is a
general-purpose relational database service in Microsoft Azure that supports structures such as
relational data, JSON, spatial, and XML.) These secrets are at the service level for SharePoint Online, not
at the tenant level. These secrets (sometimes referred to as the master keys) are stored in a separate
secure repository called the Key Store. TDE provides security at rest for both the active database and the
database backups and transaction logs.
When customers provide the optional key, the customer key is stored in Azure Key Vault, and the service
uses the key to encrypt a tenant key, which is used to encrypt a site key, which is then used to encrypt the
file level keys. Essentially, a new key hierarchy is introduced when the customer provides a key.
The map used to re-assemble the file is stored in the Content Database along with the encrypted keys,
separately from the master key needed to decrypt them.
Each Azure storage account has its own unique credentials per access type (read, write, enumerate, and delete).
Each set of credentials is held in the secure Key Store and is regularly refreshed. As described above, there are
three different types of stores, each with a distinct function:
Customer data is stored as encrypted blobs in Azure storage. The key to each chunk of customer data is
encrypted and stored separately in the Content Database. The customer data itself holds no clue as to how it
can be decrypted.
The Content Database is a SQL Server database. It holds the map required to locate and reassemble the
customer data blobs held in Azure storage as well as the keys needed to encrypt those blobs. However, the set
of keys is itself encrypted (as explained above) and held in a separate Key Store.
The Key Store is physically separate from the Content Database and Azure storage. It holds the credentials for
each Azure storage container and the master key to the set of encrypted keys held in the Content Database.
Each of these three storage components – the Azure blob store, the Content Database, and the Key Store – is
physically separate. The information held in any one of the components is unusable on its own. Without access to
all three, it is impossible to retrieve the keys to the chunks, decrypt the keys to make them usable, associate the
keys with their corresponding chunks, decrypt each chunk, or reconstruct a document from its constituent chunks.
BitLocker certificates, which protect the physical disk volumes on machines in the datacenter, are stored in a secure
repository (the SharePoint Online secret store) that is protected by the Farm key.
The TDE keys that protect the per-blob keys are stored in two locations:
The secure repository, which houses the BitLocker certificates and is protected by the Farm Key; and
In a secure repository managed by Azure SQL Database.
The credentials used to access the Azure storage containers are also held in the SharePoint Online secret store and
delegated to each SharePoint Online farm as needed. These credentials are Azure storage SAS signatures, with
separate credentials used to read or write data, and with policy applied so that they auto-expire every 60 days.
Different credentials are used to read or write data (not both) and SharePoint Online farms are not given
permissions to enumerate.

NOTE For Office 365 U.S. Government customers, data blobs are stored in Azure U.S. Government Storage. In
addition, access to SharePoint Online keys in Office 365 U.S. Government is limited to Office 365 staff that
have been specifically screened. Azure U.S. Government operations staff do not have access to the SharePoint
Online key store that is used for encrypting data blobs.

For more information about data encryption in SharePoint Online and OneDrive for Business, see Data Encryption
in OneDrive for Business and SharePoint Online.
List Items in SharePoint Online
List Items are smaller chunks of customer data that are created ad-hoc or that can live more dynamically within a
site, such as rows in a user-created list, individual posts in a SharePoint Online blog, or entries within a SharePoint
Online wiki page. List items are stored in the Content Database (Azure SQL Database) and protected with TDE.

Encryption of data in transit


In OneDrive for Business and SharePoint Online, there are two scenarios in which data enters and exits the
datacenters.
Client communication with the server - Communication to OneDrive for Business across the Internet uses
SSL/TLS connections. All SSL connections are established using 2048-bit keys.
Data movement between datacenters - The primary reason to move data between datacenters is for geo-
replication to enable disaster recovery. For instance, SQL Server transaction logs and blob storage deltas travel
along this pipe. While this data is already transmitted by using a private network, it is further protected with
best-in-class encryption.

Exchange Online
Exchange Online uses BitLocker for all mailbox data, and the BitLocker configuration is described in BitLocker for
Encryption. Service-level encryption encrypts all mailbox data at the mailbox level.
In addition to service-encryption, Office 365 supports Customer Key, which is built on top of service-encryption.
Customer Key is a Microsoft-managed key option for Exchange Online service encryption that is also on
Microsoft's roadmap. This method of encryption provides increased protection not afforded by BitLocker because
it provides separation of server administrators and the cryptographic keys necessary for decryption of data, and
because the encryption is applied directly to the data (in contrast with BitLocker, which applies encryption at the
logical disk volume) any customer data copied from an Exchange server remains encrypted.
The scope for Exchange Online service encryption is customer data that is stored at rest within Exchange Online.
(Skype for Business stores nearly all user-generated content within the user’s Exchange Online mailbox and
therefore inherits the service encryption feature of Exchange Online.)
BitLocker and Distributed Key Manager (DKM) for
Encryption
8/21/2018 • 2 minutes to read • Edit Online

Office 365 servers use BitLocker to encrypt the disk drives containing customer data at rest at the volume-level.
BitLocker encryption is a data protection feature that is built into Windows. BitLocker is one of the technologies
used to safeguard against threats in case there are lapses in other processes or controls (e.g., access control or
recycling of hardware) that could lead to someone gaining physical access to disks containing customer data. In
this case, BitLocker eliminates the potential for data theft or exposure because of lost, stolen, or inappropriately
decommissioned computers and disks.
BitLocker is deployed with Advanced Encryption Standard (AES ) 256-bit encryption on disks containing customer
data in Exchange Online, SharePoint Online, and Skype for Business. Disk sectors are encrypted with a Full
Volume Encryption Key (FVEK), which is encrypted with the Volume Master Key (VMK), which in turn is bound to
the Trusted Platform Module (TPM ) in the server. The VMK directly protects the FVEK and therefore, protecting
the VMK becomes critical. The following figure illustrates an example of the BitLocker key protection chain for a
given server (in this case, using an Exchange Online server).
The following table describes the BitLocker key protection chain for a given server (in this case, an Exchange
Online server).

KEY PROTECTOR GRANULARITY HOW GENERATED? WHERE IS IT STORED? PROTECTION

AES 256-bit External Per Server BitLocker APIs TPM or Secret Safe Lockbox / Access
Key Control

Mailbox Server TPM encrypted


Registry

48-digit Numerical Per Disk BitLocker APIs Active Directory Lockbox / Access
Password Control

X.509 Certificate as Environment (e.g., Microsoft CA Build System No one user has the
Data Recovery Agent Exchange Online full password to the
(DRA) also called multitenant) private key. The
Public Key Protector password is under
physical protection.

BitLocker key management involves the management of recovery keys that are used to unlock/recover encrypted
disks in an Office 365 datacenter. Office 365 stores the master keys in a secured share, only accessible by
individuals who have been screened and approved. The credentials for the keys are stored in a secured repository
for access control data (what we call a "secret store"), which requires a high level of elevation and management
approvals to access using a just-in-time access elevation tool.
BitLocker supports keys which fall into two management categories:
BitLocker-managed keys, which are generally short-lived and tied to the lifetime of an operating system
instance installed on a server or to a given disk. These keys are deleted and reset during server reinstallation or
disk formatting.
BitLocker recovery keys, which are managed outside of BitLocker but used for disk decryption. BitLocker uses
recovery keys for the scenario in which an operating system is reinstalled, and encrypted data disks already
exist. Recovery keys are also used by Managed Availability monitoring probes in Exchange Online where a
responder may need to unlock a disk.
BitLocker-protected volumes are encrypted with a full volume encryption key, which in turn is encrypted with a
volume master key. BitLocker uses FIPS -compliant algorithms to ensure that encryption keys are never stored or
sent over the wire in the clear. The Office 365 implementation of customer data-at-rest-protection does not deviate
from the default BitLocker implementation.
Office 365 Encryption in Microsoft Dynamics 365
8/21/2018 • 2 minutes to read • Edit Online

Microsoft uses encryption technology to protect customer data in Dynamics 365 while at rest in a Microsoft
database and while it is in transit between user devices and our datacenters. Connections established between
customers and Microsoft datacenters are encrypted, and all public endpoints are secured using industry-standard
TLS. TLS effectively establishes a security-enhanced browser-to-server connection to help ensure data
confidentiality and integrity between desktops and datacenters. After data encryption is activated, it cannot be
turned off. For more information, see Field-level data encryption.
Dynamics 365 uses standard Microsoft SQL Server cell level encryption for a set of default entity attributes that
contain sensitive information, such as user names and email passwords. This feature can help organizations meet
the compliance requirements associated with FIPS 140-2. Field-level data encryption is especially important in
scenarios that leverage the Microsoft Dynamics CRM Email Router, which must store user names and passwords
to enable integration between a Dynamics 365 instance and an email service.
All instances of Dynamics 365 use Microsoft SQL Server Transparent Data Encryption (TDE ) to perform real-time
encryption of data when written to disk (at rest). TDE encrypts SQL Server, Azure SQL Database, and Azure SQL
Data Warehouse data files. By default, Microsoft stores and manages the database encryption keys for your
instances of Dynamics 365. (The keys that are used by Dynamics 365 for Financials are generated by the .NET
Framework Data Protection API.)
The manage keys feature in the Dynamics 365 Administration Center gives administrators the ability to self-
manage the database encryption keys that are associated with instances of Dynamics 365. (Self-managed database
encryption keys are only available in the January 2017 update for Microsoft Dynamics 365 and may not be made
available for later versions. For more information, see Manage the encryption keys for your Dynamics 365 (online)
instance.) The key management feature supports both PFX and BYOK encryption key files, such as those stored in
an HSM. (For more information about generating and transferring an HSM -protected key over the Internet, see
How to generate and transfer HSM -protected keys for Azure Key Vault.)
To use the upload encryption key option, you need both the public and private encryption key.
The key management feature takes the complexity out of encryption key management by using Azure Key Vault to
securely store encryption keys. Azure Key Vault helps safeguard cryptographic keys and secrets used by cloud
applications and services. The key management feature doesn't require that you have an Azure Key Vault
subscription and for most situations there is no need to access encryption keys used for Dynamics 365 within the
vault.
Office 365 encryption in Azure
8/21/2018 • 4 minutes to read • Edit Online

Introduction
Technological safeguards in Azure, such as encrypted communications and operational processes, help keep your
data secure. You also have the flexibility to implement additional encryption features and manage your own
cryptographic keys. Regardless of customer configuration, Microsoft applies encryption to protect customer data
in Azure. Microsoft also enables you to control your data hosted in Azure through a range of advanced
technologies to encrypt, control and manage cryptographic keys, control and audit access to data. In addition,
Azure Storage provides a comprehensive set of security capabilities which together enable developers to build
secure applications.
Azure offers many mechanisms for protecting data as it moves from one location to another. Microsoft uses TLS to
protect data when it's traveling between the cloud services and customers. Microsoft's datacenters negotiate a TLS
connection with client systems that connect to Azure services. Perfect Forward Secrecy (PFS ) protects connections
between customers' client systems and Microsoft's cloud services by unique keys. Connections also use RSA-
based 2,048-bit encryption key lengths. This combination makes it difficult for someone to intercept and access
data that is in-transit.
Data can be secured in transit between an application and Azure by using client-side encryption, HTTPS, or SMB
3.0. You can enable encryption for traffic between your own virtual machines (VMs) and your users. With Azure
Virtual Networks, you can use the industry-standard IPsec protocol to encrypt traffic between your corporate VPN
gateway and Azure as well as between the VMs located on your Virtual Network.
For data at rest, Azure offers many encryption options, such as support for AES -256, giving you the flexibility to
choose the data storage scenario that best meets your needs. Data can be automatically encrypted when written to
Azure Storage using Storage Service Encryption, and operating system and data disks used by VMs can be
encrypted using Azure Disk Encryption. In addition, delegated access to data objects in Azure Storage can be
granted using Shared Access Signatures. Azure also provides encryption for data at rest using Transparent Data
Encryption for Azure SQL Database and Data Warehouse.
For more information about encryption in Azure, see Azure encryption overview and Azure Data Encryption-at-
Rest.

Azure Disk Encryption


Azure Disk Encryption enables you to encrypt your Windows and Linux Infrastructure as a Service (IaaS ) VM
disks. Azure Disk Encryption leverages the BitLocker feature of Windows and the DM -Crypt feature of Linux to
provide volume-level encryption for the operating system and the data disks. It also ensures that all data on the
VM disks are encrypted at rest in your Azure storage. Azure Disk Encryption is integrated with Azure Key Vault to
help you control, manage, and audit the use of the encryption keys and secrets.
For more information, see Azure Disk Encryption for Windows and Linux IaaS VMs.

Azure Storage Service Encryption


With Azure Storage Service Encryption, Azure Storage automatically encrypts data prior to persisting it to storage
and decrypts data prior to retrieval. The encryption, decryption, and key management processes are totally
transparent to users. Azure Storage Service Encryption can be used for Azure Blob Storage and Azure Files. You
can also use Microsoft-managed encryption keys with Azure Storage Service Encryption, or you can use your own
encryption keys. (For information on using your own keys, see Storage Service Encryption using customer
managed keys in Azure Key Vault. For information about using Microsoft-managed keys, see Storage Service
Encryption for Data at Rest.) In addition, you can automate the use of encryption. For example, you can
programmatically enable or disable Storage Service Encryption on a storage account using the Azure Storage
Resource Provider REST API, the Storage Resource Provider Client Library for .NET, Azure PowerShell, or the
Azure CLI.
Some Office 365 services use Azure for storing data. For example, SharePoint Online and OneDrive for Business
store data in Azure Blob storage, and Microsoft Teams stores data for its chat service in tables, blobs, and queues.
In addition, the Compliance Manager feature of the Service Trust Portal stores customer-entered data which is
stored in encrypted form in Azure Cosmos DB, a Platform as a Service (PaaS ), globally-distributed, multi-model
database. Azure Storage Service Encryption encrypts data stored in Azure Blob storage and in tables, and Azure
Disk Encryption encrypts data in queues, as well as Windows and IaaS virtual machine disks to provide volume
encryption for the operating system and the data disk. The solution ensures that all data on the virtual machine
disks are encrypted at rest in your Azure storage. Encryption at rest in Azure Cosmos DB is implemented by using
several security technologies, including secure key storage systems, encrypted networks, and cryptographic APIs.

Azure Key Vault


Secure key management is not just core to encryption best practices; it's also essential for protecting data in the
cloud. Azure Key Vault enables you to encrypt keys and small secrets like passwords that use keys stored in
hardware security modules (HSMs). Azure Key Vault is Microsoft's recommended solution for managing and
controlling access to encryption keys used by cloud services. Permissions to access keys can be assigned to
services or to users with Azure Active Directory accounts. Azure Key Vault relieves organizations of the need to
configure, patch, and maintain HSMs and key management software. With Azure Key Vault, Microsoft never sees
your keys and applications don't have direct access to them; you maintain control. You can also import or generate
keys in HSMs. Organizations that have a subscription that includes Azure Information Protection can configure
their Azure Information Protection tenant to use a customer-managed key Bring Your Own Key (BYOK)) and log its
usage.
Data Resiliency in Office 365
8/21/2018 • 3 minutes to read • Edit Online

Introduction
Given the complex nature of cloud computing, Microsoft is mindful that it's not a case of if things will go wrong,
but rather when. We design our cloud services to maximize reliability and minimize the negative effects on
customers when things do go wrong. We have moved beyond the traditional strategy of relying on complex
physical infrastructure, and we have built redundancy directly into our cloud services. We use a combination of less
complex physical infrastructure and more intelligent software that builds data resiliency into our services and
delivers high availability to our customers.

Resiliency and Recoverability Are Built-in


Building in resiliency and recovery starts with the assumption that the underlying infrastructure and processes will
fail at some point: hardware (infrastructure) will fail, humans will make mistakes, and software will have bugs.
While it would be incorrect to say that software developers were not thinking about these things before the cloud,
how these issues were handled in a typical IT implementation was very different before the cloud:
First, hardware and infrastructure protections were significant. This meant having datacenters with 99.99%
reliability required significant power and network redundancy, and servers were implemented with hardware-
based clustering, dual power supplies, dual network interfaces, and the like.
Second, process was paramount. Operations teams maintained rigorous procedures, change windows were
employed, and there was often significant project management overhead.
Third, deployment took place at a glacial pace. Deploying code without owning the source meant waiting for
patch releases, and major version releases involved hardware replacement and significant capital outlay.
Moreover, the only way to correct a problem was to rollback. Thus, most IT organizations would deploy only
major releases to avoid the work to keep up-to-date.
Finally, the scale of deployed systems, as well as the level of their interconnectedness was historically much
smaller than it is now.
Today, customers expect continuous innovation from Microsoft without compromising quality, and this is one of
the reasons why Microsoft's services and software are built with resiliency and recoverability in mind.

Office 365 Data Resiliency Principles


Resiliency refers to the ability of a cloud-based service to withstand certain types of failures and yet remain fully-
functional from the customers' perspective. Data resiliency means that no matter what failures occur within Office
365, critical customer data remains intact and unaffected. To that end, Office 365 services have been designed
around five specific resiliency principles:
There is critical and non-critical data. Non-critical data (for example, whether a message was read) can be
dropped in rare failure scenarios. Critical data (for example, customer data such as email messages) should be
protected at extreme cost. As a design goal, delivered mail messages are always critical, and things like whether
a message has been read is non-critical.
Copies of customer data must be separated into different fault zones or as many fault domains as possible (e.g.,
datacenters, accessible by single credentials (process, server, or operator)) to provide failure isolation.
Critical customer data must be monitored for failing any part of Atomicity, Consistency, Isolation, Durability
(ACID ).
Customer data must be protected from corruption. It must be actively scanned or monitored, repairable, and
recoverable.
Most data loss results from customer actions, so allow customers to recover on their own using a GUI that
enables them to restore accidentally deleted items.
Through the building of our cloud services to these principles, coupled with robust testing and validation, Office
365 is able to meet and exceed the requirements of customers while ensuring a platform for continuous innovation
and improvement.

Related Links
Dealing with Data Corruption
Malware and Ransomware Protection
Monitoring and Self-Healing
Exchange Data Resiliency
SharePoint Data Resiliency
Dealing with Data Corruption in Office 365
8/21/2018 • 2 minutes to read • Edit Online

One of the challenging aspects of running a large-scale cloud service is how to handle data corruption, given the
large volume of data and independent systems. Data corruption can be caused by:
Application or infrastructure bugs, corrupting some or all of the application state
Hardware issues that result in lost data or an inability to read data
Human operational errors
Malicious hackers and disgruntled employees
Incidents in external services that result in some loss of data
Because greater resiliency in data integrity means fewer data corruption incidents, Microsoft has built into Office
365 protection mechanisms to prevent corruption from happening, as well as systems and processes that enable
us to recover data if it does. Checks and processes exist within the various stages of the engineering release
process to increase resiliency against data corruption, including:
System Design
Code organization and structure
Code review
Unit tests, integration tests, and system tests
Trip wires tests/gates
Within Office 365 production environments, peer replication between datacenters ensures that there are always
multiple live copies of any data. Standard images and scripts are used to recover lost servers, and replicated data is
used to restore customer data. Because of the built-in data resiliency checks and processes, Microsoft maintains
backups only of Office 365 information system documentation (including security-related documentation), using
built-in replication in SharePoint Online and our internal code repository tool, Source Depot. System
documentation is stored in SharePoint Online, and Source Depot contains system and application images. Both
SharePoint Online and Source Depot use versioning and are replicated in near real-time.
Exchange Online Data Resiliency in Office 365
8/21/2018 • 11 minutes to read • Edit Online

Introduction
There are two types of corruption that can affect an Exchange database: physical corruption, which is typically
caused by hardware (in particular, storage hardware) problems, and logical corruption, which occurs due to other
factors. Generally, there are two types of logical corruption that can occur within an Exchange database:
Database logical corruption - The database page checksum matches, but the data on the page is wrong
logically. This can occur when the database engine (the Extensible Storage Engine (ESE )) attempts to write a
database page and even though the operating system returns a success message, the data is either never
written to the disk or it's written to the wrong place. This is referred to as a lost flush. ESE includes numerous
features and safeguards that are designed to prevent physical corruption of a database and other data loss
scenarios. To prevent lost flushes from losing data, ESE includes a lost flush detection mechanism in the
database along with a feature (single page restore) to correct it.
Store logical corruption - Data is added, deleted, or manipulated in a way that the user doesn't expect. These
cases are generally caused by third-party applications. It's generally only corruption in the sense that the user
views it as corruption. The Exchange store considers the transaction that produced the logical corruption to be a
series of valid MAPI operations. The In-Place Hold features in Exchange Online provides protection from store
logical corruption (because it prevents content from being permanently deleted by a user or an application).
Exchange Online performs several consistency checks on replicated log files during both log inspection and log
replay. These consistency checks prevent physical corruption from being replicated by the system. For example,
during log inspection, there is a physical integrity check which verifies the log file and validates that the checksum
recorded in the log file matches the checksum generated in memory. In addition, the log file header is examined to
make sure the log file signature recorded in the log header matches that of the log file. During log replay, the log
file undergoes further scrutiny. For example, the database header also contains the log signature which is
compared with the log file's signature to ensure they match.
Protection against corruption of mailbox data in Exchange Online is achieved by using Exchange Native Data
Protection, a resiliency strategy that leverages application-level replication across multiple servers and multiple
datacenters along with other features that help protect data from being lost due to corruption or other reasons.
These features include native features that are managed by Microsoft or the Exchange Online application itself,
such as:
Data Availability Groups
Single Bit Correction
Online Database Scanning
Lost Flush Detection
Single Page Restore
Mailbox Replication Service
Log File Checks
Deployment on Resilient File System
For more information on the native features listed above, click on the above hyperlinks, and see below for
additional information and for details on items without hyperlinks. In addition to these native features, Exchange
Online also includes data resiliency features that customers can manage, such as:
Single Item Recovery (enabled by default)
In-Place Hold and Litigation Hold
Deleted Item Retention and Soft-Deleted Mailboxes (both enabled by default)

Database Availability Groups


Every mailbox database in Office 365 is hosted in a database availability group (DAG ) and replicated to
geographically-separate datacenters within the same region. The most common configuration is four database
copies in four datacenters; however, some regions have fewer datacenters (databases are replicated to three
datacenters in India, and two datacenters in Australia and Japan). But in all cases, every mailbox database has four
copies that are distributed across multiple datacenters, thereby ensuring that mailbox data is protected from
software, hardware, and even datacenter failures.
Out of these four copies, three of them are configured as highly available. The fourth copy is configured as a
lagged database copy. The lagged database copy is not intended for individual mailbox recovery or mailbox item
recovery. Its purpose is to provide a recovery mechanism for the rare event of system-wide, catastrophic logical
corruption.
Lagged database copies in Exchange Online are configured with a seven-day log file replay lag time. In addition,
the Exchange Replay Lag Manager is enabled to provide dynamic log file play down for lagged copies to allow
lagged database copies to self-repair and manage log file growth. Although lagged database copies are used in
Exchange Online, it is important to understand that they are not a guaranteed point-in-time backup. Lagged
database copies in Exchange Online have an availability threshold, typically around 90%, due to periods where the
disk containing a lagged copy is lost due to disk failure, the lagged copy becoming a highly-available copy (due to
automatic play down), as well as the periods where the lagged database copy is re-building the log replay queue.

Transport Resilience
Exchange Online includes two primary transport resilience features: Shadow Redundancy and Safety Net. Shadow
Redundancy keeps a redundant copy of a message while it is in transit. Safety Net keeps a redundant copy of a
message after the message is successfully delivered.
With Shadow Redundancy, each Exchange Online transport server makes a copy of each messages it receives
before it acknowledges successfully receiving the message to the sending server. This makes all messages in the
transport pipeline redundant while in transit. If Exchange Online determines the original message was lost in
transit, a redundant copy of the message is redelivered.
Safety Net is a transport queue that is associated with the Transport service on a Mailbox server. This queue stores
copies of messages that were successfully processed by the server. When a mailbox database or server failure
requires activating an out-of-date copy of the mailbox database, messages in the Safety Net queue are
automatically resubmitted to the new active copy of the mailbox database. Safety Net is also redundant, thereby
eliminating transport as a single point of failure. It uses the concept of a Primary Safety Net and a Shadow Safety
Net wherein if the Primary Safety Net is unavailable for more than 12 hours, resubmit requests become shadow
resubmit requests, and messages are re-delivered from the Shadow Safety Net.
Message resubmissions from Safety Net are automatically initiated by the Active Manager component of the
Microsoft Exchange Replication service that manages DAGs and mailbox database copies. No manual actions are
required to resubmit messages from Safety Net.

Single Bit Correction


ESE includes a mechanism to detect and resolve single-bit CRC errors (aka single-bit flips) that are the result of
hardware errors (and as such they represent physical corruption). When these errors occur, ESE automatically
corrects them and logs an event in the event log.
Online Database Scanning
Online database scanning (also known as database checksumming) is the process where an ESE uses a database
consistency checker to read each page and check for page corruption. The primary purpose is to detect physical
corruption and lost flushes that may not be getting detected by transactional operations. Database scanning also
performs post-store crash operations. Space can be leaked due to crashes, and online database scanning finds and
recovers lost space. The system is designed with the expectation that every database is fully scanned once every
seven days.

Lost Flush Detection


A lost flush occurs when a database write operation that the disk subsystem/operating system returned as
completed did not actually get written to disk, or was written in the wrong location. Lost flush incidents can result
in database logical corruption, so to prevent lost flushes from resulting in lost data, ESE includes a lost flush
detection mechanism. As database pages are written to passive copies, a check is performed for lost flushes on the
active copy. If a lost flush is detected, ESE can repair the process using a page patching process.

Single Page Restore


Single page restore, aka page patching, is an automatic process where corrupt database pages are replaced by
healthy copies from a healthy replica. The repair process for a corrupt page depends on whether the database copy
is active or passive. When an active database copy encounters a corrupted page, it can copy a page from one of its
replicas, provided the page it copies is completely up-to-date. This is accomplished by putting a request for the
page into the log stream, which is the basis of mailbox database replication. As soon as a replica encounters the
page request it responds by sending a copy of the page to the requesting database copy. Single page restore also
provides an asynchronous communication mechanism for the active to request a page from replicas, even if the
replicas are currently offline.
In case of corruption in a passive database copy, including a lagged database copy, because these copies are always
behind their active copy, it is always safe to copy any page from the active copy to a passive copy. A passive
database copy is by nature highly available, so during the page patching process, log replaying is suspended, but
log copying continues. The passive database copy retrieves a copy of the corrupted page from the active copy,
waits until the log file which meets the maximum required log generation requirement is copied and inspected, and
then patches the corrupt page. Once the page has been patched, log replay resumes. The process is the same for
the lagged database copy, except that the lagged database first replays all log files that are necessary to achieve a
patchable state.

Mailbox Replication Service


Moving mailboxes is a key part of managing a large-scale email service. There are always updated technologies
and hardware and version upgrades to deal with, so having a robust, throttled system that enables our engineers
to accomplish this work while keeping the mailbox moves transparent to users (by making sure they stay online
throughout the process) is key and making sure that the process scales up gracefully as mailboxes get larger and
larger.
The Exchange Mailbox Replication Service (MRS ) is responsible for moving mailboxes between databases. During
the move, MRS performs a consistency check on all items within the mailbox. If a consistency issue is found, MRS
will either correct the problem, or skip the corrupted items, thereby removing the corruption from the mailbox.
Because MRS is a component of Exchange Online, we can make changes in its code to address new forms of
corruption that are detected in the future. For example, if we detect a consistency issue that MRS is not able to fix,
we can analyze the corruption, change the MRS code and correct the inconsistency (if we understand how to).

Log File Checks


All transaction log files generated by an Exchange database undergo several forms of consistency checks. When a
log file is created, the first thing done is a bit pattern is written and then a series of log writes is performed. This
enables Exchange Online to execute a series of checks (lost flush, CRC and other checks) to validate each log file as
it is written, and again as it is replicated.

Deployment on Resilient File System


To help prevent corruption from occurring at the file system level, Exchange Online is being deployed on Resilient
File System (ReFS ) partitions to provide improved recovery capabilities. ReFS is a file system in Windows Server
2012 and later that is designed to be more resilient against data corruption thereby maximizing data availability
and integrity. Specifically, ReFS brings improvements in the way that metadata is updated which offers better
protection for data and reduces data corruption cases. It also uses checksums to verify the integrity of file data and
metadata ensuring that data corruption is easily found and repaired.
Exchange Online takes advantage of several ReFS benefits:
More resiliency in data integrity means fewer data corruption incidents. Reducing the number of corruption
incidents means fewer unnecessary database reseeds.
Checksum running on metadata enabling detections of corruption cases sooner and more deterministically,
allowing us to fix customer data corruption before grey failures occur on data volumes.
Designed to work well with extremely large data sets—petabytes and larger—without performance impact
Support for other features used by Exchange Online, such as BitLocker encryption.
Exchange Online also benefits from other ReFS features:
Integrity (Integrity Streams) - ReFS stores data in a way that protects it from many of the common errors
that can normally cause data loss. Office 365 Search uses Integrity Streams to help with early disk corruption
detection and checksums of file content. The feature also reduces corruption incidents caused by “Torn Writes”
(when a write operation does not complete due to power outages, etc.).
Availability (Salvage) - ReFS prioritizes the availability of data. Historically, file systems were often
susceptible to data corruption that would require the system to be taken offline for repair. Although rare, if
corruption does occur, ReFS implements salvage, a feature that removes the corrupt data from the namespace
on a live volume and ensures that good data is not adversely affected by non-repairable corrupt data. Applying
the Salvage feature and isolating data corruption to Exchange Online database volumes means that we can
keep non-affected databases on a corrupted volume healthy between the time of corruption and repair action.
This increases the availability of databases that would normally be affected by such disk corruption issues.
Malware and Ransomware Protection in Office 365
9/7/2018 • 7 minutes to read • Edit Online

Protecting Customer Data from Malware


Malware consists of viruses, spyware and other malicious software. Office 365 includes protection mechanisms to
prevent malware from being introduced into Office 365 by a client or by an Office 365 server. The use of anti-
malware software is a principal mechanism for protection of Office 365 assets from malicious software. The anti-
malware software detects and prevents computer viruses, malware, rootkits, worms, and other malicious software
from being introduced into any service systems. Anti-malware software provides both preventive and detective
control over malicious software.
Each anti-malware solution in place tracks the version of the software and what signatures are running. The
automatic download and application of signature updates at least daily from the vendor's virus definition site is
centrally managed by the appropriate anti-malware tool for each service team.
The following functions are centrally managed by the appropriate anti-malware tool on each endpoint for each
service team:
Automatic scans of the environment
Periodic scans of the file system (at least weekly)
Real-time scans of files as they are downloaded, opened, or executed
Automatic download and application of signature updates at least daily from the vendor's virus definition site
Alerting, cleaning, and mitigation of detected malware
When anti-malware tools detect malware, they block the malware and generate an alert to Office 365 service team
personnel, Office 365 Security, and/or the security and compliance team of the Microsoft organization that
operates our datacenters. The receiving personnel initiate the incident response process. Incidents are tracked and
resolved, and post-mortem analysis is performed.

SharePoint Online and OneDrive for Business Protection Against


Malware
To further protect the service against malicious files, SharePoint Online (which includes OneDrive for Business)
prohibits certain file types from being uploaded and prevents content from being executed directly in the service.
This prohibits the potential spread of malware from within the service. Anti-malware software is installed both as
part of the initial build on all systems, and on all SharePoint Online servers, enabling further protection by actively
scanning document repositories and code within SharePoint Online sites and libraries.

Exchange Online Protection Against Malware


All email messages for Exchange Online travel through Exchange Online Protection (EOP ), which quarantines and
scans in real time all email and email attachments both entering and leaving the system for viruses and other
malware. Administrators do not need to set up or maintain the filtering technologies; they are enabled by default.
However, administrators can make company-specific filtering customizations using the Exchange Admin Center.
Using multiple anti-malware engines, EOP offers multilayered protection that's designed to catch all known
malware. Messages transported through the service are scanned for malware (including viruses and spyware). If
malware is detected, the message is deleted. Notifications may also be sent to senders or administrators when an
infected message is deleted and not delivered. You can also choose to replace infected attachments with either
default or custom messages that notify the recipients of the malware detection.
The following helps provide anti-malware protection:
Layered Defenses Against Malware - Multiple anti-malware scan engines used in EOP help protect against
both known and unknown threats. These engines include powerful heuristic detection to provide protection
even during the early stages of a malware outbreak. This multi-engine approach has been shown to provide
significantly more protection than using just one anti-malware engine.
Real-time Threat Response - During some outbreaks, the anti-malware team may have enough information
about a virus or other form of malware to write sophisticated policy rules that detect the threat even before a
definition is available from any of the engines used by the service. These rules are published to the global
network every 2 hours to provide your organization with an extra layer of protection against attacks.
Fast Anti-Malware Definition Deployment - The anti-malware team maintains close relationships with
partners who develop anti-malware engines. As a result, the service can receive and integrate malware
definitions and patches before they are publicly released. Our connection with these partners often allows us to
develop our own remedies as well. The service checks for updated definitions for all anti-malware engines
every hour.

Advanced Threat Protection


Advanced Threat Protection (ATP ) is an email filtering service that provides additional protection against specific
types of advanced threats, including malware and viruses. Exchange Online Protection currently uses a robust and
layered anti-virus protection powered by multiple engines against known malware and viruses. ATP extends this
protection through a feature called Safe Attachments, which protects against unknown malware and viruses, and
provides better zero-day protection to safeguard your messaging system. All messages and attachments that don't
have a known virus/malware signature are routed to a special hypervisor environment, where a behavior analysis
is performed using a variety of machine learning and analysis techniques to detect malicious intent. If no
suspicious activity is detected, the message is released for delivery to the mailbox.
Exchange Online Protection also scans each message in transit in Office 365 and provides time of delivery
protection, blocking any malicious hyperlinks in a message. Attackers sometimes try to hide malicious URLs with
seemingly safe links that are redirected to unsafe sites by a forwarding service after the message has been
received. Safe Links proactively protects your users if they click such a link. That protection remains every time
they click the link, and malicious links are dynamically blocked while good links are accessible.
ATP also offers rich reporting and tracking capabilities, so you can gain critical insights into who is getting targeted
in your organization and the category of attacks you are facing. Reporting and message tracing allows you to
investigate messages that have been blocked due to an unknown virus or malware, while the URL trace capability
allows you to track individual malicious links in the messages that have been clicked.
For more information about ATP, see Exchange Online Protection and Office 365 Advanced Threat Protection.

SharePoint Online and OneDrive for Business Protection Against


Ransomware
There are many forms of ransomware attacks, but one of the most common forms is where a malicious individual
encrypts a user's important files and then demands something from the user, such as money or information, in
exchange for the key to decrypt them. Ransomware attacks are on the rise, particularly those that encrypt files that
are stored in the user's cloud storage. For more information about ransomware, see the Windows Defender
Security Intelligence site.
You can use versioning to protect SharePoint Online lists and SharePoint Online and OneDrive for Business
libraries from some, but not all, of these types of ransomware attacks. Versioning is enabled by default in OneDrive
for Business and disabled by default in SharePoint Online. (If you don't see the Version history command, version
history may be turned off. Depending on how your organization has set up personal sites, you may be able to turn
on document versioning.) When versioning is enabled in SharePoint Online site lists, you can look at earlier
versions and recover them, if necessary. That enables you to recover versions of items that pre-date their
encryption by the ransomware. Some organizations also retain multiple versions of items in their lists for legal
reasons or audit purposes.
By default, versioning in SharePoint is turned off. To turn it on and implement your versioning decisions, you must
either have Full Control or Design permissions. For detailed steps to enable versioning for SharePoint libraries and
lists, see Enable and configure versioning for a list or library. For detailed steps to do this, see Restore a previous
version of a document in OneDrive for Business.

SharePoint Online and OneDrive for Business Recycle Bins


SharePoint Online administrators can restore a deleted site collection by using the SharePoint Online admin
center. SharePoint Online users have a Recycle Bin where deleted content is stored. They can access the Recycle
Bin to recover deleted documents and lists, if they need to. Items in the Recycle Bin are retained for 90 days. The
following data types are captured by the Recycle Bin:
Site collections
Sites
Lists
Libraries
Folders
List items
Documents
Web Part pages
Site customizations made through SharePoint Designer are not captured by the Recycle Bin. For more information,
see Manage the Recycle Bin of a SharePoint site collection. See also, Restore a deleted site collection.
Versioning does not protect against ransomware attacks that copy files, encrypt them, and then delete the original
files. However, end-users can leverage the Recycle Bin to recover OneDrive for Business files after a ransomware
attack occurs.
Office 365 Monitoring and Self-Healing
8/21/2018 • 4 minutes to read • Edit Online

Given the scale of Office 365, it would be impossible to keep customer data resilient and safe from malware
without built-in monitoring that is comprehensive, alerting that is intelligent, and self-healing that is fast and
reliable. Monitoring a set of services at the scale of Office 365 is very challenging. New mindsets and
methodologies needed to be introduced, and whole new sets of technology needed to be created to operate and
manage the service in a connected global environment. We have moved away from the traditional monitoring
approach of data collection and filtering to create alerts to an approach that is based on data analysis; taking
signals and building confidence in that data and then using automation to recover or resolve the issue. This
approach helps take humans out of the recovery equation, which in turn makes operations less expensive, faster,
and less error prone.
Fundamental to Office 365 monitoring is a collection of technologies that comprise our Data Insights Engine,
which is built on Azure, SQL Azure, and open-source streaming database technology. It is designed to collect and
aggregate data and reach conclusions. Currently, it processes more than 500 million events per hour from more
than 100,000 servers (~15 TB per day) scattered across dozens of datacenters in many regions, and these numbers
are growing.
Office 365 uses outside-in monitoring, which involves creating synthetic transactions to test everything that is
important. For example, in Exchange Online each scenario is testing every database worldwide every five minutes
in a scattered fashion, providing near continuous coverage of everything that lives in the system. From multiple
locations, 250 million test transactions per day are performed to create a robust baseline or heartbeat for the
service.
Office 365 also uses the concept of Red Alert, which shrinks down all the monitoring signals from all of the
machines in our datacenters to something manageable by a human being. The concept is quite simple: If
something is happening across multiple signals, there must be something going on. It is not about building
confidence in one signal, it is about having reasonable fidelity for each signal so that you get greater accuracy. This
monitoring system is so powerful that we do not have 24x7 staff watching our monitors; all we have is the
machinery that wakes up if it detects a problem, in which case it will page the appropriate on-call personnel, or
more often as is the case, it will just go ahead and solve the problem. Once we start collecting signals and building
red alerts off them, we can start triangulating across all our service partitions.
Based on the combination of the failure alert and the Red Alerts, this alert indicates exactly which components
could be having a problem, and that the system is going to try to correct the problem by itself by restarting a
mailbox server.
In addition to self-healing capabilities such as single page restore, Exchange Online includes several features that
take an approach to monitoring and self-healing which focuses on preserving the end-user experience. These
features include Managed Availability, which provides built-in monitoring and recovery actions, and AutoReseed,
which automatically restores database redundancy after a disk failure.

Managed Availability
Managed availability provides a native health checking and recovery solution that monitors and protects the end
user's experience through recovery-oriented actions. Managed availability is the integration of built-in monitoring
and recovery actions with the Exchange high availability platform. It's designed to detect and recover from
problems as soon as they occur and are discovered by the system. Unlike previous external monitoring solutions
and techniques for Exchange, managed availability doesn't try to identify or communicate the root cause of an
issue. Instead, it's focused on recovery aspects that address three key areas of the end-user experience:
Availability - Can users access the service?
Latency - How is the experience for users?
Errors - Are users able to accomplish what they want?
Managed availability is an internal feature that runs on every Office 365 server running Exchange Online. It polls
and analyzes hundreds of health metrics every second. If something is found to be wrong, most of the time it is
fixed automatically. But there will always be issues that managed availability will not be able to fix on its own. In
those cases, managed availability will escalate the issue to an Office 365 support team by means of event logging.

AutoReseed
Exchange Online servers are deployed in a configuration that stores multiple databases and their log streams on
the same non-RAID disk. This configuration is often referred to as just a bunch of disks (JBOD ) because no storage
redundancy mechanisms, such as RAID, are being used to duplicate the data on the disk. When a disk fails in a
JBOD environment, the data on that disk is lost.
Given the size of Exchange Online and the fact that deployed within it are millions of disk drives, disk drive failures
are a regular occurrence in Exchange Online. In fact, more than 100 fail every day. When a disk fails in an on-
premises enterprise deployment, an administrator must manually replace the failed disk and restore the affected
data. In a cloud deployment the size of Office 365, having operators (cloud administrators) manually replacing
disks is neither practical nor economically feasible.
Automatic Reseed, or AutoReseed, is a feature that is the replacement for what is normally operator-driven action
in response to a disk failure, database corruption event, or other issue that necessitates a reseeding of a database
copy. AutoReseed is designed to automatically restore database redundancy after a disk failure by using spare
disks that have been provisioned on the system. If a disk fails, the database copies stored on that disk are
automatically reseeded to a preconfigured spare disk on the server, thereby restoring redundancy.
SharePoint Online Data Resiliency
8/21/2018 • 2 minutes to read • Edit Online

A key principle for SharePoint Online is to never have a single copy of any piece of data. SharePoint Online uses
SQL Server replication, which is a set of technologies for copying and distributing data and database objects from
one database to another, and then synchronizing between databases to maintain consistency.
For example, when a user saves a file in SharePoint Online, the file is chunked, encrypted, and stored within Azure
Blob storage. Azure Blob service provides mechanisms to ensure data integrity both at the application and
transport layers. This post will detail these mechanisms from the service and client perspective. MD5 checking is
optional on both PUT and GET operations; however, it does provide a convenience facility to ensure data integrity
across the network when using HTTP. Additionally, since HTTPS provides transport layer security additional MD5
checking is not needed while connecting over HTTPS as it would be redundant. Azure Blob service provides a
durable storage medium, and uses its own integrity checking for stored data. The MD5's that are used when
interacting with an application are provided for checking the integrity of the data when transferring that data
between the application and service via HTTP.
To ensure data integrity the Azure Blob service uses MD5 hashes of the data in a couple different manners. It is
important to understand how these values are calculated, transmitted, stored, and eventually enforced to
appropriately design your application to utilize them to provide data integrity. For more information, see Windows
Azure Blob MD5 Overview.
Metadata and pointers to the file are stored in a SQL Server database (the content database). All the chunks – files,
pieces of files, and update deltas – are stored as blobs in Azure storage that are randomly distributed across
multiple Azure storage accounts. The SQL database is hosted on a RAID 10 storage array which is synchronously
mirrored to another RAID 10 storage array in a separate rack within the same datacenter. Asynchronous log
shipping is then used to replicate the data to another RAID 10 storage array in a second datacenter. In addition to
protecting data with RAID 10 and synchronous and asynchronous replication, scheduled data backups are taken
which are also asynchronously replicated to the second datacenter.
In SharePoint Online, data backups are performed every 12 hours and retained for 14 days. SharePoint Online
also uses a hot standby system that includes paired geographically-separate datacenters within the same customer
data location region (for example, Chicago and San Antonio for customers who have provisioned their tenant in
the United States) configured as active/active. For example, there are live users that have Chicago as their primary
datacenter and San Antonio as a failover datacenter, and live users that have San Antonio as their primary
datacenter and Chicago as their failover datacenter.
Data Retention, Deletion, and Destruction in Office
365
9/21/2018 • 2 minutes to read • Edit Online

Microsoft has a Data Handling Standard policy for Office 365 that specifies how long customer data will be
retained after being deleted. There are generally two scenarios in which customer data is deleted:
Active Deletion - The tenant has an active subscription and a user deletes data, or data provided by a user is
deleted by the administrator.
Passive Deletion - The tenant subscription ends.

Data Retention
For each of these deletion scenarios, the following table shows the maximum data retention period, by data
category and classification:

DATA CATEGORY DATA CLASSIFICATION DESCRIPTION EXAMPLES RETENTION PERIOD

Customer Data Customer Content Content directly Examples of the most Active Deletion
provided/created by commonly used Office Scenario: at most 30
admins and users 365 applications days
which allow users to
This includes all text, author data include Passive Deletion
sound, video, image Word, Excel, Scenario: at most
files, and software PowerPoint, Outlook 180 days
created and stored in and OneNote
Microsoft data
centers when using Customer content
the services in Office also includes
365 customer-
owned/provided
secrets (passwords,
certificates,
encryption keys,
storage keys)

Customer Data End User Identifiable Data that identifies or User name or display Active Deletion
Information (EUII) could be used to name Scenario: at most
identify the user of a (DOMAIN\UserName) 180 days (only a
Microsoft service. EUII tenant administrator
does not contain User principal name action)
Customer content (name@domain)
Passive Deletion
User-specific IP Scenario: at most
addresses 180 days
DATA CATEGORY DATA CLASSIFICATION DESCRIPTION EXAMPLES RETENTION PERIOD

Personal Data End User An identifier created User GUIDs, PUIDs, or Active Deletion
(data not included in Pseudonymous by Microsoft tied to SIDs Scenario: at most 30
Customer Data) Identifiers (EUPI) the user of a days
Microsoft service. Session IDs
When EUPI is Passive Deletion
combined with other Scenario: at most
information, such as a 180 days
mapping table, it
identifies the end user

EUPI does not contain


information uploaded
or created by the
customer

Subscription Retention
At all times during the term of an active subscription, a subscriber can access, extract, or delete customer data
stored in Office 365. If a paid subscription ends or is terminated, Microsoft will retain customer data stored in
Office 365 in a limited-function account for 90 days to enable the subscriber to extract the data. After the 90-day
retention period ends, Microsoft will disable the account and delete the customer data. No more than 180 days
after expiration or termination of a subscription to Office 365, Microsoft will disable the account and delete all
customer data from the account. Once the maximum retention period for any data has elapsed, the data is
rendered commercially unrecoverable.
In the case of a free trial, your account will move into a grace status for 30 days in most countries and regions.
During this grace period, you have the option to purchase Office 365. If you decide not to buy Office 365, you can
either cancel your trial or let the grace period expire, and your trial account information and data will be deleted.

Expedited Deletion
At all times during the term of any subscription, a subscriber can contact Microsoft Support and request expedited
subscription deprovisioning. In this process, all user data, including data in SharePoint Online, Exchange Online
that may be under hold or stored in inactive mailboxes, is deleted three days after the administrator enters the
lockout code provided by Microsoft. For more information on expedited deprovisioning, see Cancel Office 365.

Related Links
Data Destruction
Immutability in Office 365
Exchange Online Data Deletion
SharePoint Online Data Deletion
Skype for Business Data Deletion
Office 365 Data Destruction
8/21/2018 • 2 minutes to read • Edit Online

Microsoft has Data Handling Standard policies that addresses recycle and disposal of disk drives and failed or
retiring servers. Before re-using any disk drives within Office 365, Microsoft performs a physical sanitization
process that is consistent with National Institute of Standards and Technology Special Publication 800-88 (NIST
SP 800-88 Guidelines for Media Sanitization). All disk drives in Office 365 are encrypted using BitLocker volume
level encryption, so in practice, NIST SP 800-88-compliant erasure is not necessary. Nonetheless, it is still
performed by Microsoft.
Failed disks used within Office 365 datacenters are physically destroyed and audited through the ISO process. The
appropriate means of disposal is determined by the asset type. For hard drives that can't be wiped, Microsoft uses
a destruction process that destroys the media (e.g., disintegrates, pulverizes, or incinerates) and renders the
recovery of information impossible. Microsoft also retains all records of the destruction. Microsoft performs a
similar sanitization process on servers that are being re-used within Office 365. These guidelines encompass both
electronic and physical sanitization.
Disk drives that cannot be re-used are disposed of using a physical destruction process that is performed on-site
within the datacenter containing the disks being destroyed. Storage media designated for disposal are placed in
secure bins located in each area of the datacenter. Each secure bin station is monitored by video surveillance. Once
a disposal bin reaches approximately 50% capacity, the Site Services team contacts the Physical Security team to
coordinate its removal. Site Services personnel then remove the disposal bin under escort by a Security Officer
until it is placed in a secured storage area to await data destruction. Policies and procedures governing the
handling of data bearing devices during disposal are routinely tested including procedures to ensure the condition
of machinery approved for destruction.
In the data destruction process, the disk is first erased in a manner that is compliant with NIST 800-88 (if possible),
and then it is placed into an industrial shredder and physically demolished. Microsoft maintains accountability for
assets leaving the datacenter using NIST SP 800-88 consistent cleansing/purging, asset destruction, encryption,
accurate inventorying, tracking, and protection of chain of custody during transport. This process is monitored via
closed-circuit television and a Certificate of Destruction is issued upon completion.
Microsoft uses data erasure units from Extreme Protocol Solutions (EPS ). EPS software supports NIST SP 800-88
requirements for cleansing and purging/secure erasure. Prior to cleansing or destruction, an inventory is created
by the Microsoft asset manager. If a vendor is used for destruction, the vendor provides a certificate of destruction
for each asset destroyed, which is validated by the asset manager.
Immutability in Office 365
8/21/2018 • 3 minutes to read • Edit Online

For some organizations, regulatory compliance, internal governance requirements, or litigation risk require the
preservation of email and associated data in a discoverable form. All data in the system must be discoverable, and
none of it can be destroyed or altered. The industry-standard term for this is "immutability."
Traditional methods of achieving immutability have typically worked by moving email messages to a separate,
read-only storage location. While such systems serve the purpose of preserving mailbox items for discovery, they
often affect the user experience in significant ways by removing preserved items from the customary daily
workflow. For IT professionals, this approach to immutability requires the deployment and ongoing maintenance
of a separate server and storage infrastructure. Discovery itself is performed with tools external to the mail system,
with associated deployment and maintenance costs.
Through configuration of the in-place retention and preservation policy features of archiving in Office 365, and in
conjunction with services in the Office 365 suite, such as Exchange Online, SharePoint Online, OneDrive for
Business and Skype for Business, archiving in Office 365 can preserve and retain many classes of incoming,
internal and outgoing data including:
Inbound and outbound email communications
Books and records contained in email form or in shared online documents
Meeting requests
Faxes
Instant messages
Documents shared during online meetings
Voicemails
In addition, Microsoft has developed add-on features to allow archiving of data from other sources through
integration with third-party data capturing and management solutions. After third-party data is imported, you can
apply Office 365 compliance features to the data, including Litigation Hold, In-Place eDiscovery and Hold,
Compliance Search, In-Place Archiving, Auditing, and Retention Policies. For example, when a mailbox is placed on
Litigation Hold, third-party data will be preserved. You can search third-party data by using In-Place eDiscovery or
Compliance Search. Or you can apply archiving and retention polices to third-party data just like you can for
Microsoft data. In short, archiving third-party data in Office 365 can help your organization stay compliant with
government and regulatory policies.
Archiving in Office 365 provides Securities and Exchange Commission (SEC ) Rule 17a-4-compliant storage, and
preserves permanent files of all data collected in a non-rewriteable, non-erasable format using in-place retention
policies and preservation policies, including preservation lock. Specifically:
All records that are stored using the retention policies noted above are retained in a dedicated storage area out
of the purview of the ordinary user. Furthermore, only authorized users can access and search these records,
but cannot alter or erase them.
Metadata for each item includes a timestamp that is used in the calculation of retention duration. Timestamps
are applied when a new item is received or created and cannot be subsequently modified or removed from the
metadata.
Archiving in Office 365 allows users to combine different retention policies and hold actions to create granular
retention policies to define the type or location of the items to be immutably preserved, and the duration of
such preservation.
The Preservation Lock feature allows users to choose whether they want to make the policy a restrictive policy.
A restrictive policy prohibits anyone from having the ability to remove, disable or make any changes to the
retention policy. This means that once Preservation Lock is enabled, it cannot be disabled, and no mechanism
will exist under which any data from existing custodians that has been collected by the retention policies in
place may be overwritten, modified, erased or deleted during the preservation period. Further, the hold period
set by Preservation Lock may not be shortened or decreased. It may, however, be lengthened, in the case of a
legal requirement to continue retention of the stored data, as noted above. Preservation Lock ensures that no
one, not even administrators or those with certain control access, may change the settings or overwrite or erase
data that has been stored, bringing archiving in Office 365 in line with the guidance set forth in the 2003
Release of SEC Rule 17a-4.
To customers better understand how Office 365 can be leveraged to meet their regulatory obligations, specifically
in relation to Rule 17a-4 requirements, we have released a whitepaper that covers Exchange Online Archiving,
SharePoint Online, OneDrive for Business, and Skype for Business. The whitepaper also provides an in-depth
analysis of Office 365 archiving features and functionalities against each of the requirements under SEC Rule 17a-
4 and demonstrates to regulated customers how Office 365 archiving can enable them to meet these
requirements.
Exchange Online Data Deletion in Office 365
8/21/2018 • 7 minutes to read • Edit Online

Within Exchange Online, there are two kinds of deletions: soft deletions and hard deletions. This applies to both
mailboxes and items within a mailbox.

Soft-Deleted and Hard-Deleted Mailboxes


A soft-deleted user mailbox is a mailbox that has been deleted using the Office 365 admin center or the Remove-
Mailbox cmdlet and has still been in the Azure Active Directory recycle bin for less than 30 days. A mailbox can
become soft-deleted in any of the following ways:
The user mailbox's associated Azure Active Directory user account is soft-deleted (the user object is out of
scope or in the recycle bin container).
The user mailbox's associated Azure Active Directory user account has been hard-deleted but the Exchange
Online mailbox is under a litigation hold or eDiscovery hold.
The user mailbox's associated Azure Active Directory user account has been purged within the last 30 days;
which is the maximum retention length Exchange Online will keep the mailbox in a soft-deleted state before it is
permanently purged and unrecoverable.
A hard-deleted user mailbox is a mailbox that has been deleted in one of the following ways:
The user mailbox has been soft-deleted for more than 30 days, and the associated Azure Active Directory user
has been hard-deleted. All mailbox content such as emails, contacts and files are permanently deleted.
The user account associated with the user mailbox has been hard-deleted from the Azure Active Directory. The
user mailbox is now soft-deleted in Exchange Online and stays in a soft-deleted state for 30 days. If in the 30-
day period a new Azure Active Directory user is synchronized from the original recipient account with the same
ExchangeGuid or ArchiveGuid, and that new account is licensed for Exchange Online, this will result in a
hard deletion of the original user mailbox. All mailbox content such as emails, contacts and files are
permanently deleted.
A soft-deleted mailbox is deleted using Remove-Mailbox -PermanentlyDelete.
The above deletion scenarios assume that the user mailbox isn't in any of the hold states, like Litigation hold or
eDiscovery hold. If there is any type of hold on the mailbox, then the mailbox can't be deleted. For all mail-user
recipient types, any Hold settings are ignored and have no effect on hard-deletions or soft-deletions.

Soft-Deleted and Hard-Deleted Items


When a user deletes a mailbox item (such as an email message, a contact, a calendar appointment, or a task), the
item is moved to the Recoverable Items folder, and into a subfolder named Deletions. This is referred to as a soft
deletion. How long deleted items are kept in the Deletions folder depends on the deleted item retention period that
is set for the mailbox. An Exchange Online mailbox keeps deleted items for 14 days by default, but Exchange
Online administrators can change this setting to increase the period up to a maximum of 30 days. (For detailed
steps to increase the deleted item retention period for an Exchange Online mailbox, see Change how long
permanently deleted items are kept for an Exchange Online mailbox.) Users can recover, or purge, deleted items
before the retention time for a deleted item expires. To do so, they use the Recover Deleted Items feature in
Microsoft Outlook or Outlook on the web.
If a user purges a deleted item by using the Recover Deleted Items feature in Outlook or Outlook on the web, this
is known as a hard deletion. In Exchange Online, single item recovery is enabled by default when a new mailbox is
created, so an administrator can still recover hard-deleted items before the deleted item retention period expires.
Also, if a message is changed by a user or a process, copies of the original item are also retained when single item
recovery is enabled.

Page Zeroing
Zeroing is a security mechanism that writes either zeros or a binary pattern over deleted data so that the deleted
data is more difficult to recover. In Exchange Online, mailbox databases use pages as their unit of storage, and
implement an overwriting process called page zeroing. Page zeroing is enabled by default, and it cannot be
disabled by customers or by Microsoft. Page zeroing operations are recorded in the transaction log files so that all
copies of a given database are page-zeroed in a similar manner. Zeroing a page on an active database copy causes
the page to get zeroed on passive copies of the database.
Page zeroing writes a binary pattern over hard-deleted records. The page-zeroing pattern is specific to Extensible
Storage Engine (ESE ) operations (the name of the internal database engine used by servers in Exchange Online),
and it is different for run-time operations versus background database maintenance operations. (Background
database maintenance is a process that continuously checksums and scans each database. Its primary function is to
checksum database pages, but it also handles cleaning up space and zeroing out records and pages that were not
zeroed out because of a Store crash.)
The following table lists the fill patterns that correspond to specific run-time operations.

ESE RUN-TIME OPERATION FILL PATTERN

Replace R

Record/long value delete D

Freed page space H

The following table lists the fill patterns that correspond to specific operations that occur during ESE background
database maintenance.

ESE BACKGROUND DATABASE MAINTENANCE OPERATION FILL PATTERN

Record delete D

Long value delete L

Freed page space of partially used page Z

Freed page space of unused page U

Page Zeroing Process


The process for page zeroing depends on the deletion scenario. The following table discusses database delete
scenarios, and when page zeroing functions occur.

DATABASE DELETE SCENARIO ESE PROCESS AND TIMEFRAME TO ZERO DATABASE DATA
DATABASE DELETE SCENARIO ESE PROCESS AND TIMEFRAME TO ZERO DATABASE DATA

Item expires based on the deleted item retention period. An asynchronous thread writes a binary pattern over the
deleted data. This action occurs within milliseconds of the
record deletion. If the Store process crashes while the
asynchronous zeroing work is still outstanding (or version
store cleanup is cancelled due to version store growth), the
zeroing is completed when background database maintenance
processes that section of the database.

View Scenario: Expiration of items from Outlook/Outlook on Data zeroing occurs when background database maintenance
the web folder view (for example, Conversation view) processes that section of the database.

Move Mailbox/Delete Mailbox Scenario: Source mailbox Data zeroing occurs when background database maintenance
deleted (expiry of deleted mailbox) processes that section of the database.

Mailbox Data Types without Page Zeroing


The following mailbox data types have no provisions for page zeroing:
Mailbox database transaction logs - When transaction logs are deleted as part of normal operations, there
is no process to zero the blocks in the file system that stored the deleted log file(s). It's likely that the file system
will quickly re-utilize that free space for newly created logs, but there is no guarantee that this will happen.
Content index catalog files - Exchange Online uses Search Foundation (also known as FAST) for search
indexing functionality. The search index catalog is comprised of several dozen files stored on the same volume
as the mailbox database file. When a message is hard-deleted from the mailbox database, the associated
content in the search catalog isn't immediately deleted. Content deletion occurs when Search Foundation does
a shadow (or master merge) of many small catalog files in to a single larger file. After the master merge
completes, the smaller catalog files are deleted. There is no process to zero the blocks which stored the deleted
catalog files.

Continuous Replication
Continuous replication (also known as log shipping and replay) is technology in Exchange Online that creates and
maintains copies of every mailbox database to provide high availability, site resilience, and disaster recovery.
Continuous replication leverages the Exchange Server database crash recovery support to provide technology that
performs asynchronous updating of one or more copies of a mailbox database. Each mailbox server records
database updates made on an active database (for example, user email activity) as log records in a sequential set of
1 MB transaction log files. This set of files is referred to as the log stream. In continuous replication, the log stream
is also used to asynchronously update one or more copies of a database. This is accomplished by transmitting the
logs to a location containing a passive copy of the active database and then replaying them into the passive
database copy. If all logs from the active database are replayed against a passive copy of the database, then the two
databases are equivalent, and it is through this process that any physical change made to an active database is
replicated to all passive copies of that database.
Any deletion from a mailbox database, whether a mailbox item or an entire mailbox, and whether a soft-delete or a
hard-delete, represents a physical change to the active database. Page zeroing also entails making physical changes
to the active database. These changes are written to the log files through a process called continuous replication,
and when those log files are replayed against passive copies of the database, the same physical changes are made
to those passive databases.
SharePoint Online Data Deletion in Office 365
10/4/2018 • 2 minutes to read • Edit Online

SharePoint Online stores objects as abstracted code within application databases. When a user uploads a file to
SharePoint Online, that file is disassembled and translated into application code and stored in multiple tables
across multiple databases. In SharePoint Online, all content that a customer uploads is broken into chunks,
encrypted (potentially with multiple AES 256-bit keys), and distributed across the datacenter. For specific details
about the chunking and encryption process, see Encryption in the Microsoft Cloud. Data protection services are
provided to prevent the loss of SharePoint Online data. Specifically, backups are performed every 12 hours and
retained for 14 days.
When you delete content from a SharePoint Online site, it's not deleted immediately. It's sent to a Site Recycle Bin,
where it can be restored, if needed. (See Restore deleted items from the site collection recycle bin for restore steps.)
The default Site Recycle Bin retention time is about 90 days. If you delete content from a Site Recycle Bin, it's sent
to the Site Collection Recycle Bin, which has a retention time of 93 days. The length of time to keep things in the
recycle bin can be configured by an administrator, but in the absence of that, the default retention period is about
90 days. The site recycle bin storage counts against site collection storage quota and the List View Threshold.
When you delete a site collection, you're also deleting the hierarchy of sites in the collection, including all content
and user information:
Documents and document libraries
Lists and list data
Site configuration settings
Role and security information that is related to the site or its subsites
Subsites of the top-level website, their contents, and user information
Before you delete a site collection, we recommend you review the SharePoint Online Service Description for your
plan, which outlines the data backup schedule maintained by Microsoft for SharePoint Online sites. Also note that
restorations from backups can are only for site collections or sub-sites, not for files, lists, or libraries. If you need to
recover those, use the Recycle Bin. If you accidentally delete a site collection, it can be restored from the Site
Collection Recycle Bin by a Site Collection Administrator within 93 days.
Hard deletion occurs when a user purges deleted items from the Site Recycle Bin, and the retention and backup
periods expire, or when an administrator permanently deletes a site collection using the Remove-SPODeletedSite
cmdlet. When a user hard deletes (permanently deletes, or purges) content from SharePoint Online, all encryption
keys for the deleted chunks are also deleted. The blocks on the disks that previously stored the deleted chunks are
marked as unused and available for re-use.
Skype for Business Data Deletion in Office 365
8/21/2018 • 3 minutes to read • Edit Online

Skype for Business provides archiving of peer-to-peer instant messages, multiparty instant messages, and content
upload activities in meetings. The archiving capability requires Exchange and is controlled by the user's Exchange
mailbox In-Place Hold attribute, which archives both email and Skype for Business contents.
All archiving in Skype for Business is considered "user-level archiving" because you enable or disable it for one or
more specific users or groups of users by creating, configuring, and applying a user-level archiving policy for those
users. There is no direct control of archiving settings from within the Skype for Business admin center.
The following types of content are not archived in Skype for Business:
Peer-to-peer file transfers
Audio/video for peer-to-peer instant messages and conferences
Application sharing for peer-to-peer instant messages and conferences
Conferencing annotations

Meeting Content Retention


Customers using Skype for Business can upload content to a Skype for Business meeting as attachments, such as
PowerPoint presentations, OneNote files, and other files. The retention period for content that has been uploaded
to a meeting is as follows:
One-time meeting - Content is retained for 15 days starting from when the last person leaves the meeting.
Recurring meeting - Content is retained for 15 days after the last person leaves the last session of the
meeting. The retention timer resets if someone joins the same meeting session within 15 days. For example,
assume a Skype for Business meeting is scheduled to occur on a weekly basis for one year, and a file is
uploaded to the meeting during the first instance. If at least one person joins the meeting session every week,
the file is retained in Skype for Business Online servers for the entire year plus 15 days after the last person
leaves the last meeting of the series.
Meet Now meeting - Content is retained for 8 hours after the meeting end time.

NOTE
If a user is unlicensed or disabled (e.g., if msRTCSIP-userenabled is set to False), and is then re-licensed or reenabled,
meeting content is not retained.

Meeting Expiration
Users can access a specific meeting after the meeting has ended, subject to the following expiration time periods:
One-time meeting - Meeting expires 14 days after the scheduled meeting end time.
Recurring meeting with end date - Meeting expires 14 days after the scheduled end time of the last meeting
occurrence.
Meet Now meeting - Meeting expires after 8 hours.

Whiteboard Collaboration
Annotations made on whiteboards will be seen by all participants. When saving a whiteboard, the whiteboard and
all annotations will be stored on a Skype for Business server, and it will be retained on the server according to
meeting content expiration policies set by the administrator.

Audio Test Service


A short (approximately 5 seconds) sample of your voice is recorded during the Audio Test Service call. The voice
sample is used by you to check and/or verify the sound quality of your Skype for Business call based on the quality
of the recording. When the Audio Test Service call ends, the voice sample is deleted.

Persistent Group Chat


Persistent Group Chat stores the content of group chat conversations. If enabled, the administrator can control the
retention period, the server on which this information is stored, if Group Chat history is archived for compliance or
other purposes, and manage/modify any properties on a room. Users with different roles have different access to
the persisted data, as follows:
Administrators can delete older content (for example, content posted before a certain date) from any chat room
to keep the size of the database from growing greatly. Or, they can remove or replace messages considered
inappropriate for a given chat room (or considered unsuitable).
End-users, including message authors, cannot delete content from any chat room.
Chat room managers can disable rooms but cannot delete rooms. Only administrators can delete a chat room
after it is created.
Administrative Access Controls in Office 365
8/21/2018 • 3 minutes to read • Edit Online

Introduction
Microsoft has invested heavily and accordingly in systems and controls that automate most Office 365 operations
while intentionally limiting Microsoft's access to customer content. Humans govern the service, and software
operates the service. This enables Microsoft to manage Office 365 at scale, as well as manage the risks of internal
threats to customer content such as malicious actors, the spear-phishing of a Microsoft engineer, and so forth.
By default, Microsoft engineers have zero standing administrative privileges and zero standing access to customer
content in Office 365. A Microsoft engineer can have limited, audited, and secured access to a customer's content
for a limited amount of time, but only when necessary for service operations, and only when approved by a
member of Microsoft senior management (and for customers that are licensed for the Customer Lockbox feature,
the customer).
Microsoft provides online services, including Office 365, using multiple forms of cloud delivery:
Public Clouds - includes multi-tenant versions of Office 365, Azure, and other services that are hosted in
North America, South America, Europe, Asia, Australia, etc.
National Clouds - includes all sovereign and third party-operated clouds outside of the United States (except
for those noted above), such as Office 365 in China (which is operated by 21Vianet), and Office 365 in
Germany (which is operated by Microsoft but under a model in which a German data trustee, Deutsche
Telekom, controls and monitors Microsoft's access to Customer Data and systems that contain Customer Data).
Government Clouds - includes Office 365 and Azure services that are available to United States government
customers.
For purposes of this article, Office 365 services include Exchange Online, Exchange Online Protection, SharePoint
Online (including OneDrive for Business) and Skype for Business, with additional information about some
Yammer Enterprise access controls. Other Office 365 services are out of scope for this article.

Office 365 Access Controls


For access control purposes, Office 365 data is categorized as either Customer Data or other types of data.
Customer Data is all data provided by or on behalf of a customer through the customer's use of Office 365
services, such as customer content (content directly created or uploaded by Office 365 users including emails,
SharePoint Online content, instant messages, calendar items, documents, and contacts stored in Office 365) and
end-user identifiable information (EUII) (data that is unique to a user or that is linkable to an individual user but
does not include customer content).
Other types of data include account data (includes administrative data, which is the information provided by
administrators when they sign-up or purchase services, and payment data, which is information about payment
instruments, such as credit card details), organizationally identifiable information (data that can be used to identify
a tenant; or usage data; it is not linkable to an individual user and does not include customer content), and system
metadata (includes service logs that contain configuration settings, system status, Microsoft IP addresses, and
technical information about subscriptions and tenants).
Microsoft has established access control mechanisms to ensure that no one has unapproved access to Customer
Data or access control data (used to manage access to other types of data or functions within the environment,
including access to customer content or EUII; it includes Microsoft passwords, security certificates, and other
authentication-related data) or unapproved physical, logical, or remote access to the Office 365 production
environment.
The access controls used by Microsoft for operating Office 365 can be grouped into three categories:
Isolation Controls
Personnel Controls
Technology Controls
When combined, these controls help prevent and detect malicious actions in Office 365. In addition to the isolation,
personnel, and technology controls used by Microsoft, there is a fourth category of controls: those implemented by
customers.
Office 365 allows you to manage your data much in the same way data is managed in on-premises environments.
The person who signs up an organization for Office 365 automatically becomes a global administrator (admin).
The global admin has access to all features in the management portals (e.g., admin centers and remote
PowerShell), and can create or edit users, assign admin roles to others, reset user passwords, manage user licenses,
manage domains, and approve Customer Lockbox requests, among other things. We recommend that each
organization designate at least two admin accounts, and depending on the size of your organization, you may want
to designate several admins who serve different functions. For information about assigning admin roles and
permissions, see Assigning admin roles in Office 365 and About Office 365 admin roles.

Related Links
Isolation Controls
Personnel Controls
Technology Controls
Monitoring and Auditing Access Controls
Yammer Enterprise Access Controls
Monitoring and Auditing Access Controls in Office
365
8/21/2018 • 2 minutes to read • Edit Online

Microsoft performs extensive monitoring and auditing of all delegation, all use of privileges, and all operations that
occur within Office 365. Office 365 access control is an automated process built on the principle of least privilege
and to incorporate data access controls and audits:
All permitted access is traceable to a unique user, making administrators accountable for their handling of
customer content.
Access control requests, approvals, and administrative operations logs are captured for analysis of security
insights and malicious events.
Access levels are reviewed in near real-time based on security group membership to ensure that only users
who have authorized business justifications and meet the eligibility requirements have access to the systems.
Office 365, its access controls, and supporting services, including Azure Active Directory and our physical
datacenters, are regularly audited by independent third-parties for compliance with ISO/IEC 27001, ISO/IEC
27018, SOC, FedRAMP, and other standards.
Office 365 engineers are required to take yearly security training reviewing elevated access best practices and
risks and acknowledge Microsoft's security and privacy policies to continue maintaining their entitlements to
the service.
Automated alerts are triggered when suspicious activity is detected, such as multiple failed logins within a short
period. The Office 365 Security Response team uses machine learning and big data analysis to review and analyze
activity for irregular access patterns and to proactively respond to anomalous and illicit activities. Microsoft also
employs a dedicated team of penetration testers and engages in periodic red team and blue team exercises to find
security and access control issues in the service. Customers may also verify the effectiveness of access control
systems by using audit reports and the management activity API provided by Office 365.
For more information, see Office 365 Management Activity API reference and Auditing and Reporting in Office
365.
Office 365 Isolation Controls
8/21/2018 • 2 minutes to read • Edit Online

Microsoft continuously works to ensure that the multi-tenant architecture of Office 365 supports enterprise-level
security, confidentiality, privacy, integrity, and availability standards, as well as local and international standards.
Given the scale and the scope of services provided by Microsoft, it would be difficult and non-economical to
manage Office 365 if significant human interaction were required. Office 365 services are provided through
multiple globally-distributed datacenters, in a highly-automated fashion, where extremely few datacenter
operations require a human touch, and even fewer operations require access to customer content. Our staff
supports these services and datacenters using automated tools and highly secure remote access. For some of the
details about how large-scale services are operated in Office 365, see a behind the scenes look at Office 365 for IT
Pros.
Office 365 is composed of multiple services that provide important business functionality and contribute to the
entire Office 365 experience. Each of these services is designed to be self-contained and to integrate with one
another. Office 365 is designed with the principles of a Service-Oriented Architecture, which is defined as
designing and developing software in the form of interoperable services providing well-defined business
functionality, and Operational Security Assurance, a framework that incorporates the knowledge gained through a
variety of capabilities that are unique to Microsoft, including the Microsoft Security Development Lifecycle, the
Microsoft Security Response Center, and deep awareness of the cybersecurity threat landscape.
Office 365 services interoperate with each other, but they are designed and implemented so that they can be
deployed and operated as autonomous services, independent of each other. Microsoft segregates duties and areas
of responsibility for Office 365 to reduce opportunities for unauthorized or unintentional modification or misuse of
the organization's assets. Office 365 teams have defined roles as part of a comprehensive role-based access
control mechanism.

Customer Content Isolation


All customer content belonging to a tenant is isolated from other tenants and from the operations and systems
data used in the management of Office 365. Multiple forms of protection have been implemented throughout
Office 365 to minimize the risk of compromise of any Office 365 service or application, or any gaining of
unauthorized access to the information of tenants or the Office 365 system itself. For information about how
Microsoft implements logical isolation of tenant data within Office 365, see Tenant Isolation in Office 365.
Office 365 Personnel Controls
8/21/2018 • 7 minutes to read • Edit Online

Personnel screening, which is the process of reviewing and validating a person's past behavior and status, is an
important mitigation control to prevent Office 365 service compromise. While past behavior is not a perfect
predictor of a person's future behavior, it does help to identify potential bad actors. Microsoft's Personnel
Screening Standard applies to all Microsoft employees, interns, and contingent staff involved in the development,
operation, or delivery of online services to government or commercial cloud customers. Screening standards for
National Cloud environments that are not operated by Microsoft are defined by the operating partner personnel
for each specific environment.

Microsoft's Personnel Screening Standard


Microsoft's personnel screening practices for Office 365 are aligned with Microsoft's corporate standards and
National Institute of Standards and Technology (NIST) controls for personnel screening. Microsoft staff who
require access to the following are subject to Microsoft's Personnel Screening Standard:
Physical access to datacenters, co-locations, secured rooms, cages, server racks, or edge sites that provide the
infrastructure supporting online services for government or commercial cloud customers.
Logical access to government or commercial cloud Customer Data provided through specific managed
environments.
Network management access to devices and services that transport or store government or commercial
cloud Customer Data.
Specific personnel-related events that trigger screening requirements include:
New Microsoft staff placed in roles where screening is a defined requirement.
Internal Microsoft staff transferring or moving to an existing role that currently includes screening as a defined
requirement.
Existing roles that change scope to include screening as a defined requirement.

Screening Enforcement Criteria


To ensure that only approved personnel have access to Customer Data or environments that require screening, the
following enforcement criteria applies:
United States Cloud Environments Only:
Access to Customer Data or environments that require screening must only be permitted after adjudication is
completed and screening requirements are passed.
Microsoft staff who no longer require access to Customer Data or related environments must have access
removed upon leaving Microsoft or moving to a new role.
Microsoft staff must leave screened environment smart cards with management before leaving the United
States.
National Cloud Environments:
Third-party operator or data trustee personnel are responsible for managing and enforcing access for National
Cloud environments.
Within Microsoft's cloud services environments, access is restricted based on a person's role and the type of data
involved, as detailed in the table below. Qualified or unqualified personnel physically located outside of the United
States are not permitted to have access to Customer Data within a United States cloud. Access to National Cloud
environments is restricted so that Microsoft personnel do not have technical access to Customer Data, or systems
that contain Customer Data, without approval by the third-party operator or data trustee.

ROLE ACCESS TO CUSTOMER DATA ACCESS TO SYSTEM DATA

Qualified Personnel physically located in Permitted Permitted


the United States

Qualified Personnel physically located Not Permitted Permitted


outside of the United States

International Exception Access for Not Permitted Permitted


Microsoft Staff – Enables logical access
for Microsoft staff who do not reside in
the country where the government or
commercial Customer Data is at rest

Unqualified Personnel (unscreened Permitted with authorization Permitted with escort oversight
personnel that require an escort by
qualified personnel)

Microsoft Pre-Employment Screening


Where local law allows for it, Microsoft's Global Security Department conducts pre-employment screening. This is
a formal background investigation that includes the following criteria:
A check (e.g., for completeness and accuracy) of the applicant's resume
Confirmation of academic and professional qualifications
Investigation of any loss of professional credentials
Verification of past three employers
A check of police records for felony conviction
Confirmation of identity from a government-issued identification
Credit check where appropriate
Periodic rescreening and/or additional background checks may be required for certain management, security, or
other roles, including but not limited to United States-based employees in roles that require access to Customer
Data. For contingent staff, the contract with the third-party specifies Microsoft's requirements for screening that
must be conducted by the third-party. For background checks, the third-party company is responsible for
providing to Microsoft verification that a background check has been performed. The results of the background
check are typically received via email from the third-party's human resources department. International employees
of contract staff may be exempt from the background screening process due to laws in countries that prohibit
background checks.

Microsoft Employment Screening


Since 2004, Microsoft has required individuals to pass a seven-year criminal record screen for felonies and
misdemeanors, and to verify their education and employment history, as part of pre-employment screening in the
United States for employees and interns.
In the United States, prior to assigning any Microsoft employee or any Microsoft-assigned subcontractor to
provide Office 365-related services, Microsoft will conduct and cause its subcontractor to conduct a background
check consisting of a Social Security number trace and criminal record check. The data from this background check
is used as a factor in the hiring decision. The criminal record check includes a seven-year felony and misdemeanor
criminal records check of federal, state, and county records (as applicable).
As a condition of employment, at the time of hire, all Microsoft employees are required to sign confidentiality and
non-disclosure agreements, and to verify that they have reviewed the Microsoft Employee Handbook.

Microsoft Cloud Background Check


A Microsoft Cloud Background Check is required for candidates to be hired as employees providing Office 365-
related services in the United States. Microsoft employees in the United States with access to Customer Data must
follow the Microsoft Cloud Background Check process, which is required by all Office 365 services. Outside of the
United States, the process varies. For example, the Microsoft Cloud for Germany uses a Data Trustee approval
model, which is designed to ensure that the Data Trustee (a German company), and not Microsoft, is in control of
access to Customer Data. The Microsoft Cloud in Germany is delivered from datacenters in Germany, and the
Operations Centers (OC ) containing the technical staff of the Data Trustee are also in Germany. Both the
datacenter and the OC facilities are operated, maintained and controlled by the Data Trustee.
The following table lists the checks that are performed as part of the Microsoft Cloud Background Check.

SCREENING DESCRIPTION

Social Security Number Search Verifies that the provided Social Security number is valid.

Criminal History Check Seven-year criminal records check for felony and misdemeanor
offenses at the state, county, and local levels, and as
appropriate, at the federal level.

Office of Foreign Assets Control List Department of Treasury list of individuals and organizations
with whom United States citizens and permanent residents are
not allowed to do business.

Bureau of Industry and Security List Department of Commerce list of individuals and entities
barred from engaging in export activities.

Office of Defense Trade Controls Debarred Persons List (added Department of State list of individuals and entities barred from
on July 1, 2010) engaging in export activities related to the Defense industry.

The results from the Microsoft Cloud Background Check are stored in our employee database, which is connected
to our datacenter access control systems. If the Microsoft Cloud Background Check expires and the employee does
not renew it, then access to Office 365 services is revoked and no longer available until the Microsoft Cloud
Background Check is completed again. When the employment relationship with Microsoft ends, any existing
datacenter access is immediately revoked.
United States citizenship is verified for all employees with physical or logical access to the Office 365 United States
Government services. To verify citizenship, employees and/or new hire candidates meet with a U.S. Citizenship
Delegate who is trained to review documentation verifying U.S. citizenship. Employees or new hire candidates
must bring the required documentation and sign an attestation form at a meeting with the Citizenship Delegate for
their region. The meeting must be done in person. Once the individual has met with the Citizenship Delegate and
provided the necessary documentation and signatures, the Citizenship Delegate forwards a copy of the documents
to Microsoft Staffing Operations who submit the copy to record keeping.
Personnel with logical access to the Office 365 U.S. Government Community Cloud, or logical or physical access to
the Azure U.S. government offerings, are required to comply with federal government requirements of the FBI's
Criminal Justice Information Services (CJIS ), including personnel screening. CJIS screening in support of the
Office 365 U.S. Government service includes a fingerprint-based criminal background check which is adjudicated
by the CJIS system agency designated adjudicator in states that have enrolled in the Microsoft Online Services
CJIS support program.
Office 365 Technology Controls
8/21/2018 • 6 minutes to read • Edit Online

Microsoft uses several tools and technologies to control, manage, and audit access to Customer Data in Exchange
Online and SharePoint Online, including Lockbox and Customer Lockbox, multi-factor authentication, and more.
Yammer Enterprise uses similar controls, as described in Yammer Enterprise Access Controls.
Office 365 engineers have zero standing access to Office 365 Customer Data, and they must go through an
approval process that includes both Microsoft and – if the customer licenses the Customer Lockbox feature for
Exchange Online and SharePoint Online – customer approval, before access to Customer Data for service
operations can occur. When approval is granted, service-specific administrative accounts are provisioned just-in-
time with just enough access to perform the tasks required by the service request.

Lockbox and Customer Lockbox


Although it is extremely rare, a customer could request assistance from Microsoft that may expose a Microsoft
engineer to the customer's content to assist them with an issue. To control access to Exchange Online (which
includes any Skype for Business data stored in the users' mailboxes (Skype for Business coverage does not include
Skype Meeting Broadcast recordings or content uploaded to meetings by users)) and SharePoint Online (which
includes OneDrive for Business), Microsoft uses an access control system called Lockbox. Before any Microsoft
engineer can access any Exchange Online or SharePoint Online systems or data, they must submit an access
request using Lockbox. Using Lockbox is required for all elevated access to Exchange Online or SharePoint Online.
Lockbox processes requests for permissions that grant engineers the ability to perform operational and
administrative functions within the service. Engineers submit requests through Lockbox, which must be approved
by a manager prior to the engineer gaining the ability to access Customer Data. Upon manager approval, the
engineer has time-limited and scope-limited access to Customer Data to work on the customer's issue.
Customer Lockbox for Office 365 can help you meet compliance obligations, such as those found in FedRAMP
and HIPAA, if you need procedures in place for explicit data access authorization. In the rare instance when a
Microsoft service engineer needs access to your data, you grant that access only to data required to resolve the
issue and for a limited amount of time. Actions taken by the support engineer are logged for auditing purposes
and are accessible via the Office 365 Management Activity API and the Security and Compliance Center.
Customer Lockbox inserts the customer into the Lockbox approval process and provides them with the ability to
control authorization of Microsoft access to their Exchange Online or SharePoint Online content for service
operations.

NOTE: Customer Lockbox is available in Office 365 Enterprise E5 and as an add-on purchase, but manual
action must be taken in the Office 365 admin center (under Service Settings | Customer Lockbox) to enable it.
For more information, see Office 365 Customer Lockbox Requests.

All service requests for Exchange Online and SharePoint Online are handled by the Lockbox system. And with
Customer Lockbox, any service operation necessitating access to these services with exposure to Customer Data
goes through the Lockbox approval process, and then enables the customer to approve or reject the request
thereafter.
Figure 1 - Customer Lockbox Workflow
If the request is rejected by the customer, the Microsoft engineer will not have access to the customer's content and
will not be able to complete the service operation. If the request is approved by the customer, the Microsoft
engineer will have limited just-in-time access to the customer's content through monitored and constrained
management interfaces. With both Lockbox and Customer Lockbox, all approved access is traceable to a unique
user, making engineers accountable for their handling of Customer Data.

Just-in-Time Access
Microsoft uses the just-in-time (JIT) access principle for Office 365 to further mitigate the risk of credential
tampering and lateral attacks. JIT removes persistent administrative access to services and replaces those
entitlements with the ability to elevate into those roles on demand. Removing persistent rights from administrators
ensures that credentials are available only when they are needed, and removes the risk posed to the company in
cases of credential theft.
The JIT access model requires engineers to request elevated privileges for a limited period to perform
administrative duties. In addition, OCEs use temporary accounts that are created with machine-generated complex
passwords and granted only those roles that allow them to perform the necessary tasks. For example,
administrative access granted by Lockbox is time-bound, and the amount of time access is granted depends on the
role being requested. An engineer specifies the duration of time access needed during the request to the Lockbox
system. The Lockbox system will reject requests where the time requested exceeds the maximum permitted time
for the elevation. After expiration of the elevation request, administrative access is removed and the temporary
account is expired.
When authorized and approved for access (for example, to debug a system), engineers receive a one-time use
administrative password that is generated by the authorization system each time a request for elevated access is
approved. This password is copied by the engineer into a password safe, is separate from the engineer's credentials
for the Microsoft corporate environment, and is good only for the session for which elevated access was approved.

Constrained Management Interfaces


OCEs use two management interfaces to perform administrative tasks: Remote Desktop through secured Terminal
Service Gateways (TSGs) and Remote PowerShell. Within these management interfaces there are software policies
and access controls that place significant restrictions on what applications can be executed and what commands
and cmdlets are available.
Office 365 servers restrict concurrent sessions to one session per-service team administrator, per-server. TSGs are
configured to allow only a single concurrent session for users, and they do not allow multiple sessions. TSGs allow
Office 365 service team administrators to connect to multiple servers concurrently, using a single session per
server, so that administrators can effectively perform their duties. Service team administrators do not have any
permissions on the TSGs themselves. The TSG is used only to enforce multi-factor authentication (MFA) and
encryption requirements. Once the service team administrator connects to a specific server through a TSG, the
specific server will enforce a session limit of one per administrator.
Usage restrictions and connection and configuration requirements for Office 365 personnel are established by
Active Directory group policies. These policies include the following characteristics:
TSGs are configured to use only FIPS 140-2 validated encryption
TSG sessions are configured to disconnect after 30 minutes of inactivity
TSG sessions are configured to automatically log off after 24 hours
Connections to TSGs also require MFA using a separate physical smart card and an account that is separate from
the engineer's Microsoft corporate credentials. Engineers are issued different smart cards for various platforms
and secrets management platforms are used to ensure secure storage of credentials. TSGs use Active Directory
group policies to control who can login to remote servers, the number of allowed sessions, and idle timeout
settings. Additional polices are in place to limit access to allowed applications and to restrict Internet access.
In addition to remote access using specially-configured TSGs, Exchange Online allows users with the Service
Engineer Operations role to access certain administrative functionality on production servers using Remote
PowerShell. To do this, the user must be authorized for read-only (debug) access to the Office 365 production
environment. Privilege escalation is enabled the same way it is enabled for TSGs using the Lockbox process.
For remote access, there is a load-balanced virtual IP at each datacenter that serves as a single point of access. The
Remote PowerShell cmdlets that can be executed are based on the privilege level identified in the access claim
obtained during authentication. These cmdlets are the only administrative functionality that can be accessed and
executed by users connecting using this method. Remote PowerShell is used to limit the scope of commands
available to the engineer, which is based upon the level of access granted via the Lockbox process. For example, in
Exchange Online, Get-Mailbox might be available, but Set-Mailbox would not be.
Yammer Enterprise Access Controls
8/21/2018 • 2 minutes to read • Edit Online

Both physical and logical access to the Yammer production environment is restricted to a very small set of people
(infrastructure and operations). As with other Office 365 engineers, Yammer engineers have zero standing access
to Customer Data. Access must be requested using an approval-based just-in-time access control system similar
to Lockbox, and there is a limited number of approvers. Approvers verify the request (e.g., they verify whether the
request is legitimate based on need, business case, time, etc.), and then approve or deny the request. If the request
is approved, JIT access is granted for a defined and limited time, after which it automatically expires.
As with other Office 365 services, all access to the Yammer production environment leverages multi-factor
authentication. All access and command history is attributed to a user, and logged and reviewed regularly by the
Yammer security team.
For more information about Yammer administration and management, see Yammer Admin Help.
Defending Against Denial-of-Service Attacks in Office
365
8/21/2018 • 2 minutes to read • Edit Online

Introduction
Microsoft delivers a trustworthy infrastructure for more than 200 cloud services, including Microsoft Azure,
Microsoft Bing, Microsoft Office 365, Microsoft Dynamics 365, Microsoft OneDrive, Skype, and Xbox Live that are
hosted in our global cloud infrastructure of more than 100 datacenters.
As a global organization with a significant Internet presence and many prominent Internet properties that provide
cloud services, Microsoft is a large, common target for hackers and other malicious individuals. The network--the
communication layer between clients and the Microsoft Cloud--is one of the biggest targets of malicious attacks. In
fact, for many years, Microsoft has been continuously and persistently under some form of network-based
cyberattack. At almost all times, at least one of Microsoft's Internet properties is experiencing some form of attack.
Without reliable and persistent mitigation systems that can defend against these attacks, Microsoft's cloud services
would be offline and unavailable to customers.
Microsoft uses defense-in-depth security principles to protect its cloud services and networks.

Definition and Symptoms of Denial-of-Service Attacks


One way to attack network services is to create many requests against a service's hosts to overwhelm the network
and servers to deny service to legitimate users. This is referred to as a denial-of-service (DoS ) attack. When the
attack is performed by multiple actors, endpoints, and/or vectors, it is referred to as a distributed denial-of-service
(DDoS ) attack. Although the means, motives, and targets vary, DoS and DDoS attacks generally consist of the
efforts of a person or persons to prevent an Internet site or service from functioning correctly or at all, either
temporarily or indefinitely.
The United States Computer Emergency Readiness Team (US -CERT) defines symptoms of DoS attacks to include:
Unusually slow network performance (when opening files or accessing Internet sites)
Unavailability of a Web site
Inability to access a Web site
Dramatic increase in received spam
Disconnection of a wireless or wired Internet connection
Long-term loss of access to the Web or any Internet services

Related Topics
Core Principles of Defense Against Denial-of-Service Attacks
Microsoft's Denial-of-Service Defense Strategy
Defending Microsoft Cloud Services Against Denial-of-Service Attacks
Microsoft's Denial-of-Service Defense Strategy
8/21/2018 • 2 minutes to read • Edit Online

Microsoft's strategy for defending against network-based denial-of-service (DoS ) attacks is somewhat unique due
to our scale and global footprint. This scale allows Microsoft to utilize strategies and techniques that few
organizations (providers or customer organizations) can match. The cornerstone of our DoS strategy is leveraging
our global presence. Microsoft engages with Internet providers, peering providers (public and private), and private
corporations all over the world, giving us a significant Internet presence (which as of this writing, doubles around
every 18 months). Having such a large presence enables Microsoft to absorb attacks across a very large surface
area.
Given our unique nature, Microsoft uses detection and mitigation processes that differ from those used by large
enterprises. Our strategy is based on a separation of detection and mitigation, as well as global, distributed
mitigation through our many edges. Many enterprises use third-party solutions which detect and mitigate attacks
at the edge. As our edge capacity grew, it became clear that the significance of any attack against individual or
particular edges was very low. Because of our unique configuration, we have separated the detection and
mitigation components. We have deployed multi-tiered detection that enables us to detect attacks closer to their
saturation points while maintaining global mitigation at the edge. This strategy ensures we can handle multiple
simultaneous attacks.
One of the most effective and low -cost defenses employed by Microsoft against DoS attacks is to reduce our
attack surface. Doing so enables us to drop unwanted traffic at the edge, as opposed to analyzing, processing and
scrubbing the data inline.
At the interface with the public network, Microsoft uses special-purpose security devices for firewall, network
address translation, and IP filtering functions. We also use global equal-cost multi-path (ECMP ) routing. Global
ECMP routing is a network framework that ensures there are multiple global paths to reach a service. Thanks to
these multiple paths, an attack against the service should be limited to the region from which the attack originates
– other regions should be unaffected by this attack, as end users would use other paths to reach the service in
those regions. We have also developed our own internal DoS correlation and detection system that uses flow data,
performance metrics and other information. This is a hyperscale cloud service running within Microsoft Azure
which analyzes data collected from various points on Microsoft networks and services. A cross-workload DoS
incident response team identifies the roles and responsibilities across teams, the criteria for escalations, and the
protocols for engaging various teams and for incident handling. These solutions provide network-based protection
against DoS attacks.
Finally, cloud-based workloads are configured with optimized thresholds based on their protocol and bandwidth
usage needs to uniquely protect that workload.
Core Principles of Defense Against Denial-of-Service
Attacks
8/21/2018 • 2 minutes to read • Edit Online

The three core principles when defending against network-based DoS attacks are Absorption, Detection, and
Mitigation. Absorption happens before detection, and detection happens before mitigation. Absorption is the best
defense against a DoS attacks. If the attack can't be detected, it can't be mitigated. But if even the smallest DoS
attack can't be absorbed, then services aren't going to survive long enough for the attack to be detected.
Of course, it is generally not economically feasible for most organizations to purchase the excess capacity
necessary to absorb DoS attacks, as this requires a considerable investment in technology and technical skills. This
highlights one of the security benefits of using Microsoft cloud services; the sheer scale of our services enables us
to provide strong network protection to our cloud customers in a cost-effective manner. But even at our scale,
though, there must still be a balance between absorption, detection, and mitigation. To find that balance, we study
an attack's growth rate to estimate how much we need to absorb.
Detection is a cat-and-mouse game. You must constantly look for the new ways people are attacking you or trying
to defeat your systems. Detect -> Mitigate -> Detect -> Mitigate, etc., is a perpetual, persistent state that will
continue indefinitely.

Defending Against DoS Attacks


To successfully defend against a DoS attack, early detection is essential. By detecting an attack before the system is
overwhelmed, defenders can execute a response plan.
The following formula will help approximate the time to impact of a DoS attack:
Maximum Capacity / (Maximum Capacity X Growth Rate) = Time to Impact
If the time-to-detection occurs after time-to-impact, then it is likely the DoS attack will be successful. If the time-to-
detection occurs before time-to-impact, then the services being attacked should remain online and accessible, if
mitigation strategies are used. Thus, there are only two things that can be done to defend against DoS attacks:
Increase capacity to raise the ceiling of maximum capacity (which in turn provides more time to detect an
attack); or
Decrease the time to detect.
Increasing capacity has a direct fiscal impact. Microsoft recommends that customers develop at least basic
absorption capacity, to ensure that they can survive some level of DoS attack. The actual absorption capacity will
vary from customer to customer, as each customer has their own thresholds for exposure, risk, and financial outlay.
Ultimately, for economic reasons, investments of research and time in ways to decrease time-to-detection are
usually the most cost-effective defense.
Auditing and Reporting in Office 365
12/3/2018 • 4 minutes to read • Edit Online

Introduction
Microsoft cloud services includes several auditing and reporting features that customers can use to track user and
administrative activity within their tenant, such as changes made to their Exchange Online and SharePoint Online
tenant configuration settings, and changes made by users to documents and other items. Customers can use the
audit information and reports available in our cloud services to more effectively manage the user experience,
mitigate risk, and fulfill compliance obligations.

Office 365 Security & Compliance Center


The Office 365 Security & Compliance Center is a one-stop portal for protecting your data in Office 365, and it
includes many auditing and reporting features. It is an evolution of the Office 365 Compliance Center. The
Security & Compliance Center is designed for organizations that have data protection or compliance needs, or that
want to audit user and administrator activity. You can use the Security & Compliance Center to manage
compliance for all of your organization's Office 365 data. You can access the Security & Compliance Center at
http://protection.office.com using your Office 365 admin account.
The Security & Compliance Center includes navigation panes that provide you with access to several features:
Alerts - Enables you to manage alerts, view security-related alerts, and manage advanced alerts using
Advanced Security Management.
Permissions - Enables you to assign permissions such as Compliance Administrator, eDiscovery Manager, and
others to people in your organization so that they can perform tasks in the Security & Compliance Center. You
can assign permissions for most features in the Security & Compliance Center, but other permissions must be
configured using the Exchange admin center and SharePoint admin center.
Threat management - Enables you to create and apply device management policies using Office 365 Mobile
Device Management, to set up Data Loss Prevention (DLP ) policies for your organization, to configure email
filtering, anti-malware, DomainKeys Identified Mail (DKIM ), safe attachments, safe links, and OAuth apps.
Data governance - Enables you to import email or SharePoint data from other systems into Office 365,
configure archive mailboxes, and set retention policies for email and other content within your organization.
Search & investigation - Provides content search, audit log, quarantine, and eDiscovery case management
tools to quickly drill into activity across Exchange Online mailboxes, groups and public folders, SharePoint
Online, and OneDrive for Business.
Reports - Enables you to quickly access reports for SharePoint Online, OneDrive for Business, Exchange
Online, and Azure AD.
Service assurance - Provides information about how Microsoft maintains security, privacy, and compliance
with global standards for Office 365, Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and other
cloud services. Also includes access to third-party ISO, SOC, and other audit reports, as well as Audited
Controls, which provides details about the various controls that have been tested and verified by third-party
auditors of Office 365.

Service Assurance
Many of our customers in regulated industries are subject to extensive compliance requirements. To perform their
own risk assessments, customers often need in-depth information about how Office 365 maintains the security
and privacy of their data. Microsoft is committed to the security and privacy of customer data in its cloud services
and to earning customer trust by providing a transparent view of its operations, and easy access to independent
compliance reports and assessments.
Service Assurance provides transparency of operations and information about how Microsoft maintains the
security, privacy, and compliance of customer data in Office 365. It includes third-party audit reports along with a
library of white papers, FAQs, and other materials on Office 365 topics such as data encryption, data resiliency,
security incident management and more. Customers can use this information to perform their own regulatory risk
assessments. Compliance officers can assign the "Service Assurance User" role to give users access to Service
Assurance. The tenant administrator can also provide external users, such as independent auditors, with access to
information in the Service Assurance dashboard through the Microsoft Cloud Service Trust Portal (STP ). For
details on how to access the STP, visit Get started with the Service Trust Portal for Office 365 for business, Azure,
and Dynamics CRM Online subscriptions.

OneDrive for Business Admin Center


The new Microsoft OneDrive admin center helps you quickly and easily manage your organization's OneDrive for
Business settings in one place. To use the OneDrive admin center, you must allow access to onedrive.com. You
must also be a global admin for your organization, or a custom admin with the SharePoint administrator role.
Access the OneDrive for Business admin center preview at https://admin.onedrive.com.
Key features include a Compliance area that provides administrators with links to the Office 365 Security and
Compliance Center for key scenarios like searching the audit log, working with DLP, retention, eDiscovery, and
alerting.

Related Links
eDiscovery and Search Features
Office 365 Reporting Features
Office 365 Management Activity API
Office 365 Mailbox Migrations
Internal Logging for Office 365 Engineering
Office 365 Reporting Features
8/21/2018 • 6 minutes to read • Edit Online

Introduction
The Reports feature in Office 365 provides a variety of audit reports for Azure Active Directory (AD ), Exchange
Online, device management, supervisory review, and data loss prevention (DLP ). These are different and separate
from the Office 365 Activity Reports.

Office 365 Reports Dashboard


The Reports dashboard in the Office 365 Admin center preview displays usage activity across Office 365. Office
365 global administrators, or an Exchange Online, SharePoint Online, or Skype for Business administrator, can get
granular insight into the usage of that service. Reports can provide insights such as the number of users
consuming a particular Office 365 service, the number of users that have activated Office Professional Plus, and
how much mail is flowing through the organization. Reports are available for the last 7, 30, 90, and 180 days.
The following reports are available:
Email activity report
Microsoft Office activations report
SharePoint Online Site usage report
OneDrive for Business usage report
Yammer activity report
Skype for Business activity report
Skype for Business Peer-to-Peer activity report
Skype for Business Conference Organizer report
Skype for Business Conference Participant activity report
For more information, see Activity Reports in the Office 365 Admin Center.

Azure Active Directory Reports


Office 365 uses Azure AD for authentication and identity management. Office 365 administrators can use the
reports generated by Azure to look for unusual activity and unauthorized access to their data. You can use the
access and usage reports in Azure AD to gain visibility into the integrity and security of your organization's
directory. With this information, an administrator can better determine where possible security risks may be so
that they can adequately plan to mitigate those risks.
Azure AD reports can be exported to Microsoft Excel and correlated with other data from Office 365, such as the
results of an audit log search, to provide insight into access, authentication, and application-level activities.
Advanced anomaly and resource usage reports are available when Azure AD Premium is enabled. These advanced
reports help to improve an organization's security posture and help organizations respond to potential threats by
leveraging analytics about device access and application usage. For more information, see Azure Active Directory
reporting.

Exchange Online Audit Reports


Exchange Online audit reports include details on mailbox access and changes made by administrators to an
organization's Exchange Online tenant. Once mailbox auditing is enabled, you can use the tasks in the following
table to run reports and export Exchange Online audit logs.

NOTE: You must enable mailbox audit logging for each mailbox so that audited events are saved in the audit
log for that mailbox. If mailbox audit logging isn't enabled for a mailbox, events for that mailbox won't be saved
in the audit log and won't appear in mailbox audit reports. For more information, see enable mailbox auditing.

TASK DESCRIPTION

Run a non-owner mailbox access report Displays the list of mailboxes that have been accessed by
someone other than the owner of the mailbox. The report
contains information about who accessed the mailbox, the
actions they took in the mailbox, and whether the actions
were successful.

Export mailbox audit logs Mailbox audit logs contain information on access and actions
in a mailbox taken by a user other than the mailbox owner.
Administrators can specify mailboxes along with a date range
to generate reports. The logs are exported in XML, attached
to a message and sent to specific users as determined by the
administrator.

Run an administrator role group report The administrator role group is used to assign administrative
privileges to users. These privileges allow users to perform
administrative tasks such as reset passwords, create or modify
mailboxes, and assign admin privileges to other users. The
admin role group report shows changes to role groups,
including the addition or removal of members.

View the admin audit log The admin audit log report lists all create, update and delete
functions performed by administrators in Exchange Online.
Log entries provide information on which cmdlet was run,
what parameters were used, who ran the cmdlet, and what
objects were affected.

Mailbox content search and hold Provides details of any changes to In-Place eDiscovery or In-
Place Hold settings on mailboxes.

Export the admin audit log The admin audit log records specific administrative actions
such as create, update and delete in Exchange Online. The
results from the log are exported to XML and administrators
can choose to send this log to a set of users.

Run a per-mailbox litigation hold report Provides details of any changes to litigation hold settings on
mailboxes.

View and export the external admin audit log Contains details of actions performed by external
administrators. The entries provide information on which
cmdlet was run, what parameters were used, and any actions
that create, modify or delete objects in Exchange Online.

Device Compliance Reports


You can manage and secure mobile devices when they're connected to your Office 365 organization by using
Office 365 Mobile Device Management (MDM ). Mobile devices like smartphones and tablets that are used to
access work email, calendar, contacts, and documents play a big part in making sure that employees are able to
work anytime, and from anywhere. As a result, it's critical that you protect your organization's information. You can
use Office 365 MDM to set device security policies and access rules, and to wipe mobile devices if they're lost or
stolen.
MDM compliance reports provide an overview of policies that have been set up by an organization to secure
mobile devices that are accessing Office 365 data. The report allows filtering of devices by compliance status,
reported violations, blocked devices, and how many devices were wiped as a result of security policies. For more
information, see Overview of Mobile Device Management for Office 365.

Data Loss Prevention


DLP policies help manage the security and flow of information in an organization. You can set up policies to block
access to content, encrypt data, or notify users of policy and policy violations using in-application DLP Policy Tips.
DLP reports provide insight into the number of policy and rule matches, overrides, and false positives.
You can use the Office 365 admin center to view information about the number of messages that are detected by
your DLP policies in either graphical chart or table format. Specifically, DLP policy matches for sent and received
mail, and DLP rule matches for sent and received mail. You can also view the number of matches, overrides, and
false positives for each policy within the past 24 hours using the Exchange admin center. However, this data is not
available as a chart. If you download a report for use in Excel, you can view even more detail, such as who sent
which message, on what day, and what policy matches were triggered. For more information, see View reports
about DLP policy detections.

Auditing in Yammer Enterprise


Yammer Enterprise provides administrators with the ability to export user activity data from their Yammer
network(s) via the Yammer Data Export API, or manually via the Yammer network admin page. The ability to
export logs is restricted to Network Administrators in Yammer. (All Office 365 global administrators are Yammer
Network Administrators.)
The following data can be exported:

FILENAME DESCRIPTION

Users.csv All new, pending, and suspended users in the network

Messages.csv All messages in the network

Files.csv (metadata) Metadata such as filename, file API URL, uploader ID,
uploaded at, etc.

Files.csv (Original files) Zip file of the original files that were uploaded by users into
Yammer

Topics.csv Topics created on the network

Pages.csv Pages (notes) created by users in the network

Admins.csv All verified administrators on the network

Networks.csv All Yammer external networks

Table 3 - Yammer network data files available for export by customers


Yammer Enterprise data is also available through the Office 365 Activity Reports. In addition, Yammer is actively
working on exposing additional logging via the Office 365 Management Activity API, and on the ability to reason
over data using Power BI. See the Office Roadmap for more information on these features.
eDiscovery and Search Features
8/21/2018 • 4 minutes to read • Edit Online

eDiscovery
The eDiscovery feature provides a single place for administrators, compliance officers, and other authorized users
to conduct a comprehensive investigation into Office 365 user activity. Security officers with the appropriate
permissions can perform searches and place holds on content. The search results are the same results you get
from a Content Search, except that an eDiscovery case is created for any holds that are applied. The results from
eDiscovery searches are encrypted for security, and the exported data can be analyzed using Advanced eDiscovery.

Content Search
Content Search is a new eDiscovery search tool in the Security & Compliance Center that provides improved
scaling and performance capabilities over previous eDiscovery search tools. You can use Content Search to search
mailboxes, public folders, SharePoint Online sites, and OneDrive for Business locations. Content Search is
specifically designed for very large searches. There are no limits on the number of mailboxes and sites that you can
search. There are also no limits on the number of searches that can run at the same time. After you run a search,
the number of content sources and an estimated number of search results are displayed in the details pane on the
search page, where you can preview the results, or export them to a local computer. If your organization has an
Office 365 Enterprise E5 subscription, you can also prepare the results for analysis using the powerful analytics
features of Office 365 Advanced eDiscovery.

Audit Log Search


In addition to tracking changes in their Office 365 organization, customers can also view audit reports and export
audit logs. Once auditing is enabled for an Office 365 tenant, user and administrative activity for that tenant is
recorded in event logs and made searchable. For example, you can use mailbox audit logging to track actions
performed on a mailbox by users other than the mailbox owner. Further, compliance officers can use the search
and filter capabilities to see if a user has viewed or downloaded a specific document, or if an administrator has
performed user management activities or made changes to the tenant configuration in the past 90 days. Search
results can contain valuable forensic information about specific activities that were conducted by a user or an
administrator. See Audited activities in Office 365 for a description of the user and administrative activities that are
logged in Office 365.
Events from SharePoint Online and OneDrive for Business are displayed in the log within 30 minutes of their
occurrence. Events from Exchange Online appear in the audit logs within 24 hours of occurrence. Login events
from Azure AD are available within minutes of occurrence, and other directory events from Azure AD are available
within 24 hours of occurrence. Events in audit log search results can also be exported for further analysis. (A
maximum of 50,000 entries can be exported from a single audit log search. To export more entries that this limit,
either reduce the date range, or run multiple audit log searches.)
The following table details some of the information that is displayed in activity reports. See the detailed properties
in the Office 365 audit log for more information about which properties are collected by each Office 365 workload.

PROPERTY DESCRIPTION

Date Date and time of the event

User User who performed the action


PROPERTY DESCRIPTION

ClientIP IPv4 or IPv6 address of the device that was used when the
activity was logged.

CreationTime Date and time in Coordinated Universal Time (UTC) when the
user performed the activity.

EventSource Identifies that an event occurred. Possible values are


SharePoint and ObjectModel.

ID ID of the report entry. The ID uniquely identifies the report


entry.

Operation Name of the user or activity, which corresponds to the value


selected in the Display results for this user activity.

OrganizationId GUID for the organization's Office 365 service where the event
occurred.

UserAgent Information about the user's browser as provided by the


browser.

UserId User who performed the action (specified in the Operation


property) that resulted in the record being logged.

UserType Type of user that performed the operation. The following


values indicate the user type.

0 Indicates a regular user.

2 Indicates an administrator in your Office 365 organization.

3 Indicates a Microsoft datacenter administrator or datacenter


system account.

Workload Office 365 service in which the activity occurred. Possible


values for this property are:

Exchange Online

SharePoint Online

OneDrive for Business

Azure Active Directory Reports

For detailed steps to search Office 365 audit logs, see Searching audit logs in the Office 365 Security &
Compliance Center.

Search Unified Audit Log


The Audit Log Search feature in the Security & Compliance Center can be used to search the unified audit log.
Office 365 also provides the ability to search this log using remote PowerShell. Specifically, the Search-
UnifiedAuditLog cmdlet in Exchange Online PowerShell can be used to search the unified audit log of events
relating to user operations from Exchange Online, SharePoint Online, OneDrive for Business, and Azure AD. You
can search for all events in a specified date range, or you can filter the results based on specific criteria, such as a
specific action, the user who performed the action, or the target object. Administrators can use up to 3
simultaneously running Exchange Online PowerShell sessions to split up large date range searches.
Internal Logging for Office 365 Engineering
9/26/2018 • 2 minutes to read • Edit Online

In addition to the events and log data available for customers, there is also an internal log data collection system
that is available to Office 365 engineers. Many different types of log data are uploaded from Office 365 servers to
an internal, big data computing service called Cosmos. Each service team uploads audit logs from their respective
servers into the Cosmos database for aggregation and analysis. This data transfer occurs over a FIPS 140-2-
validated TLS connection on specifically approved ports and protocols using a proprietary automation tool called
the Office Data Loader (ODL ). The tools used in Office 365 to collect and process audit records do not allow
permanent or irreversible changes to the original audit record content or time ordering.
Service teams use Cosmos as a centralized repository to conduct an analysis of application usage, to measure
system and operational performance, and to look for abnormalities and patterns that may indicate problems or
security issues. Each service team uploads a baseline of logs into Cosmos, depending on what they are looking to
analyze, that often include:
Event logs
AppLocker logs
Performance data
System Center data
Call detail records
Quality of experience data
IIS Web Server logs
SQL Server logs
Syslog data
Security audit logs
Prior to uploading data into Cosmos, the ODL application uses a scrubbing service to obfuscate any fields that
contain customer data, such as tenant information and end-user identifiable information, and replace those fields
with a hash value. The anonymized and hashed logs are rewritten and then uploaded into Cosmos. Service teams
run scoped queries against their data in Cosmos for correlation, alerting, and reporting. The period of audit log
data retention in Cosmos is determined by the service teams; most audit log data is retained for 90 days or longer
to support security incident investigations and to meet regulatory retention requirements.
Access to Office 365 data stored in Cosmos is restricted to authorized personnel. Microsoft restricts the
management of audit functionality to the limited subset of service team members that are responsible for audit
functionality. These team members do not have the ability to modify or delete data from Cosmos, and all changes
to logging mechanisms for Cosmos are recorded and audited.
Each service team accesses its log data for analysis by authorizing certain applications to conduct specific analysis.
For example, the Office 365 Security team uses data from Cosmos through a proprietary event log parser to
correlate, alert, and generate actionable reports on possible suspicious activity in the Office 365 production
environment. The reports from this data are used to correct vulnerabilities, and to improve the overall performance
of the service. If a specific alert or report requires further investigation, service personnel can request that data be
imported back into the Office 365 service. Since the specific log being imported from Cosmos is in encrypted and
service personnel do not have access to decryption keys, the target log is programmatically passed through a
decryption service that returns scoped results to the authorized service personnel. Any vulnerabilities found from
this exercise are reported and escalated using Microsoft's standard security incident management channels.
Office 365 Mailbox Migrations
8/21/2018 • 2 minutes to read • Edit Online

With an Exchange-based hybrid deployment, customers can choose to either move on-premises Exchange
mailboxes to an Exchange Online organization or move Exchange Online mailboxes to an Exchange on-premises
organization. Migration batches are used when moving mailboxes between on-premises and Exchange Online
organizations. Customers can review statistics and other information about mailbox migrations using the following
cmdlets:
Get-MoveRequestStatistics - Provides default statistics for a user mailbox, which includes the status, mailbox
size, archive mailbox size and percentage complete.
Get-Mailbox - Provides a summary list of mailbox objects and attributes in the organization.
Get-Recipient - Provides a list of existing mail-enabled objects such as mailboxes, mail users, contacts and
distribution groups.
Get-MoveRequest - Provides a detailed status of an ongoing mailbox migration.
Get-MigrationUser - Provides information about the mailbox move and migration users.
Get-MigrationBatch - Provides information on the status of current migration batch.
Get-MigrationUserStatistics - Provides detailed information about the migration status for a specific user.
Get-MailboxStatistics - Provides information about mailboxes, such as size, the number of messages, and the
last accessed time.
For more information on additional cmdlets, see Move and Migration cmdlets in Exchange Online.
Office 365 Management Activity API
8/21/2018 • 2 minutes to read • Edit Online

Microsoft provides reporting services that enable administrators to obtain aggregated transactional information
about their Office 365 tenant. The Office 365 Management Activity API uses an industry-standard RESTful design
and OAuth v2 for authentication, which makes it easy to start experimenting with retrieving data and ingesting it
into visualization tools and applications. The API provides a data feed that includes information about user,
administrator, operations, and security activity in Office 365. The data can be kept for regulatory purposes, or
combined with log data procured from an on-premises infrastructure or other sources to build a monitoring
solution for operations, security, and compliance across the enterprise.
The Office 365 Management Activity API provides information about various user, admin, system, and policy
actions and events from Office 365 and Azure Active Directory activity logs. The API provides a consistent audit
schema with over 10 fields that are in common across all the services. This allows organizations to make easy
connections between events, and it enables new ways to reason over the data. Dozens of Independent Software
Vendors (ISVs) have partnered with Microsoft and built solutions based on the API. Some solutions are focused
solely on Office 365 data, while others provide the ability to ingest data from multiple cloud providers and on-
premises systems to create a unified view of all operations, security, and compliance-related activity. For more
information, see the Office 365 Management Activity API reference.
Exchange Online Protection overview
7/26/2018 • 4 minutes to read • Edit Online

Microsoft Exchange Online Protection (EOP ) is a cloud-based email filtering service that helps protect your
organization against spam and malware, and includes features to safeguard your organization from messaging-
policy violations. EOP can simplify the management of your messaging environment and alleviate many of the
burdens that come with maintaining on-premises hardware and software.
The following are the primary ways you can use EOP for messaging protection:
In a standalone scenario EOP provides cloud-based email protection for your on-premises Microsoft
Exchange Server 2013 environment, legacy Exchange Server versions, or for any other on-premises SMTP
email solution.
As a part of Microsoft Exchange Online By default, EOP protects Microsoft Exchange Online cloud-
hosted mailboxes.
In a hybrid deployment EOP can be configured to protect your messaging environment and control mail
routing when you have a mix of on-premises and cloud mailboxes.

How EOP works


To understand how EOP works, it helps to see how it processes incoming email:

An incoming message initially passes through connection filtering, which checks the sender's reputation and
inspects the message for malware. The majority of spam is stopped at this point and deleted by EOP. Messages
continue through policy filtering, where messages are evaluated against custom transport rules that you create or
enforce from a template. For example, you can have a rule that sends a notification to a manager when mail
arrives from a specific sender. (Data loss prevention checks also occur at this point, if you have that feature; for
information about feature availability, see the Exchange Online Protection Service Description.) Next, messages
pass through content filtering, where content is checked for terminology or properties common to spam. A
message determined to be spam by the content filter can be sent to a user's Junk Email folder or to the quarantine,
among other options, based on your settings. After a message passes all of these protection layers successfully, it's
delivered to the recipient.
EOP datacenters
EOP runs on a worldwide network of datacenters that are designed to provide the best availability. For example, if
a datacenter becomes unavailable, email messages are automatically routed to another datacenter without any
interruption in service. Servers in each datacenter accept messages on your behalf, providing a layer of separation
between your organization and the Internet, thereby reducing load on your servers. Through this highly available
network, Microsoft can ensure that email reaches your organization in a timely manner.
EOP performs load balancing between datacenters but only within a region. If you're provisioned in one region all
your messages will be processed using the mail routing for that region. The following list shows the how regional
mail routing works for the EOP datacenters:
In the America's, all Exchange Online mailboxes are located in U.S. datacenters, with the exception of South
America where datacenters in Brazil and Chile are used and in Canada where datacenters in Canada are
used. All email messages, including messages for customers in South America and Canada, are routed
through U.S. datacenters for EOP filtering; however quaratined email is stored in the datacenter where the
tenant is located..
In Europe, the Middle East, and Africa (EMEA), all Exchange Online mailboxes are located in EMEA
datacenters, and all messages are routed through EMEA datacenters for EOP filtering.
In Asia-Pacific (APAC ), all Exchange Online mailboxes are located in APAC datacenters, but messages are
currently routed through EMEA datacenters for EOP filtering. This is targeted to be changing in the fourth
quarter of 2014, when messages will be routed through APAC datacenters for EOP filtering.
For the Government Community Cloud (GCC ), all Exchange Online mailboxes are located in U.S.
datacenters and all messages are routed through U.S. datacenters for EOP filtering.

EOP plans and features


The following are the available EOP subscription plans:
EOP standalone Where EOP protects your on-premises mailboxes.
EOP features in Exchange Online Where EOP protects your Exchange Online cloud-hosted mailboxes.
Exchange Enterprise CAL with Services Where EOP protects your on-premises mailboxes, like EOP
standalone, and includes data loss prevention (DLP ) and reporting using web services.
For information about requirements, important limits, and feature availability across all EOP subscription plans,
see the Exchange Online Protection Service Description.

Setting up EOP
Setting up EOP can be simple, especially in the case of a small organization with a handful of compliance rules.
However, if you have a large organization with multiple domains, custom compliance rules, or hybrid mail flow, set
up can take more planning and time.
If you've already purchased EOP, see Set up your EOP service to ensure that you complete all the steps necessary
to configure EOP to protect your messaging environment.
For more information
EOP features
Videos for getting started with EOP
EOP general FAQ
EOP queued, deferred, and bounced messages FAQ
Delegated administration FAQ
Move domains and settings from one EOP organization to another EOP organization
EOP features
6/26/2018 • 12 minutes to read • Edit Online

The following table provides a list of features that are available in the Exchange Online Protection (EOP ) hosted
email filtering service.

TIP
The Office 365 for business roadmap is a good resource for finding out information about upcoming new features. For a
broader view about what features are available with the different EOP subscription plans, see Exchange Online Protection
Service Description.

Feature Description

Anti-spam protection

Inbound spam detection Inbound anti-spam protection is always enabled and can't be
disabled. You can configure custom settings via your
connection filter and content filter policies.
For EOP standalone customers: By default, the EOP content
filters send spam-detected messages to each recipient's Junk
Email folder. However, in order to help ensure that the Move
message to Junk Email folder action will work with on-
premises mailboxes, you must configure two Exchange
transport rules on your on-premises servers to detect spam
headers added by EOP. For details, see Ensure that spam is
routed to each user's Junk Email folder.

Outbound spam detection Outbound anti-spam protection is always enabled if you use
the service for sending outbound email, thereby helping
protect organizations that use the service and their intended
recipients. Similar to inbound filtering, outbound spam filtering
is comprised of connection filtering and content filtering. The
outbound spam filtering settings aren't configurable, but there
are outbound spam policy settings that you can use to
configure admin notifications for suspicious and blocked
outbound messages. For more information, see Configure the
outbound spam policy.

NDR backscatter protection For more information about NDR backscatter, see the NDR
backscatter setting in Advanced spam filtering options as well
as Backscatter messages and EOP.

Bulk mail filtering EOP has enhanced detection methods for identifying bulk
email messages. You can configure the service to mark bulk
email messages through the user interface. You can also
create Transport rules to more aggressively filter bulk mail by
searching for a bulk mail message header stamp. For more
information about bulk email, see What's the difference
between junk email and bulk email? and its associated
subtopics.
Malicious URL block lists EOP uses several URL block lists that help detect known
malicious links within messages.

Anti-phishing protection EOP includes 750,000 domains of known spammers.

Spam management

The ability to configure connection filter IP Allow and IP Block IP addresses specified in the connection filter are respected for
lists single IP addresses and CIDR IP address ranges. The service
also supports IPv6 addresses. For more information, see
Configure the connection filter policy.

The ability to customize content filter policies per user, group, For greater granularity, you can create custom content filter
or domain policies and apply them to specified users, groups, or domains
in your organization. Custom policies always take precedence
over the default policy, but you can change the priority (that
is, the running order) of your custom policies. For more
information, see Configure your spam filter policies.

The ability to configure actions on content-filtered messages There are multiple configurable actions. For example, you can
delete content-filtered messages or send them to the Junk
Email folder or the quarantine. For more information, see
Configure your spam filter policies.

The ability to configure advanced options for aggressive spam For more information, see Configure your spam filter policies
filtering (which is where you configure them) and Advanced spam
filtering options (which provides specific details about what
each option does).

International spam filtering You can configure EOP to filter messages written in specific
languages or sent from specific countries or regions. You can
configure up to 86 different languages and 250 different
regions. The service will apply the configured action for high
confidence spam. For more information, see Configure your
spam filter policies.

Manage spam via Outlook or Outlook Web App (OWA) Admins and end users can create safe sender lists and blocked
sender lists. For more information:
OWA: See Block or allow (junk email settings).
Outlook: See Overview of the Junk Email Filter.
If you're using EOP to help protect on-premises mailboxes, be
sure to use directory synchronization to help ensure that
these settings are synced to the service. For more information
about setting up directory synchronization, see "Use directory
synchronization to manage mail users" in Manage mail users
in EOP.

Spam submissions via the Junk Email Reporting Add-in for You can download an add-in to Outlook that lets you submit
Microsoft Office Outlook spam messages to Microsoft for analysis. For more
information about downloading and using this tool, see
Enable the Report Message add-in.
If you're using Exchange Server 2013 with EOP, you can also
right-click in OWA to submit spam messages, as described in
Report junk email and phishing scams in Outlook on the web .
Spam and non spam submissions via an email alias You can submit spam (junk) and non spam (not junk)
messages to Microsoft via email. For more information, see
Submit spam, non-spam, and phishing scam messages to
Microsoft for analysis.

Spam and non spam submissions via OWA Junk Email You can submit spam and non spam messages to Microsoft
Reporting via OWA Junk Email Reporting. For more information, see
Report junk email and phishing scams in Outlook on the web .
This feature is currently available for Outlook Web App (OWA)
customers whose Exchange Server 2013 SP1 mailboxes are
being filtered by EOP. Exchange Online OWA customers will
also have this functionality in the near future.

End-user spam quarantine notifications End users can release their own spam-quarantined messages
and optionally report them as not junk via end-user spam
notification messages. These notification emails must be
configured and enabled by an admin, as described in
Configure end-user spam notifications in Exchange Online or
Configure end-user spam notifications in EOP.

End-user spam quarantine notification frequency This frequency is 3 days by default and is configurable from 1
through 15 days.

The ability for admins to configure the language of end-user This is available for end users and administrators. For more
spam quarantine notifications information, see Find and release quarantined messages as an
administrator or Find and Release Quarantined Messages as
an End User.

Access and manage messages in quarantine via a web page This is available for end users and administrators. For more
information, see Find and release quarantined messages as an
administrator or Find and Release Quarantined Messages as
an End User.

The ability to search the quarantine The ability to search the quarantine for specific spam
messages is available for both admins and end users. For
more information, see Find and release quarantined messages
as an administrator or Find and Release Quarantined
Messages as an End User.

View spam-quarantined message headers from the Exchange After viewing the message header in the quarantine, you can
admin center also copy the message header text and paste it into the
Message Header Analyzer, which provides information about
what happened to the message.

Anti-malware protection

Multiple engine anti-malware protection Multiple anti-malware engines help to automatically protect
our customers at all times.

The option to disable malware filtering You cannot disable malware filtering because we're enforcing
anti-malware scanning for all email messages routing through
the service. We believe that helping to provide a consistent
and rigorous level of protection for all of our customers is a
critical part of the defense-in-depth strategy necessary to
help protect your email messaging environment. As a result,
malware filtering is automatically enabled for all customers.
Malware inspection of the message body and attachments The service inspects the active payload in the message body
and all message attachments for malware.

Default or custom malware alert notifications You have the option to send a notification email message to
senders or administrators when a message is detected as
malware and is not delivered. These notifications are only sent
when the entire message is deleted. For more information, see
Configure anti-malware policies.

The option to remove an attachment when malware is Administrators can select whether to delete the entire
detected message or to strip the attachment and send a customized
message to the recipients. For more information, see
Configure anti-malware policies.

Anti-spyware protection Anti-malware protection encompasses anti-virus protection


and anti-spyware protection.

The ability to customize malware filter policies per user, group, For greater granularity, you can create custom malware filter
or domain policies and apply them to specified users, groups, or domains
in your organization. Custom policies always take precedence
over the default policy, but you can change the priority (that
is, the running order) of your custom policies. For more
information, see Configure anti-malware policies.

Mail routing and connectors

Conditional mail routing For more information, see Create Connectors for Conditional
Mail Routing.

Opportunistic or forced TLS Opportunistic or forced TLS is available with connectors.


Opportunistic TLS attempts a TLS connection but uses an
SMTP connection if the TLS connection is unsuccessful. Force
TLS enforces TLS connections, meaning that the message is
rejected if the TLS connection is unsuccessful. For more
information about TLS, security, and connectors, see Set up
connectors for secure mail flow with a partner organization.

Regional routing (the restriction of mail flow to a specific For more information, see the "EOP datacenters" section in
region) the Exchange Online Protection overview.

The SMTP Connectivity Checker tool For more information about using this tool to test your mail
flow, see Test Mail Flow with the Remote Connectivity
Analyzer.

Match subdomains For more information about enabling mail flow to and from
subdomains of your accepted domains, see Enable email flow
for subdomains in EOP.

Transport rules

Policy-based filtering and actions Custom policies are based on Exchange Transport rules. You
can filter by domain, keyword, file name, file type, subject line,
message body, sender, recipient, header, and IP address. For
more information, see Mail flow rules (transport rules) in
Exchange Online Protection.
Filter by text patterns Transport rules can use an array or regular expressions to
match text. You can also use one string or an array of strings
to match many message properties, such as the address,
subject, body, or attachment names. For more information,
see Transport Rule Conditions (Predicates).

Custom dictionaries Transport rules can include long lists of text and keywords,
providing the same functionality as a custom dictionary.

Per-domain policy rules The scope of a transport rule can be customized to match
sender or recipient domain names, IP address ranges, address
keywords or patterns, group memberships, and other
conditions. For more information, see Transport Rule
Conditions (Predicates).

Attachment scanning Rules can be created to scan the file name, extension, and
content of the attachment.

Send policy rule notifications to the sender You can reject messages and send a non-delivery report
(NDR) to the sender via the Reject the message with the
explanation or Reject the message with the enhanced
status code action. For more information, see Transport rule
actions.

Send messages to fixed addresses (such as redirecting or Transport rules can redirect, add recipients by carbon copy or
copying a message to a specific address) blind carbon copy, simply add recipients, and other options.
For more information, see Transport rule actions.

The ability to easily adjust rule priority across multiple rules Use the Exchange admin center to change the order in which
rules are processed. For more information, see Manage
Transport Rules.

The ability to filter messages and then change the routing or You can filter messages based on a wide variety of conditions
attributes of a message and then apply a series of actions to each message. For more
information, see Mail flow rules (transport rules) in Exchange
Online Protection.

Change the spam confidence level of a message by rule. You can inspect an in-transit message and assign a spam
confidence level to it based on criteria that you choose. For
more information, see Use mail flow rules to set the spam
confidence level (SCL) in messages.

Inspect message attachments You can examine the content of an attachment or the
characteristics of an attached file and define an action to take
based on what is found. For more information, see Using
transport rules to inspect message attachments.

Administration

Web-based administration EOP administrators can manage the service via the Exchange
admin center (EAC) interface, which is supported in 60
languages. For more information, see Exchange admin center
in Exchange Online Protection .
Directory synchronization Directory synchronization is available via the Azure Active
Directory Sync tool. For more information, see the "Use
directory synchronization to manage mail users" section in
Manage mail users in EOP.

Directory Based Edge Blocking (DBEB) The DBEB feature lets you reject messages for invalid
recipients at the service network perimeter. DBEB lets admins
add mail-enabled recipients to Office 365 and block all
messages sent to email addresses that aren't present in Office
365. For more information about configuring DBEB, see Use
Directory Based Edge Blocking to Reject Messages Sent to
Invalid Recipients.

Remote Windows PowerShell access Full EOP functionality is available via remote Windows
PowerShell. For more information, see PowerShell in Exchange
Online Protection.

Reporting and logging

Message tracing The message trace feature enables you as an administrator to


follow email messages as they pass through the service. It
helps you determine whether a targeted email message was
received, rejected, deferred, or delivered by the service. This
lets you efficiently answer your users' questions, troubleshoot
mail flow issues, validate policy changes, and alleviates the
need to contact technical support for assistance. For more
information, see Trace an Email Message.

Web-based reports The mail protection reports in the Office 365 admin center
provide messaging data. For example, you can monitor how
much spam and malware is being detected or how often your
transport rules are being matched. With these interactive
reports, you can quickly get a visual report of summary data
and drill down into details about individual messages, for as
far back as 90 days. For more information, see Use mail
protection reports in Office 365 to view data about malware,
spam, and rule detections.

Detailed reporting via the Excel reporting workbook The email protection reports in the Excel 2013 reporting
workbook are also available. However, we recommend using
the enhanced Office 365 admin center reports instead. The
Excel 2013 reporting workbook is planned to be deprecated in
the future.

Audit logging The administrator role group report and the administrator
audit log are available for EOP admins. For more information,
see Auditing reports in EOP.

Service Level Agreements (SLAs) and support

Spam effectiveness SLA >99%

False positive ratio SLA <1:250,000

Virus detection and blocking SLA 100% of known viruses

Monthly uptime SLA 99.999%


Phone and web technical support 24 hours a day, seven days For more information about EOP help and support options,
a week see Help and support for EOP.

Other features

A geo-redundant global network of servers EOP runs on a worldwide network of datacenters that are
designed to help provide the best availability. For more
information, see the "EOP data centers" section in Exchange
Online Protection overview.

Message queuing when the on-premises server cannot accept Messages in deferral remain in our queues for 2 days.
mail Message retry attempts are based on the error we get back
from the recipient's mail system. On average, messages are
retried every 5 minutes. For more information, see EOP
queued, deferred, and bounced messages FAQ.

Office 365 Message Encryption available as an add-on service For more information, see Encryption in Office 365.
Feature permissions in EOP
6/26/2018 • 2 minutes to read • Edit Online

The permissions required to perform tasks to manage Microsoft Exchange Online Protection (EOP ) vary
depending on the feature you are managing.
To set up EOP, you must be an Office 365 Global Admin, or an Exchange Company Administrator (the
Organization Management role group).

Exchange Online Protection permissions


To find out what permissions you need to manage EOP features, see the following table. If a feature lists more
than one role group, you only need to be assigned one of the role groups to use the feature.

FEATURE PERMISSIONS REQUIRED

Anti-malware Organization Management


Hygiene Management

Anti-spam Organization Management


Hygiene Management

Mail flow rules Organization Management


Records Management

Domains Organization Management


View-Only Organization Management

Advanced Threat Protection (ATP) Organization Management


Hygiene Management

Office 365 connectors Organization Management

Message trace Organization Management


View-Only Organization Management

Organization configuration Organization Management

Quarantine Organization Management


View-Only Organization Management
Hygiene Management

Users, Contacts, and Role Groups Organization Management


View-Only Organization Management
Hygiene Management

Distribution Groups and Security Groups Organization Management


View-Only Organization Management
Hygiene Management
FEATURE PERMISSIONS REQUIRED

View reports Organization Management - users have access to mail


protection reports.
View-Only Recipients - users have access to mail protection
reports.
Compliance Management - users have access to mail
protection reports and Data Loss Prevention (DLP) reports (if
their subscription has DLP capabilities).
Exchange admin center in Exchange Online
Protection
8/21/2018 • 3 minutes to read • Edit Online

The Exchange admin center (EAC ) is the web-based management console for Microsoft Exchange Online
Protection (EOP ).
Looking for the Exchange 2013 version of this topic? See Exchange admin center in Exchange 2013.
Looking for the Exchange Online version of this topic? See Exchange admin center in Exchange Online.

Accessing the EAC


In most cases, EOP customers will access the EAC through the Office 365 admin center. You can find a link to EOP
in the drop-down menu in the Admin tile, which is next to the Me tile. Click the Admin tile and select Exchange
Online Protection from the drop down menu to be taken to the EAC.
You can also access the EAC sign in page directly via the following URL:
https://admin.protection.outlook.com/ecp/<companydomain>. For example,
https://admin.protection.outlook.com/ecp/contoso.onmicrosoft.com. After specifying your user credentials you will
be taken directly into the EAC.

Common user interface elements in the EAC


This section describes the user interface elements that are found in the EAC.

Feature Pane
This is the first level of navigation for most of the tasks you'll perform in the EAC. The feature pane is organized by
feature areas.
1. Recipients This is where you'll view internal users and external contacts.
2. Permissions This where you'll manage administrator roles.
3. Compliance Management This is where you'll find audit logs and reports, such as the administrator role
group report.
4. Protection This is where you'll manage anti-malware and anti-spam protection for your organization, as
well as manage messages in quarantine.
5. Mail Flow This is where you'll manage rules, accepted domains, and connectors, as well as where you'll go
to perform message trace.
Tabs
The tabs are your second level of navigation. Each of the feature areas contains various tabs, each representing a
feature.
Toolbar
When you click most tabs, you'll see a toolbar. The toolbar has icons that perform a specific action. The following
table describes the icons and their actions.

ICON NAME ACTION

Add, New Use this icon to create a new object.


Some of these icons have an associated
down arrow you can click to show
additional objects you can create.

Edit Use this icon to edit an object.

Delete Use this icon to delete an object. Some


delete icons have a down arrow you can
click to show additional options.

Search Use this icon to open a search box in


which you can type the search phrase
for an object you want to find.

Refresh Use this icon to refresh the list view.

More options Use this icon to view more actions you


can perform for that tab's objects. For
example, in Recipients > Users clicking
this icon shows the option to perform
an Advanced Search.

Up arrow and down arrow Use these icons to move an object's


priority up or down.

Remove Use this icon to remove objects from a


list.

List View
When you select a tab, in most cases you'll see a list view. The viewable limit with the EAC list view is
approximately 10,000 objects. In addition, paging is included so that you can page to results.
Details Pane
When you select an object from the list view, information about that object is displayed in the details pane. In some
cases the details pane includes management tasks.
Me tile and Help
The Me tile allows you to sign out the EAC and sign in as a different user. From the Help drop-down menu, you
can perform the following actions:
1. Help Click to view the online help content.
2. Disable Help bubble The Help bubble displays contextual help for fields when you create or edit an object.
You can turn off the Help bubble or turn it on if it has been disabled.
3. Copyright Click this link to read the copyright notice for Exchange Online Protection.
4. Privacy Click to read the privacy policy for Exchange Online Protection.

Supported Browsers
For the best experience using the EAC, we recommend that you always use the latest browsers, Office clients, and
apps. We also recommend that you install software updates when they become available. For more information
about the supported browsers and system requirements for the service, see Office 365 System Requirements.

Supported languages in EOP


The following languages are supported and available for Exchange Online Protection.
Amharic
Arabic
Basque (Basque)
Bengali (India)
Bulgarian
Catalan
Chinese (Simplified)
Chinese (Traditional)
Croatian
Czech
Danish
Dutch
Dutch
English
Estonian
Filipino (Philippines)
Finnish
French
Galician
German
Greek
Gujarati
Hebrew
Hindi
Hungarian
Icelandic
Indonesian
Italian
Japanese
Kannada
Kazakh
Kiswahili
Korean
Latvian
Lithuanian
Malay (Brunei Darussalam)
Malay (Malaysia)
Malayalam
Marathi
Norwegian (Bokmål)
Norwegian (Nynorsk)
Oriya
Persian
Polish
Portuguese (Brazil)
Portuguese (Portugal)
Romanian
Russian
Serbian (Cyrillic, Serbia)
Serbian (Latin)
Slovak
Slovenian
Spanish
Swedish
Tamil
Telugu
Thai
Turkish
Ukrainian
Urdu
Vietnamese
Welsh
Set up your EOP service
10/23/2018 • 5 minutes to read • Edit Online

This topic explains how to set up Microsoft Exchange Online Protection (EOP ). If you landed here from the Office
365 domains wizard, go back to the Office 365 domains wizard if you don't want to use Exchange Online
Protection. If you're looking for more information on how to configure connectors, see Configure mail flow using
connectors in Office 365.

NOTE
This topic assumes you have on-premises mailboxes and you want to protect them with EOP, which is known as a
standalone scenario. If you want to host all of your mailboxes in the cloud with Exchange Online, you don't have to complete
all of the steps in this topic. Go to Exchange Online to sign up and purchase cloud mailboxes. If you want to host some of
your mailboxes on premises and some in the cloud, this is known as a hybrid scenario. It requires more advanced mail-flow
settings. Exchange Server 2013 Hybrid Deployments explains hybrid mail flow and has links to resources that show how to
set it up.

What do you need to know before you begin?


Estimated time to complete this task: 1 hour
To configure connectors, your account must be an Office 365 Global Admin, or an Exchange Company
Administrator (the Organization Management role group). For information about how Office 365
permissions relate to Exchange permissions, see Permissions in Office 365.
If you haven't signed up for EOP, visit Exchange Online Protection and choose to buy or try the service.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

How do you do this?


Step 1: Use the Office 365 admin center to add and verify your domain
1. In the Office 365 admin center, navigate to Setup to add your domain to the service.
Not sure where to find the Office 365 admin center? Learn more at About the Office 365 admin center.
2. Follow the steps to add the applicable DNS records to your DNS -hosting provider in order to verify
domain ownership.

TIP
Add your domain to Office 365 and Create DNS records for Office 365 are helpful resources to reference as you add your
domain to the service and configure DNS.
Step 2: Add recipients and optionally enable DBEB
Before configuring your mail to flow to and from the EOP service, we recommend adding your recipients to the
service. There are several ways in which you can do this, as documented in Manage mail users in EOP. Also, if you
want to enable Directory Based Edge Blocking (DBEB ) in order to enforce recipient verification within the service
after adding your recipients, you need to set your domain type to Authoritative. For more information about
DBEB, see Use Directory Based Edge Blocking to Reject Messages Sent to Invalid Recipients.
Step 3: Use the EAC to set up mail flow
Create connectors in the Exchange admin center (EAC ) that enable mail flow between EOP and your on-premises
mail servers. For detailed instructions, see Set up connectors to route mail between Office 365 and your own
email servers.
How do you know this task worked?
Use the Remote Connectivity Analyzer to run a test that checks mail flow between the service and your
environment. For more information, see the "Use the Remote Connectivity Analyzer to test email delivery" section
in Testing Mail Flow with the Remote Connectivity Analyzer.
Step 4: Allow inbound port 25 SMTP access
After you configured connectors, wait 72 hours to allow propagation of your DNS -record updates. Following this,
restrict inbound port-25 SMTP traffic on your firewall or mail servers to accept mail only from the EOP
datacenters, specifically from the IP addresses listed at Exchange Online Protection IP addresses. This protects
your on-premises environment by limiting the scope of inbound messages you can receive. Additionally, if you
have settings on your mail server that control the IP addresses allowed to connect for mail relay, update those
settings as well.

TIP
Configure settings on the SMTP server with a connection time out of 60 seconds. This setting is acceptable for most
situations, allowing for some delay in the case of a message sent with a large attachment, for instance.

Step 5: Use the Shell to ensure that spam is routed to each user's junk email folder
To ensure that spam (junk) email is routed correctly to each user's Junk Email folder, you must perform a couple of
configuration steps. The steps are provided in Ensure that spam is routed to each user's Junk Email folder.
If you don't want to move messages to each user's Junk Email folder, you may choose another action by editing
your content filter policies in the Exchange admin center. For more information, see Configure your spam filter
policies.
Step 6: Use the Office 365 admin center to point your MX record to EOP
Follow the Office 365 domain configuration steps to update your MX record for your domain, so that your
inbound email flows through EOP. Be sure to point your MX record directly to EOP as opposed to having a third-
party filtering service relay email to EOP. For more information, you can again reference Create DNS records for
Office 365.
How do you know this task worked?
Use the Remote Connectivity Analyzer to run a test that verifies your MX record. For more information, see the
"Use the Remote Connectivity Analyzer to test your MX record and Outbound connector" section in Testing Mail
Flow with the Remote Connectivity Analyzer.
At this point, you've verified service delivery for a properly configured Outbound on-premises connector, and
you've verified that your MX record is pointing to EOP. You can now choose to run the following additional tests
to verify that an email will be successfully delivered by the service to your on-premises environment:
In the Remote Connectivity Analyzer, click the Office 365 tab, and then run the Inbound SMTP Email
test located under Internet Email Tests.
Send an email message from any web-based email account to a mail recipient in your organization whose
domain matches the domain you added to the service. Confirm delivery of the message to the on-premises
mailbox using Microsoft Outlook or another email client.
If you want to run an outbound email test, you can send an email message from a user in your organization
to a web-based email account and confirm that the message is received.

TIP
When you've completed your setup, you don't have to perform extra steps to make EOP remove spam and malware. EOP
removes spam and malware automatically. However, you can fine tune your settings in the EAC, based on your business
requirements. For more information, see Anti-Spam and Anti-Malware Protection. > Now that your service is running, we
recommend reading Best practices for configuring EOP, which describes recommended settings and considerations for after
you set up EOP.
Videos for getting started with EOP
6/26/2018 • 2 minutes to read • Edit Online

The following series of videos will help you set up and use the Exchange Online Protection (EOP ) hosted email
filtering service.

NOTE
Before you start the tasks described in the videos, we recommend that you set up mail flow. For more information, see the
Configure mail flow using connectors in Office 365 topic.

These videos are about tailoring your anti-spam settings to fit the needs of your organization. For inbound mail
traveling through the service to your organization, this includes creating safe sender and blocked sender lists
based on IP addresses, and configuring content filter settings. There's also a video showing how admins can find
and release content-filtered spam messages or messages that matched a transport rule that were sent to the
quarantine, and also how to report spam messages to help us improve the service.
Configure IP Allow and IP Block Lists in EOP

For more details, see the Configure the connection filter policy topic.
Configure Spam Content Filtering in EOP

For more details, see the Configure your spam filter policies topic.
Find and Release Messages From the Quarantine

For more details, see the Find and release quarantined messages as an administrator topic.
You'll also want to configure the outbound spam policy because you'll want to monitor if spam is being sent from
your organization. Check out the outbound spam video to learn how.
Configure the Outbound Spam Policy

For more details, see the Configure the outbound spam policy
EOP also has settings for how to handle malware that's detected by the service, which the anti-malware filtering
video describes.
Configure the Anti-Malware Policy

For more details, see the Configure anti-malware policies topic.


To filter and route messages based on specific conditions you set, based on company policy or regulations, you'll
want to watch the video about how to create transport rules.
Configure Exchange Transport Rules in EOP
For more details, see the Mail flow rules (transport rules) in Exchange Online Protection topic if you use
EOP standalone, or see the Transport rules topic if you use Exchange Online.
f you're interested in configuring the service by running scripts from the command line, the remote PowerShell
video will help you get started.
Use Remote PowerShell in EOP

For more details, see the PowerShell in Exchange Online Protection topic if you use EOP standalone, or see
the Exchange Online PowerShell topic if you use Exchange Online.
Best practices for configuring EOP
6/26/2018 • 6 minutes to read • Edit Online

Follow these best-practice recommendations for Exchange Online Protection (EOP ) in order to set yourself up for
success and avoid common configuration errors. We recommend using the default configuration settings as a
general rule. This topic assumes that you've already completed the setup process. If you haven't completed EOP
setup, see Set up your EOP service.

Use a test domain


We recommend that you use a test domain, subdomain, or low volume domain for trying out service features
before implementing them on your higher-volume, production domains.

Synchronize recipients
If your organization has existing user accounts in an on-premisesActive Directory environment, you can
synchronize those accounts to Azure Active Directory in the cloud. Using directory synchronization is
recommended. To learn more about the benefits of using directory synchronization, and the steps for setting it up,
see Manage mail users in EOP.

SPF record customization to help prevent spoofing


When you set up EOP, you added an SPF (sender policy framework) record for EOP to your DNS records. The
SPF record helps prevent spoofing. For more information about how an SPF record prevents spoofing and how
you can add your on-premises IP addresses to the SPF record, see Set up SPF in Office 365 to help prevent
spoofing.

Set anti-spam options


Mange your connection filter settings by adding IP addresses to IP Allow and IP Block lists, and by selecting the
Enable safe list option, which should reduce the number of false positives (good mail that's classified as spam)
you receive. Learn more at Configure the connection filter policy. For more spam settings that apply to the whole
organization, take a look at How to help ensure that a message isn't marked as spam or Block email spam with the
Office 365 spam filter to prevent false negative issues. These are helpful if you have administrator-level control
and you want to prevent false positives or false negatives.
Manage your content filters by reviewing and optionally changing the default settings. For example, you can
change the action for what happens to spam-detected messages. If you want to pursue an aggressive approach to
spam filtering, you can configure advanced spam filtering options. We recommend that you test these options first
before implementing them in your production environment (by turning them on) It's recommended that
organizations who are concerned about phishing turn on the SPF record: hard fail option. Learn more at
Configure your spam filter policies and Advanced spam filtering options.

IMPORTANT
If you are using the default content filter action, Move message to Junk Email folder, in order to ensure that this action
will work with on-premises mailboxes, you must configure Exchange mail flow rules, also called transport rules, on your on-
premises servers to detect spam headers added by EOP. For details, see Ensure that spam is routed to each user's Junk Email
folder.
We recommend that you review the Anti-spam protection FAQ, including the outbound mailing best practices
section, which will help ensure that your outbound mail is delivered.
You can submit false negatives (spam) and false positives (non-spam) to Microsoft for analysis in several ways. For
details, see Submit spam, non-spam, and phishing scam messages to Microsoft for analysis.

Set anti-malware options


Review and fine tune your malware filter settings in the Exchange admin center(EAC ). Learn more at Configure
anti-malware policies. We also recommend reading about other frequently asked questions and answers
pertaining to anti-malware protection in our Anti-malware protection FAQ .
If you're concerned about executable files containing malware, you can create an Exchange mail flow rule that
blocks any email attachment that has executable content. Follow the steps in How to reduce malware threats
through file attachment blocking in Exchange Online Protection in order to block the file types listed under
"Supported executable file types for transport rule inspection" in Use mail flow rules to inspect message
attachments.
You can use the Common Attachment Types Filter in the EAC. Select protection > malware filters. You can
create an Exchange mail flow rule, also known as transport rule, that blocks any email attachment that has
executable content.
For increased protection, we also recommend using mail flow rules to block some or all of the following
extensions: ade, adp, ani, bas, bat, chm, cmd, com, cpl, crt, hlp, ht, hta, inf, ins, isp, job, js, jse, lnk, mda, mdb, mde,
mdz, msc, msi, msp, mst, pcd, reg, scr, sct, shs, url, vb, vbe, vbs, wsc, wsf, wsh. This can be done by using the Any
attachment file extension includes these words condition.
Administrators and end users can submit malware that made it past the filters, or submit a file that you think was
incorrectly identified as malware, by sending it to Microsoft for analysis. For more information, see Submitting
malware and non-malware to Microsoft for analysis.

Create mail flow rules


Create mail flow rules, also called transport rules or custom filters, to meet your business needs.
When you deploy a new rule to production, select one of the test modes first to see the effect of the rule. Once you
are satisfied that the rule is working in the manner intended, change the rule mode to Enforce.
When you deploy new rules, consider adding the additional action of Generate Incident Report to monitor the
rule in action.
If you are in a hybrid deployment configuration, with part of your organization on-premises and part in Office 365,
you can create rules that apply to the entire organization. To do this, use conditions that are available both on-
premises and in Office 365. While most conditions are available in both deployments, there is a small set that is
specific to a particular deployment scenario. Learn more at Mail flow or Transport rules.
If you want to inspect email attachments for messages in-transit within your organization, you can do this by
setting up mail flow rules. Then, take action on the messages that were inspected based on the content or
characteristics of those attachments. Learn more at Use mail flow rules to inspect message attachments.
Phishing and Spoofing Prevention
You can improve anti-phishing protection by the detecting when personal information exits the organization in
email. For example, you can use the following regular expressions in mail flow rules to detect transmission of
personal financial data or information that may compromise privacy:
\d\d\d\d\s\d\d\d\d\s\d\d\d\d\s\d\d\d\d (MasterCard Visa)
\d\d\d\d\s\d\d\d\d\d\d\s\d\d\d\d\d (American Express)
\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d (any 16-digit number)
\d\d\d-\d\d-\d\d\d\d (Social Security Numbers)
Successful spam and phishing campaigns can also be reduced by blocking inbound, malicious emails that appear
to have been sent from your own domain. For example, you can create a mail flow rule that rejects messages from
your company domain sent to the same company domain to block this type of sender forgery.
Cau t i on

We recommend creating this reject rule only in cases where you are certain that no legitimate email from your
domain is sent from the Internet to your mail server. This can happen in cases where a message is sent from a user
in your organization to an outside recipient and subsequently forwarded to another recipient in your organization.
Extension Blocking
If you're concerned about executable files containing malware, you can configure anti-malware policies to block
any email attachment that has executable content. Follow the steps in Configure anti-malware policies.
For increased protection, we also recommend that you block some or all of the following extensions: ade, adp, ani,
bas, bat, chm, cmd, com, cpl, crt, hlp, ht, hta, inf, ins, isp, job, js, jse, lnk, mda, mdb, mde, mdz, msc, msi, msp, mst,
pcd, reg, scr, sct, shs, url, vb, vbe, vbs, wsc, wsf, wsh.

Reporting and troubleshooting


Troubleshoot general issues and trends by using the reports in the Office 365 admin center. Find single point
specific data about a message by using the message trace tool. Learn more about reporting at Reporting and
message trace in Exchange Online Protection. Learn more about the message trace tool at Trace an Email Message.

For more information


EOP general FAQ
Help and support for EOP
Videos for getting started with EOP
How to help ensure that a message isn't marked as spam
Block email spam with the Office 365 spam filter to prevent false negative issues
Sample script for applying EOP settings to multiple
tenants
6/26/2018 • 2 minutes to read • Edit Online

The following sample script lets Microsoft Exchange Online Protection (EOP ) admins who manage multiple
tenants (companies) use Windows PowerShell to apply configuration settings to their tenants.
To run a script or cmdlet on multiple tenants
1. Using an application such as Excel, create a .csv file (for example, c:\scripts\inputfile.csv):
2. In the .csv file, specify two column names: UserName and Cmdlet.
3. For each row in the .csv file, add the tenant's admin name in the UserName column and the cmdlet to run
for that tenant in the Cmdlet column. For example, use admin@contoso.com and Get-AcceptedDomain.
4. Copy the RunCmdletOnMultipleTenants.ps1 script to an editor like Notepad, and then save the file to a
location (like c:\scripts) that makes .ps1 files easy to find.
5. Run the script by using the following syntax:
&amp; "<file path>\RunCmdletOnMultipleTenants.ps1" "<file path>\inputfile.csv"

Here's an example.

&amp; "c:\scripts\RunCmdletOnMultipleTenanats.ps1" "c:\scripts\inputfile.csv"

4. Each tenant will be logged on to, and the cmdlet will be run.

RunCmdletOnMultipleTenants.ps1
# This script runs Windows PowerShell cmdlets on multiple tenants.
# Usage: RunCmdletOnMultipleTenants.ps1 inputfile.csv
#
# .csv input file sample:
# UserName,Cmdlet
# admin@contoso.com,Get-AcceptedDomain | ft Name
# URI for connecting to remote Windows PowerShell
$URI = "https://ps.protection.outlook.com/powershell-liveid/"
# Get the .csv file name as an argument to this script.
$FilePath = $args[0]
# Import the UserName and Cmdlet values from the .csv file.
$CompanyList = Import-CSV $FilePath
# Loop through each entry from the .csv file.
ForEach ($Company in $CompanyList) {
# Get the current entry's UserName.
$UserName = $Company.UserName
# Get the current entry's Cmdlet.
$Cmdlet = $Company.Cmdlet
# Create a PowerShell credential object by using the current entry's UserName. Prompt for the password.
$UserCredential = Get-Credential -username $UserName
# Log on to a new Windows PowerShell session.
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri $URI -Credential $UserCredential
-Authentication Basic -AllowRedirection
Import-PSSession $Session
# Here's where the script to be run on the tenant goes.
# In this example, the cmdlet in the .csv file runs.
Invoke-Expression $Cmdlet
# End the current PowerShell session.
remove-pssession -session $Session
}
Move domains and settings from one EOP
organization to another EOP organization
8/20/2018 • 20 minutes to read • Edit Online

Changing business requirements can sometimes require splitting one Microsoft Exchange Online Protection (EOP )
organization (tenant) into two separate organizations, merging two organizations into one, or moving your
domains and EOP settings from one organization to another organization. Moving from one EOP organization to
a second EOP organization can be challenging, but with a few basic remote Windows PowerShell scripts and a
small amount of preparation, this can be achieved with a relatively small maintenance window.

NOTE
Settings can be reliably moved only from an EOP standalone (Standard) organization to either another EOP Standard or an
Exchange Enterprise CAL with Services (EOP Premium) organization, or from an EOP Premium organization to another EOP
Premium organization. Because some premium features are not supported in EOP Standard organizations, moves from an
EOP Premium organization to an EOP Standard organization might not be successful. > These instructions are for EOP
filtering-only organizations. There are additional considerations in moving from one Exchange Online organization to another
Exchange Online organization. Exchange Online organizations are out of scope for these instructions.

In the following example, Contoso, Ltd. has merged with Contoso Suites. The following image shows the process
of moving domains, mail users and groups, and settings from the source EOP organization
(contoso.onmicrosoft.com) to the target EOP organization (contososuites.onmicrosoft.com):

The challenge in moving domains from one organization to another is that a verified domain can't exist in two
organizations at the same time. The following steps help you work through this.

Step 1: Collect data from the source organization


In order to re-create the source organization in the target organization, make sure that you collect and store the
following information about the source organization:
Domains
Mail users
Groups
Anti-spam content filters
Anti-malware content filters
Connectors
Transport rules
NOTE
Cmdlet support for the export and import of the Transport Rule Collection is currently only supported for EOP
Premium subscription plans.

The easiest way to collect all of your settings is to use remote Windows PowerShell. To connect to EOP by using
remote Windows PowerShell, see Connect to Exchange Online Protection Using Remote PowerShell.
Next, you can collect all your settings and export them to an .xml file to be imported into the target tenant. In
general, you can pipe the output of the Get cmdlet for each setting to the Export-Clixml cmdlet to save the
settings in .xml files, as shown in the following code sample.
After you've connected to remote Windows PowerShell, create a directory called Export in a location that's easy to
find and change to that directory. For example:

mkdir C:\EOP\Export

cd C:\EOP\Export

The following script can be used to collect all the mail users, groups, anti-spam settings, anti-malware settings,
connectors, and transport rules in the source organization. Copy and paste the following text into a text editor like
Notepad, save the file as Source_EOP_Settings.ps1 in the Export directory you just created, and run the following
command:

&amp; "C:\EOP\Export\Source_EOP_Settings.ps1"

#****************************************************************************
# Export Domains
#*****************************************************************************
Get-AcceptedDomain | Export-Clixml Domains.xml
#****************************************************************************
# Export mail users
#
#****************************************************************************
Get-Recipient -ResultSize unlimited -RecipientTypeDetails MailUser | Export-Clixml MailUsers.xml
#****************************************************************************
# Groups
#
# If you're using directory synchronization, you can skip this step and
# simply sync to the target
# tenant.
# First, you need to capture information about the distribution groups.
#****************************************************************************
Get-Recipient -ResultSize unlimited -RecipientTypeDetails MailUniversalDistributionGroup | Export-Clixml
DistributionGroups.xml
Get-Recipient -ResultSize unlimited -RecipientTypeDetails MailUniversalSecurityGroup | Export-Clixml
SecurityGroups.xml
#****************************************************************************
# And then we'll use that output to loop through each group and get the
# members.
#****************************************************************************
$DGs = Import-Clixml .\DistributionGroups.xml
ForEach ($dg in $DGs) {Get-DistributionGroupMember -Identity $dg.name | Export-Clixml
$dg.ExternalDirectoryObjectId}
$SGs = Import-Clixml .\SecurityGroups.xml
ForEach ($sg in $SGs) {Get-DistributionGroupMember -Identity $sg.name | Export-Clixml
$sg.ExternalDirectoryObjectId}
#*****************************************************************************
# Export dynamic distribution groups - EOP Premium Only
#
# If you're using directory synchronization, then you can skip this step and simply
# sync to the target tenant.
#*****************************************************************************
Get-DynamicDistributionGroup -ResultSize unlimited | Export-Clixml DynamicDistributionGroups.xml
#*****************************************************************************
# Export mail contacts - EOP Premium Only
#
# If you're using directory synchronization, then you can skip this step and simply
# sync to the target tenant.
#*****************************************************************************
Get-MailContact -ResultSize unlimited -RecipientTypeDetails MailContact | Export-Clixml MailContacts.xml
#****************************************************************************
# Anti-spam
#****************************************************************************
Get-HostedConnectionFilterPolicy | Export-Clixml HostedConnectionFilterPolicy.xml
Get-HostedContentFilterPolicy | Export-Clixml HostedContentFilterPolicy.xml
Get-HostedContentFilterRule | Export-Clixml HostedContentFilterRule.xml
Get-HostedOutboundSpamFilterPolicy | Export-Clixml HostedOutboundSpamFilterPolicy.xml
#****************************************************************************
# Anti-malware content filters
#****************************************************************************
Get-MalwareFilterPolicy | Export-Clixml MalwareFilterPolicy.xml
Get-MalwareFilterRule | Export-Clixml MalwareFilterRule.xml
#****************************************************************************
# Connectors
#****************************************************************************
Get-InboundConnector | Export-Clixml InboundConnector.xml
Get-OutboundConnector | Export-Clixml OutboundConnector.xml
#****************************************************************************
# Exchange transport rules
#****************************************************************************
$file = Export-TransportRuleCollection
Set-Content -Path ".TransportRules.xml" -Value $file.FileData -Encoding Byte

Run the following commands from the Export directory to update the .xml files with the target organization.
Replace contoso.onmicrosoft.com and contososuites.onmicrosoft.com with your source and target organization
names.

$files = ls
ForEach ($file in $files) { (Get-Content $file.Name) | Foreach-Object {$_ -replace 'contoso.onmicrosoft.com',
'contososuites.onmicrosoft.com'} | Set-Content $file.Name}

Step 2: Add domains to the target organization


Add domains to the target organization by using the following script. Copy and paste the text into a text editor like
Notepad, save the script as C:\EOP\Export\Add_Domains.ps1, and run the following command:

&amp; "C:\EOP\Export\Add_Domains.ps1"

These domains won't be verified and can't be used to route mail, but after the domains are added, you can collect
the information needed to verify the domains and eventually update your MX records for the new tenant.
#***********************************************************************
# Login to Azure Active Directory
#*****************************************************************************
$msolcred = Get-Credential
connect-msolservice -credential $msolcred
#****************************************************************************
# Add domains
#****************************************************************************
$Domains = Import-Clixml ".\Domains.xml"
Foreach ($domain in $Domains) {
New-MsolDomain -Name $domain.Name
}

Now, you can review and collect the information from the Office 365 admin center of your target organization so
that you can quickly verify your domains when the time comes:
1. Sign in to the Office 365 admin center at https://portal.office.com.
2. Click Domains.
3. Click each Start setup link, and then proceed through the setup wizard.
4. On the Confirm ownership page, for See step-by-step instructions for performing this step with,
select General instructions.
5. Record the MX record or TXT record that you'll use to verify your domain, and finish the setup wizard.
6. Add the verification TXT records to your DNS records. This will let you more quickly verify the domains in
the source organization after they're removed from the target organization. For more information about
configuring DNS, see Create DNS records for Office 365.

Step 3: Force senders to queue mail


While moving your domains from one tenant to another, you'll need to delete the domains from the source
organization and then verify them in your target organization. During this time, you won't be able to route mail
through EOP.
One option to force senders to queue mail is to update your MX records to point directly to your on-premises mail
server.
Another option is to put an invalid MX record in each domain where the DNS records for your domain are kept
(also known as your DNS hosting service). This will cause the sender to queue your mail and retry (typical retry
attempts are for 48 hours, but this might vary from provider to provider). You can use invalid.outlook.com as an
invalid MX target. Lowering the Time to Live (TTL ) value to five minutes on the MX record will help the change
propagate to DNS providers more quickly.
For more information about configuring DNS, see Create DNS records for Office 365.

IMPORTANT
Different providers queue mail for different periods of time. You'll need to set up your new tenant quickly and revert your
DNS settings to avoid non-delivery reports (NDRs) from being sent to the sender if the queuing time expires.

Step 4: Remove users, groups, and domains from the source


organization
The following script removes users, groups, and domains from the source tenant by using Azure Active Directory
remote Windows PowerShell. Copy and paste the following text into a text editor like Notepad, save the file as
C:\EOP\Export\Remove_Users_and_Groups.ps1, and run the following command:

&amp; "C:\EOP\Export\Remove_Users_and_Groups.ps1"

#*****************************************************************************
# Login to Azure Active Directory
#*****************************************************************************
$msolcred= Get-Credential
connect-msolservice -credential $msolcred
#*****************************************************************************
# Remove users
#*****************************************************************************
$Users = Get-MSOLUser -All | sort UserPrincipalName
$user_count = $Users.count
write-host "Removing $user_count users."
Foreach ($User in $Users) {
write-host $User.UserPrincipalName
$User | Remove-MSOLUser -Force
}
#*****************************************************************************
# Remove groups
#*****************************************************************************
Get-MSOLGroup | Remove-MSOLGroup -Force
#*****************************************************************************
# Remove domains
# Note: Your onmicrosoft.com domain should be the default domain
#*****************************************************************************
$Domains = Get-MsolDomain
$Domain_count = $Domains.count
write-host "Removing $Domain_count domains."
Foreach ($Domain in $Domains) {
write-host $Domain.Name
Remove-MsolDomain -DomainName $Domain.Name -Force
}

Step 5: Verify domains for the target organization


1. Sign in to the Office 365 admin center at https://portal.office.com.
2. Click Domains.
3. Click each Start setup link for the target domain and proceed through the setup wizard.

Step 6: Add mail users and groups to the target organization


A best practice for EOP is to use Azure Active Directory to sync your on-premises Active Directory to your target
tenant. For more information about how to do this, see "Use directory synchronization to manage mail users" in
Manage mail users in EOP. You can also use the following script to recreate your users and groups from your
source tenant. Note: User passwords cannot be moved. New user passwords are created and saved in the file
named UsersAndGroups.ps1. (For more information about resetting your password, see Reset a user's password.)
To use the script, copy and paste the following text into a text editor like Notepad, save the file as
C:\EOP\Export\Add_Users_and_Groups.ps1, and run the following command:

&amp; "C:\EOP\Export\Add_Users_and_Groups.ps1"

#***********************************************************************
#***********************************************************************
# makeparam helper function
#****************************************************************************
function makeparam ([string]$ParamName, [string[]] $ParamValue) {
$FormattedParam = ""
If($ParamValue.Count -gt 0) {
$FormattedParam = " -$ParamName "
Foreach ($value in $ParamValue) {
If($value -eq "True") {$FormattedParam = " -$ParamName" + ":`$True,"}
else{
If($value -eq "False") {$FormattedParam = " -$ParamName" + ":`$False,"}
else{$FormattedParam += "`"$value`","}
}
}
$FormattedParam = $FormattedParam.TrimEnd(",")
}
Return $FormattedParam
}
#****************************************************************************
# Variables
#****************************************************************************
$outfile = ".\UsersAndGroups.ps1"
rm -erroraction 'silentlycontinue' $outfile
#****************************************************************************
# Add mail users
#****************************************************************************
$rand = New-Object System.Random -ArgumentList (get-date).millisecond
$MailUsers = Import-Clixml ".\MailUsers.xml"
$MailUsersCount = $MailUsers.Name.Count
if($MailUsersCount -gt 0){
Write-Host "Importing $MailUsersCount Mail Users"
ForEach ($MailUser in $MailUsers) {
$MailUsersCmdlet = "New-MailUser"
If((Get-PSSession).ComputerName.Contains("ps.protection")) {
$DistributionGroupsCmdlet = "New-EOPMailUser"
}
$MailUsersCmdlet += makeparam "LastName" $MailUser.LastName
$MailUsersCmdlet += makeparam "FirstName" $MailUser.FirstName
$MailUsersCmdlet += makeparam "DisplayName" $MailUser.DisplayName
$MailUsersCmdlet += makeparam "Name" $MailUser.Name
$MailUsersCmdlet += makeparam "Alias" $MailUser.Alias
$MailUsersCmdlet += makeparam "MicrosoftOnlineServicesID" $MailUser.MicrosoftOnlineServicesID
$MailUsersCmdlet += makeparam "ExternalEmailAddress" $MailUser.ExternalEmailAddress

# Generate a new 10 character password


$NewPassword = ""
1..10 | ForEach { $NewPassword = $NewPassword + [char]$rand.next(40,127) }

$MailUsersCmdlet += " -Password (ConvertTo-SecureString -String '$NewPassword' -AsPlainText -Force)"


Add-Content $outfile "`n$MailUsersCmdlet"
}
}
#****************************************************************************
# Add distribution groups
#****************************************************************************
$DistributionGroups = Import-Clixml ".\DistributionGroups.xml"
$DistributionGroupsCount = $DistributionGroups.Name.Count
if($DistributionGroupsCount -gt 0){
Write-Host "Importing $DistributionGroupsCount Distribution Groups"
ForEach ($DistributionGroup in $DistributionGroups) {
$DistributionGroupsCmdlet = "New-DistributionGroup"
If((Get-PSSession).ComputerName.Contains("ps.protection")) {
$DistributionGroupsCmdlet = "New-EOPDistributionGroup"
}
$DistributionGroupsCmdlet += makeparam "Name" $DistributionGroup.Name
$DistributionGroupsCmdlet += makeparam "Alias" $DistributionGroup.Alias
$DistributionGroupsCmdlet += makeparam "DisplayName" $DistributionGroup.DisplayName
$DistributionGroupsCmdlet += makeparam "ManagedBy" $DistributionGroup.ManagedBy

$DistributionGroupsCmdlet += makeparam "Notes" $DistributionGroup.Notes


$DistributionGroupsCmdlet += makeparam "Notes" $DistributionGroup.Notes
$DistributionGroupsCmdlet += makeparam "PrimarySmtpAddress" $DistributionGroup.PrimarySmtpAddress
$DistributionGroupsCmdlet += makeparam "Type" $DistributionGroup.Type
$MembersCmdlet = "@("
$memberslist = Import-Clixml $DistributionGroup.ExternalDirectoryObjectId
ForEach ($user in $memberslist) {
$MembersCmdlet += "`"$user.Name`","
}
$MembersCmdlet = $MembersCmdlet.TrimEnd(",")
$MembersCmdlet += ")"
}
Add-Content $outfile "`n$DistributionGroupsCmdlet"
}
#****************************************************************************
# Add security groups
#****************************************************************************
$SecurityGroups = Import-Clixml ".\SecurityGroups.xml"
$SecurityGroupsCount = $SecurityGroups.Name.Count
if($SecurityGroupsCount -gt 0){
Write-Host "Importing $SecurityGroupsCount Security Groups"
ForEach ($SecurityGroup in $SecurityGroups) {
$SecurityGroupsCmdlet = "New-SecurityGroup"
If((Get-PSSession).ComputerName.Contains("ps.protection")) {
$DistributionGroupsCmdlet = "New-EOPSecurityGroup"
}
$SecurityGroupsCmdlet += makeparam "Name" $SecurityGroup.Name
$SecurityGroupsCmdlet += makeparam "Alias" $SecurityGroup.Alias
$SecurityGroupsCmdlet += makeparam "DisplayName" $SecurityGroup.DisplayName
$SecurityGroupsCmdlet += makeparam "ManagedBy" $SecurityGroup.ManagedBy

$SecurityGroupsCmdlet += makeparam "Notes" $SecurityGroup.Notes


$SecurityGroupsCmdlet += makeparam "PrimarySmtpAddress" $SecurityGroup.PrimarySmtpAddress
$SecurityGroupsCmdlet += makeparam "Type" $SecurityGroup.Type
$MembersCmdlet = "@("
$memberslist = Import-Clixml $SecurityGroup.ExternalDirectoryObjectId
ForEach ($user in $memberslist) {
$MembersCmdlet += "`"$user.Name`","
}
$MembersCmdlet = $MembersCmdlet.TrimEnd(",")
$MembersCmdlet += ")"
}
Add-Content $outfile "`n$SecurityGroupsCmdlet"
}
#****************************************************************************
# Add Dynamic Distribution Groups
#****************************************************************************
If((Get-PSSession).ComputerName.Contains("ps.protection")) {
write-Host "No Synamic Distribution Groups for EOP Standard organizations."
}else{
$DynamicDistributionGroups = Import-Clixml ".\DynamicDistributionGroups.xml"
$DynamicDistributionGroupsCount = $DynamicDistributionGroups.Name.Count
if($DynamicDistributionGroupsCount -gt 0){
Write-Host "Importing $DynamicDistributionGroupsCount Dynamic Distribution Groups"
foreach ($DynamicDistributionGroup in $DynamicDistributionGroups) {
$DynamicDistributionGroupsCmdlet = "New-DynamicDistributionGroup"
$DynamicDistributionGroupsCmdlet += " -Confirm:`$False"
$DynamicDistributionGroupsCmdlet += makeparam "DisplayName" $DynamicDistributionGroup.DisplayName
$DynamicDistributionGroupsCmdlet += makeparam "ModeratedBy" $DynamicDistributionGroup.ModeratedBy
$DynamicDistributionGroupsCmdlet += makeparam "ModerationEnabled"
$DynamicDistributionGroup.ModerationEnabled
$DynamicDistributionGroupsCmdlet += makeparam "Name" $DynamicDistributionGroup.Name
$DynamicDistributionGroupsCmdlet += makeparam "PrimarySmtpAddress"
$DynamicDistributionGroup.PrimarySmtpAddress
$DynamicDistributionGroupsCmdlet += makeparam "RecipientContainer"
$DynamicDistributionGroup.RecipientContainer
$RecipientFilterParam = makeparam "RecipientFilter" $DynamicDistributionGroup.RecipientFilter
$RecipientFilterParam = " -RecipientFilter {" + $RecipientFilterParam.Substring(19)
$RecipientFilterParam = $RecipientFilterParam.Substring(0,$RecipientFilterParam.Length-1)
$RecipientFilterParam += "}"
$DynamicDistributionGroupsCmdlet += $RecipientFilterParam
$DynamicDistributionGroupsCmdlet += makeparam "SendModerationNotifications"
$DynamicDistributionGroup.SendModerationNotifications
Add-Content $outfile "`n$DynamicDistributionGroupsCmdlet"
}

}else{
Write-Host "No Dynamic Distribution Groups to add."
}
}
#****************************************************************************
# Add Mail Contacts
#****************************************************************************
If((Get-PSSession).ComputerName.Contains("ps.protection")) {
write-Host "No Mail Contact for EOP Standard organizations."
}else{
$MailContacts = Import-Clixml ".\MailContacts.xml"
$MailContactsCount = $MailContacts.Name.Count
if($MailContactsCount -gt 0){
Write-Host "Importing $MailContactsCount Dynamic Distribution Groups"
foreach ($MailContact in $MailContacts) {
$MailContactsCmdlet = "New-MailContact"
$MailContactsCmdlet += makeparam "UsePreferMessageFormat" $MailContact.UsePreferMessageFormat
$MailContactsCmdlet += makeparam "DisplayName" $MailContact.DisplayName
$MailContactsCmdlet += makeparam "ModeratedBy" $MailContact.ModeratedBy
$MailContactsCmdlet += makeparam "Name" $MailContact.Name
$MailContactsCmdlet += makeparam "MessageBodyFormat" $MailContact.MessageBodyFormat
$MailContactsCmdlet += makeparam "OrganizationalUnit" $MailContact.OrganizationalUnit
$MailContactsCmdlet += makeparam "Initials" $MailContact.Initials
$MailContactsCmdlet += makeparam "MessageFormat" $MailContact.MessageFormat
$MailContactsCmdlet += makeparam "ModerationEnabled" $MailContact.ModerationEnabled
$MailContactsCmdlet += makeparam "MacAttachmentFormat" $MailContact.MacAttachmentFormat
$MailContactsCmdlet += makeparam "SendModerationNotifications"
$MailContact.SendModerationNotifications
$MailContactsCmdlet += " -Confirm:`$False"
$MailContactsCmdlet += makeparam "ExternalEmailAddress" $MailContact.ExternalEmailAddress
$MailContactsCmdlet += makeparam "FirstName" $MailContact.FirstName
$MailContactsCmdlet += makeparam "Alias" $MailContact.Alias
Add-Content $outfile "`n$MailContactsCmdlet"
}

}else{
Write-Host "No Mail Contacts to add."
}
}
#***********************************************************************
# makeparam helper function
#************************************************************************
function makeparam ([string]$ParamName, [string[]] $ParamValue) {
$FormattedParam = ""
If($ParamValue.Count -gt 0) {
$FormattedParam = " -$ParamName "
Foreach ($value in $ParamValue) {
If($value -eq "True") {$FormattedParam = " -$ParamName" + ":`$True,"}
else{
If($value -eq "False") {$FormattedParam = " -$ParamName" + ":`$False,"}
else{$FormattedParam += "`"$value`","}
}
}
$FormattedParam = $FormattedParam.TrimEnd(",")
}
Return $FormattedParam
}
#****************************************************************************
# Variables
#****************************************************************************
$outfile = ".\UsersAndGroups.ps1"
rm -erroraction 'silentlycontinue' $outfile
#****************************************************************************
# Add mail users
#****************************************************************************
$rand = New-Object System.Random -ArgumentList (get-date).millisecond
$MailUsers = Import-Clixml ".\MailUsers.xml"
$MailUsersCount = $MailUsers.Name.Count
if($MailUsersCount -gt 0){
Write-Host "Importing $MailUsersCount Mail Users"
ForEach ($MailUser in $MailUsers) {
$MailUsersCmdlet = "New-EOPMailUser"
$MailUsersCmdlet += makeparam "LastName" $MailUser.LastName
$MailUsersCmdlet += makeparam "FirstName" $MailUser.FirstName
$MailUsersCmdlet += makeparam "DisplayName" $MailUser.DisplayName
$MailUsersCmdlet += makeparam "Name" $MailUser.Name
$MailUsersCmdlet += makeparam "Alias" $MailUser.Alias
$MailUsersCmdlet += makeparam "MicrosoftOnlineServicesID" $MailUser.MicrosoftOnlineServicesID
$MailUsersCmdlet += makeparam "ExternalEmailAddress" $MailUser.ExternalEmailAddress

# Generate a new 10 character password


$NewPassword = ""
1..10 | ForEach { $NewPassword = $NewPassword + [char]$rand.next(40,127) }

$MailUsersCmdlet += " -Password (ConvertTo-SecureString -String '$NewPassword' -AsPlainText -Force)"


Add-Content $outfile "`n$MailUsersCmdlet"
}
}
#****************************************************************************
# Add distribution groups
#****************************************************************************
$DistributionGroups = Import-Clixml ".\DistributionGroups.xml"
$DistributionGroupsCount = $DistributionGroups.Name.Count
if($DistributionGroupsCount -gt 0){
Write-Host "Importing $DistributionGroupsCount Distribution Groups"
ForEach ($DistributionGroup in $DistributionGroups) {
$DistributionGroupsCmdlet = "New-EOPDistributionGroup"
$DistributionGroupsCmdlet += makeparam "Name" $DistributionGroup.Name
$DistributionGroupsCmdlet += makeparam "Alias" $DistributionGroup.Alias
$DistributionGroupsCmdlet += makeparam "DisplayName" $DistributionGroup.DisplayName
$DistributionGroupsCmdlet += makeparam "ManagedBy" $DistributionGroup.ManagedBy

$DistributionGroupsCmdlet += makeparam "Notes" $DistributionGroup.Notes


$DistributionGroupsCmdlet += makeparam "PrimarySmtpAddress" $DistributionGroup.PrimarySmtpAddress
$DistributionGroupsCmdlet += makeparam "Type" $DistributionGroup.Type
$MembersCmdlet = "@("
$memberslist = Import-Clixml $DistributionGroup.ExternalDirectoryObjectId
ForEach ($user in $memberslist) {
$MembersCmdlet += "`"$user.Name`","
}
$MembersCmdlet = $MembersCmdlet.TrimEnd(",")
$MembersCmdlet += ")"
}
Add-Content $outfile "`n$DistributionGroupsCmdlet"
}
#****************************************************************************
# Add security groups
#****************************************************************************
$SecurityGroups = Import-Clixml ".\SecurityGroups.xml"
$SecurityGroupsCount = $SecurityGroups.Name.Count
if($SecurityGroupsCount -gt 0){
Write-Host "Importing $SecurityGroupsCount Security Groups"
ForEach ($SecurityGroup in $SecurityGroups) {
$SecurityGroupsCmdlet = "New-EOPSecurityGroup"
$SecurityGroupsCmdlet += makeparam "Name" $SecurityGroup.Name
$SecurityGroupsCmdlet += makeparam "Alias" $SecurityGroup.Alias
$SecurityGroupsCmdlet += makeparam "DisplayName" $SecurityGroup.DisplayName
$SecurityGroupsCmdlet += makeparam "ManagedBy" $SecurityGroup.ManagedBy

$SecurityGroupsCmdlet += makeparam "Notes" $SecurityGroup.Notes


$SecurityGroupsCmdlet += makeparam "PrimarySmtpAddress" $SecurityGroup.PrimarySmtpAddress
$SecurityGroupsCmdlet += makeparam "Type" $SecurityGroup.Type
$SecurityGroupsCmdlet += makeparam "Type" $SecurityGroup.Type
$MembersCmdlet = "@("
$memberslist = Import-Clixml $SecurityGroup.ExternalDirectoryObjectId
ForEach ($user in $memberslist) {
$MembersCmdlet += "`"$user.Name`","
}
$MembersCmdlet = $MembersCmdlet.TrimEnd(",")
$MembersCmdlet += ")"
}
Add-Content $outfile "`n$SecurityGroupsCmdlet"
}
#****************************************************************************
# Add Dynamic Distribution Groups
#****************************************************************************
$DynamicDistributionGroups = Import-Clixml ".\DynamicDistributionGroups.xml"
$DynamicDistributionGroupsCount = $DynamicDistributionGroups.Name.Count
if($DynamicDistributionGroupsCount -gt 0){
Write-Host "Importing $DynamicDistributionGroupsCount Dynamic Distribution Groups"
foreach ($DynamicDistributionGroup in $DynamicDistributionGroups) {
$DynamicDistributionGroupsCmdlet = "New-DynamicDistributionGroup"
$DynamicDistributionGroupsCmdlet += " -Confirm:`$False"
$DynamicDistributionGroupsCmdlet += makeparam "DisplayName" $DynamicDistributionGroup.DisplayName
$DynamicDistributionGroupsCmdlet += makeparam "ModeratedBy" $DynamicDistributionGroup.ModeratedBy
$DynamicDistributionGroupsCmdlet += makeparam "ModerationEnabled"
$DynamicDistributionGroup.ModerationEnabled
$DynamicDistributionGroupsCmdlet += makeparam "Name" $DynamicDistributionGroup.Name
$DynamicDistributionGroupsCmdlet += makeparam "PrimarySmtpAddress"
$DynamicDistributionGroup.PrimarySmtpAddress
$DynamicDistributionGroupsCmdlet += makeparam "RecipientContainer"
$DynamicDistributionGroup.RecipientContainer
$RecipientFilterParam = makeparam "RecipientFilter" $DynamicDistributionGroup.RecipientFilter
$RecipientFilterParam = " -RecipientFilter {" + $RecipientFilterParam.Substring(19)
$RecipientFilterParam = $RecipientFilterParam.Substring(0,$RecipientFilterParam.Length-1)
$RecipientFilterParam += "}"
$DynamicDistributionGroupsCmdlet += $RecipientFilterParam
$DynamicDistributionGroupsCmdlet += makeparam "SendModerationNotifications"
$DynamicDistributionGroup.SendModerationNotifications
Add-Content $outfile "`n$DynamicDistributionGroupsCmdlet"
}

}else{
Write-Host "No Dynamic Distribution Groups to add."
}
#****************************************************************************
# Add Mail Contacts
#****************************************************************************
$MailContacts = Import-Clixml ".\MailContacts.xml"
$MailContactsCount = $MailContacts.Name.Count
if($MailContactsCount -gt 0){
Write-Host "Importing $MailContactsCount Dynamic Distribution Groups"
foreach ($MailContact in $MailContacts) {
$MailContactsCmdlet = "New-MailContact"
$MailContactsCmdlet += makeparam "UsePreferMessageFormat" $MailContact.UsePreferMessageFormat
$MailContactsCmdlet += makeparam "DisplayName" $MailContact.DisplayName
$MailContactsCmdlet += makeparam "ModeratedBy" $MailContact.ModeratedBy
$MailContactsCmdlet += makeparam "Name" $MailContact.Name
$MailContactsCmdlet += makeparam "MessageBodyFormat" $MailContact.MessageBodyFormat
$MailContactsCmdlet += makeparam "OrganizationalUnit" $MailContact.OrganizationalUnit
$MailContactsCmdlet += makeparam "Initials" $MailContact.Initials
$MailContactsCmdlet += makeparam "MessageFormat" $MailContact.MessageFormat
$MailContactsCmdlet += makeparam "ModerationEnabled" $MailContact.ModerationEnabled
$MailContactsCmdlet += makeparam "MacAttachmentFormat" $MailContact.MacAttachmentFormat
$MailContactsCmdlet += makeparam "SendModerationNotifications"
$MailContact.SendModerationNotifications
$MailContactsCmdlet += " -Confirm:`$False"
$MailContactsCmdlet += makeparam "ExternalEmailAddress" $MailContact.ExternalEmailAddress
$MailContactsCmdlet += makeparam "FirstName" $MailContact.FirstName
$MailContactsCmdlet += makeparam "Alias" $MailContact.Alias
Add-Content $outfile "`n$MailContactsCmdlet"
}
}

}else{
Write-Host "No Mail Contacts to add."
}

Step 7: Add protection settings to the target organization


You can run the following script from the Export directory while logged in to your target organization to recreate
the settings exported to .xml files earlier from the source organization.
Copy and paste the script text into a text editor like Notepad, save the file as C:\EOP\Export\Import_Settings.ps1,
and run the following command:

&amp; "C:\EOP\Export\Import_Settings.ps1"

This script imports the .xml files and create a Windows PowerShell script file called Settings.ps1 that you can
review, edit, and then run to recreate your protection and mail-flow settings.

#***********************************************************************
# makeparam helper function
#****************************************************************************
function makeparam ([string]$ParamName, [string[]] $ParamValue) {
$FormattedParam = ""
If($ParamValue.Count -gt 0) {
$FormattedParam = " -$ParamName "
Foreach ($value in $ParamValue) {
If($value -eq "True") {$FormattedParam = " -$ParamName" + ":`$True,"}
else{
If($value -eq "False") {$FormattedParam = " -$ParamName" + ":`$False,"}
else{$FormattedParam += "`"$value`","}
}
}
$FormattedParam = $FormattedParam.TrimEnd(",")
}
Return $FormattedParam
}
#****************************************************************************
# Variables
#****************************************************************************
$outfile = ".\Settings.ps1"
rm -erroraction 'silentlycontinue' $outfile
#****************************************************************************
# HostedContentFilterPolicy
#****************************************************************************
$HostedContentFilterPolicys = Import-Clixml ".\HostedContentFilterPolicy.xml"
$HostedContentFilterPolicyCount = $HostedContentFilterPolicys.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $HostedContentFilterPolicyCount Inbound Connectors"
ForEach ($HostedContentFilterPolicy in $HostedContentFilterPolicys) {
$HostedContentFilterPolicyCmdlet = "New-HostedContentFilterPolicy"
if($HostedContentFilterPolicy.Name -eq "Default") {$HostedContentFilterPolicyCmdlet = "Set-
HostedContentFilterPolicy -Identity Default"}
else {
$HostedContentFilterPolicyCmdlet += makeparam "Name" $HostedContentFilterPolicy.Name
}
$HostedContentFilterPolicyCmdlet += makeparam "AddXHeaderValue"
$HostedContentFilterPolicy.AddXHeaderValue
$HostedContentFilterPolicyCmdlet += makeparam "AdminDisplayName"
$HostedContentFilterPolicy.AdminDisplayName
$HostedContentFilterPolicyCmdlet += " -Confirm:`$False"
$HostedContentFilterPolicyCmdlet += makeparam "DownloadLink" $HostedContentFilterPolicy.DownloadLink
$HostedContentFilterPolicyCmdlet += makeparam "EnableEndUserSpamNotifications"
$HostedContentFilterPolicyCmdlet += makeparam "EnableEndUserSpamNotifications"
$HostedContentFilterPolicy.EnableEndUserSpamNotifications
$HostedContentFilterPolicyCmdlet += makeparam "EnableLanguageBlockList"
$HostedContentFilterPolicy.EnableLanguageBlockList
$HostedContentFilterPolicyCmdlet += makeparam "EnableRegionBlockList"
$HostedContentFilterPolicy.EnableRegionBlockList
if($HostedContentFilterPolicy.EndUserSpamNotificationCustomFromAddress.Length -gt 0)
{
$HostedContentFilterPolicyCmdlet += makeparam "EndUserSpamNotificationCustomFromAddress"
$HostedContentFilterPolicy.EndUserSpamNotificationCustomFromAddress
}
$HostedContentFilterPolicyCmdlet += makeparam "EndUserSpamNotificationCustomFromName"
$HostedContentFilterPolicy.EndUserSpamNotificationCustomFromName
$HostedContentFilterPolicyCmdlet += makeparam "EndUserSpamNotificationCustomSubject"
$HostedContentFilterPolicy.EndUserSpamNotificationCustomSubject
$HostedContentFilterPolicyCmdlet += makeparam "EndUserSpamNotificationFrequency"
$HostedContentFilterPolicy.EndUserSpamNotificationFrequency
$HostedContentFilterPolicyCmdlet += makeparam "EndUserSpamNotificationLanguage"
$HostedContentFilterPolicy.EndUserSpamNotificationLanguage
$HostedContentFilterPolicyCmdlet += makeparam "LanguageBlockList"
$HostedContentFilterPolicy.LanguageBlockList
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamBulkMail"
$HostedContentFilterPolicy.MarkAsSpamBulkMail
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamEmbedTagsInHtml"
$HostedContentFilterPolicy.MarkAsSpamEmbedTagsInHtml
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamEmptyMessages"
$HostedContentFilterPolicy.MarkAsSpamEmptyMessages
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamFormTagsInHtml"
$HostedContentFilterPolicy.MarkAsSpamFormTagsInHtml
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamFramesInHtml"
$HostedContentFilterPolicy.MarkAsSpamFramesInHtml
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamFromAddressAuthFail"
$HostedContentFilterPolicy.MarkAsSpamFromAddressAuthFail
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamJavaScriptInHtml"
$HostedContentFilterPolicy.MarkAsSpamJavaScriptInHtml
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamNdrBackscatter"
$HostedContentFilterPolicy.MarkAsSpamNdrBackscatter
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamObjectTagsInHtml"
$HostedContentFilterPolicy.MarkAsSpamObjectTagsInHtml
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamSensitiveWordList"
$HostedContentFilterPolicy.MarkAsSpamSensitiveWordList
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamSpfRecordHardFail"
$HostedContentFilterPolicy.MarkAsSpamSpfRecordHardFail
$HostedContentFilterPolicyCmdlet += makeparam "MarkAsSpamWebBugsInHtml"
$HostedContentFilterPolicy.MarkAsSpamWebBugsInHtml
$HostedContentFilterPolicyCmdlet += makeparam "ModifySubjectValue"
$HostedContentFilterPolicy.ModifySubjectValue
$HostedContentFilterPolicyCmdlet += makeparam "Organization" $HostedContentFilterPolicy.Organization
$HostedContentFilterPolicyCmdlet += makeparam "QuarantineRetentionPeriod"
$HostedContentFilterPolicy.QuarantineRetentionPeriod
$HostedContentFilterPolicyCmdlet += makeparam "RedirectToRecipients"
$HostedContentFilterPolicy.RedirectToRecipients
$HostedContentFilterPolicyCmdlet += makeparam "RegionBlockList"
$HostedContentFilterPolicy.RegionBlockList
$HostedContentFilterPolicyCmdlet += makeparam "SpamAction" $HostedContentFilterPolicy.SpamAction
$HostedContentFilterPolicyCmdlet += makeparam "TestModeBccToRecipients"
$HostedContentFilterPolicy.TestModeBccToRecipients
Add-Content $outfile "`n$HostedContentFilterPolicyCmdlet"
}
}else{
Write-Host "No Hosted Content Policy Filters to add."
}
#****************************************************************************
# HostedContentFilterRule
#****************************************************************************
$HostedContentFilterRules = Import-Clixml ".\HostedContentFilterRule.xml"
$HostedContentFilterRuleCount = $HostedContentFilterRules.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $HostedContentFilterRuleCount Hosted Content Filter Rules"
ForEach ($HostedContentFilterRule in $HostedContentFilterRules) {
ForEach ($HostedContentFilterRule in $HostedContentFilterRules) {
$HostedContentFilterRuleCmdlet = "New-HostedContentFilterRule"
if($HostedContentFilterRule.Name -eq "Default") {$HostedContentFilterRuleCmdlet = "Set-
HostedContentFilterRule Default"}
$HostedContentFilterRuleCmdlet += makeparam "Name" $HostedContentFilterRule.Name
$HostedContentFilterRuleCmdlet += makeparam "HostedContentFilterPolicy"
$HostedContentFilterRule.HostedContentFilterPolicy
$HostedContentFilterRuleCmdlet += makeparam "Comments" $HostedContentFilterRule.Comments
$HostedContentFilterRuleCmdlet += " -Confirm:`$False"
$HostedContentFilterRuleCmdlet += makeparam "Enabled" $HostedContentFilterRule.Enabled
$HostedContentFilterRuleCmdlet += makeparam "ExceptIfRecipientDomainIs"
$HostedContentFilterRule.ExceptIfRecipientDomainIs
$HostedContentFilterRuleCmdlet += makeparam "ExceptIfSentTo" $HostedContentFilterRule.ExceptIfSentTo
$HostedContentFilterRuleCmdlet += makeparam "ExceptIfSentToMemberOf"
$HostedContentFilterRule.ExceptIfSentToMemberOf
$HostedContentFilterRuleCmdlet += makeparam "Priority" $HostedContentFilterRule.Priority
$HostedContentFilterRuleCmdlet += makeparam "RecipientDomainIs"
$HostedContentFilterRule.RecipientDomainIs
$HostedContentFilterRuleCmdlet += makeparam "SentTo" $HostedContentFilterRule.SentTo
$HostedContentFilterRuleCmdlet += makeparam "SentToMemberOf" $HostedContentFilterRule.SentToMemberOf
Add-Content $outfile "`n$HostedContentFilterRuleCmdlet"
}
}else{
Write-Host "No Hosted Content Filter Rules to add."
}
#****************************************************************************
# HostedOutboundSpamFilterPolicy
#****************************************************************************
$HostedOutboundSpamFilterPolicys = Import-Clixml ".\HostedOutboundSpamFilterPolicy.xml"
$HostedOutboundSpamFilterPolicyCount = $HostedOutboundSpamFilterPolicys.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $HostedOutboundSpamFilterPolicyCount Hosted Outbound Spam Filter Policies"
ForEach ($HostedOutboundSpamFilterPolicy in $HostedOutboundSpamFilterPolicys) {
$HostedOutboundSpamFilterPolicyCmdlet = "Set-HostedOutboundSpamFilterPolicy Default"
$HostedOutboundSpamFilterPolicyCmdlet += makeparam "AdminDisplayName"
$HostedOutboundSpamFilterPolicy.AdminDisplayName
$HostedOutboundSpamFilterPolicyCmdlet += makeparam "BccSuspiciousOutboundAdditionalRecipients"
$HostedOutboundSpamFilterPolicy.BccSuspiciousOutboundAdditionalRecipients
$HostedOutboundSpamFilterPolicyCmdlet += makeparam "BccSuspiciousOutboundMail"
$HostedOutboundSpamFilterPolicy.BccSuspiciousOutboundMail
$HostedOutboundSpamFilterPolicyCmdlet += " -Confirm:`$False"
$HostedOutboundSpamFilterPolicyCmdlet += makeparam "NotifyOutboundSpam"
$HostedOutboundSpamFilterPolicy.NotifyOutboundSpam
$NotifyOutboundSpamRecipients += makeparam "NotifyOutboundSpamRecipients"
$HostedOutboundSpamFilterPolicy.NotifyOutboundSpamRecipients
Add-Content $outfile "`n$HostedOutboundSpamFilterPolicyCmdlet"
}
}else{
Write-Host "No Hosted Outbound Spam Filter Policies to add."
}
#****************************************************************************
# HostedConnectionFilterPolicy
#****************************************************************************
$HostedConnectionFilterPolicys = Import-Clixml ".\HostedConnectionFilterPolicy.xml"
$HostedConnectionFilterPolicyCount = $HostedConnectionFilterPolicys.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $HostedConnectionFilterPolicyCount Hosted Connection Filter Policies"
ForEach ($HostedConnectionFilterPolicy in $HostedConnectionFilterPolicys) {
$HostedConnectionFilterPolicyCmdlet = "Set-HostedConnectionFilterPolicy"
$HostedConnectionFilterPolicyCmdlet += makeparam "Identity" $HostedConnectionFilterPolicy.Name
$HostedConnectionFilterPolicyCmdlet += makeparam "AdminDisplayName"
$HostedConnectionFilterPolicy.AdminDisplayName
$HostedConnectionFilterPolicyCmdlet += " -Confirm:`$False"
$HostedConnectionFilterPolicyCmdlet += makeparam "EnableSafeList"
$HostedConnectionFilterPolicy.EnableSafeList
$HostedConnectionFilterPolicyCmdlet += makeparam "IPAllowList"
$HostedConnectionFilterPolicy.IPAllowList
$HostedConnectionFilterPolicyCmdlet += makeparam "IPBlockList"
$HostedConnectionFilterPolicy.IPBlockList
Add-Content $outfile "`n$HostedConnectionFilterPolicyCmdlet"
}
}else{
Write-Host "No Hosted Connection Filter Policies to add."
}
#****************************************************************************
# MalwareFilterPolicy
#****************************************************************************
$MalwareFilterPolicys = Import-Clixml ".\MalwareFilterPolicy.xml"
$MalwareFilterPolicyCount = $MalwareFilterPolicys.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $MalwareFilterPolicyCount Malware Filter Policies"
ForEach ($MalwareFilterPolicy in $MalwareFilterPolicys) {
$MalwareFilterPolicyCmdlet = "New-MalwareFilterPolicy"
if($MalwareFilterPolicy.Name -eq "Default") {$MalwareFilterPolicyCmdlet = "Set-MalwareFilterPolicy
Default"}
else {
$MalwareFilterPolicyCmdlet += makeparam "Name" $MalwareFilterPolicy.Name
}
$MalwareFilterPolicyCmdlet += makeparam "Action" $MalwareFilterPolicy.Action
$MalwareFilterPolicyCmdlet += makeparam "DeleteAttachmentAndUseDefaultAlertText"
$MalwareFilterPolicy.DeleteAttachmentAndUseDefaultAlertText
$MalwareFilterPolicyCmdlet += makeparam "DeleteAttachmentAndUseCustomAlertText"
$MalwareFilterPolicy.DeleteAttachmentAndUseCustomAlertText
$MalwareFilterPolicyCmdlet += makeparam "AdminDisplayName" $MalwareFilterPolicy.AdminDisplayName
$MalwareFilterPolicyCmdlet += " -Confirm:`$False"
$MalwareFilterPolicyCmdlet += makeparam "CustomAlertText" $MalwareFilterPolicy.CustomAlertText
$MalwareFilterPolicyCmdlet += makeparam "CustomExternalBody" $MalwareFilterPolicy.CustomExternalBody
$MalwareFilterPolicyCmdlet += makeparam "CustomExternalSubject"
$MalwareFilterPolicy.CustomExternalSubject
if($MalwareFilterPolicy.CustomFromAddress.Length -gt 0) {
$MalwareFilterPolicyCmdlet += makeparam "CustomFromAddress" $MalwareFilterPolicy.CustomFromAddress
}
$MalwareFilterPolicyCmdlet += makeparam "CustomFromName" $MalwareFilterPolicy.CustomFromName
$MalwareFilterPolicyCmdlet += makeparam "CustomInternalBody" $MalwareFilterPolicy.CustomInternalBody
$MalwareFilterPolicyCmdlet += makeparam "CustomInternalSubject"
$MalwareFilterPolicy.CustomInternalSubject
$MalwareFilterPolicyCmdlet += makeparam "CustomNotifications" $MalwareFilterPolicy.CustomNotifications
$MalwareFilterPolicyCmdlet += makeparam "EnableExternalSenderAdminNotifications"
$MalwareFilterPolicy.EnableExternalSenderAdminNotifications
$MalwareFilterPolicyCmdlet += makeparam "EnableExternalSenderNotifications"
$MalwareFilterPolicy.EnableExternalSenderNotifications
$MalwareFilterPolicyCmdlet += makeparam "EnableInternalSenderAdminNotifications"
$MalwareFilterPolicy.EnableInternalSenderAdminNotifications
$MalwareFilterPolicyCmdlet += makeparam "EnableInternalSenderNotifications"
$MalwareFilterPolicy.EnableInternalSenderNotifications
if($MalwareFilterPolicy.ExternalSenderAdminAddress.Length -gt 0) {
$MalwareFilterPolicyCmdlet += makeparam "ExternalSenderAdminAddress"
$MalwareFilterPolicy.ExternalSenderAdminAddress
}
if($MalwareFilterPolicy.InternalSenderAdminAddress.Length -gt 0) {
$MalwareFilterPolicyCmdlet += makeparam "InternalSenderAdminAddress"
$MalwareFilterPolicy.InternalSenderAdminAddress
}
Add-Content $outfile "`n$MalwareFilterPolicyCmdlet"
}
}else{
Write-Host "No Malware Filter Policies to add."
}
#****************************************************************************
# MalwareFilterRule
#****************************************************************************
$MalwareFilterRules = Import-Clixml ".\MalwareFilterRule.xml"
$MalwareFilterRuleCount = $MalwareFilterRules.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $MalwareFilterRuleCount Malware Filter Rules"
ForEach ($MalwareFilterRule in $MalwareFilterRules) {
$MalwareFilterRuleCmdlet = "New-MalwareFilterRule"
if($MalwareFilterRule.Name -eq "Default") {$MalwareFilterRuleCmdlet = "Set-MalwareFilterPolicy
if($MalwareFilterRule.Name -eq "Default") {$MalwareFilterRuleCmdlet = "Set-MalwareFilterPolicy
Default"}
$MalwareFilterRuleCmdlet += makeparam "Name" $MalwareFilterRule.Name
$MalwareFilterRuleCmdlet += makeparam "MalwareFilterPolicy" $MalwareFilterRule.MalwareFilterPolicy
$MalwareFilterRuleCmdlet += makeparam "Comments" $MalwareFilterRule.Comments
$MalwareFilterRuleCmdlet += " -Confirm:`$False"
$MalwareFilterRuleCmdlet += makeparam "Enabled" $MalwareFilterRule.Enabled
$MalwareFilterRuleCmdlet += makeparam "ExceptIfRecipientDomainIs"
$MalwareFilterRule.ExceptIfRecipientDomainIs
$MalwareFilterRuleCmdlet += makeparam "ExceptIfSentTo" $MalwareFilterRule.ExceptIfSentTo
$MalwareFilterRuleCmdlet += makeparam "ExceptIfSentToMemberOf"
$MalwareFilterRule.ExceptIfSentToMemberOf
$MalwareFilterRuleCmdlet += makeparam "RecipientDomainIs" $MalwareFilterRule.RecipientDomainIs
$MalwareFilterRuleCmdlet += makeparam "SentTo" $MalwareFilterRule.SentTo
$MalwareFilterRuleCmdlet += makeparam "SentToMemberOf" $MalwareFilterRule.SentToMemberOf
Add-Content $outfile "`n$MalwareFilterRuleCmdlet"
}
}else{
Write-Host "No Malware Filter Rules to add."
}
#****************************************************************************
# InboundConnectors
#****************************************************************************
$InboundConnectors = Import-Clixml ".\InboundConnector.xml"
$InboundConnectorCount = $InboundConnectors.Name.Count
if($InboundConnectorCount -gt 0){
Write-Host "Importing $InboundConnectorCount Inbound Connectors"
ForEach ($InboundConnector in $InboundConnectors) {
$InboundConnectorCmdlet = "New-InboundConnector"
$InboundConnectorCmdlet += makeparam "Name" $InboundConnector.Name
$InboundConnectorCmdlet += makeparam "SenderDomains" $InboundConnector.SenderDomains

If($InboundConnector.AssociatedAcceptedDomains.Count -gt 0) {
If($InboundConnector.AssociatedAcceptedDomains[0].Contains("/")) {
# This connector was created in an EOP Standard tenant
# Strip out just the domain name
$InboundConnectorCmdlet += " -AssociatedAcceptedDomains "
ForEach ($accepteddomain in $InboundConnectors.AssociatedAcceptedDomains) {
$accepteddomain = $accepteddomain.SubString($accepteddomain.LastIndexOf("/")+1)
$InboundConnectorCmdlet += "`"$accepteddomain`","
}
$InboundConnectorCmdlet = $InboundConnectorCmdlet.TrimEnd(",")
}else{
$InboundConnectorCmdlet += makeparam "AssociatedAcceptedDomains"
$InboundConnector.AssociatedAcceptedDomains
}
}

$InboundConnectorCmdlet += makeparam "CloudServicesMailEnabled"


$InboundConnector.CloudServicesMailEnabled
$InboundConnectorCmdlet += makeparam "Comment" $InboundConnector.Comment
$InboundConnectorCmdlet += " -Confirm:`$False"
$InboundConnectorCmdlet += makeparam "ConnectorSource" $InboundConnector.ConnectorSource
$InboundConnectorCmdlet += makeparam "ConnectorType" $InboundConnector.ConnectorType
$InboundConnectorCmdlet += makeparam "Enabled" $InboundConnector.Enabled
$InboundConnectorCmdlet += makeparam "RequireTls" $InboundConnector.RequireTls
$InboundConnectorCmdlet += makeparam "RestrictDomainsToCertificate"
$InboundConnector.RestrictDomainsToCertificate
$InboundConnectorCmdlet += makeparam "RestrictDomainsToIPAddresses"
$InboundConnector.RestrictDomainsToIPAddresses
$InboundConnectorCmdlet += makeparam "SenderIPAddresses" $InboundConnector.SenderIPAddresses
$InboundConnectorCmdlet += makeparam "TlsSenderCertificateName"
$InboundConnector.TlsSenderCertificateName
Add-Content $outfile "`n$InboundConnectorCmdlet"
}
}else{
Write-Host "No Inbound Connectors to add."
}
#****************************************************************************
# OutboundConnector
# OutboundConnector
#****************************************************************************
$OutboundConnectors = Import-Clixml ".\OutboundConnector.xml"
$OutboundConnectorCount = $OutboundConnectors.Name.Count
if($OutboundConnectorCount -gt 0){
Write-Host "Importing $OutboundConnectorCount Outbound Connectors"
ForEach ($OutboundConnector in $OutboundConnectors) {
$OutboundConnectorCmdlet = "New-OutboundConnector"
$OutboundConnectorCmdlet += makeparam "Name" $OutboundConnector.Name
$OutboundConnectorCmdlet += makeparam "AllAcceptedDomains" $OutboundConnector.AllAcceptedDomains
$OutboundConnectorCmdlet += makeparam "BypassValidation" $OutboundConnector.BypassValidation
$OutboundConnectorCmdlet += makeparam "CloudServicesMailEnabled"
$OutboundConnector.CloudServicesMailEnabled
$OutboundConnectorCmdlet += makeparam "Comment" $OutboundConnector.Comment
$OutboundConnectorCmdlet += " -Confirm:`$False"
$OutboundConnectorCmdlet += makeparam "ConnectorSource" $OutboundConnector.ConnectorSource
$OutboundConnectorCmdlet += makeparam "ConnectorType" $OutboundConnector.ConnectorType
$OutboundConnectorCmdlet += makeparam "IsTransportRuleScoped" $OutboundConnector.IsTransportRuleScoped
$OutboundConnectorCmdlet += makeparam "RecipientDomains" $OutboundConnector.RecipientDomains
$OutboundConnectorCmdlet += makeparam "RouteAllMessagesViaOnPremises"
$OutboundConnector.RouteAllMessagesViaOnPremises
$OutboundConnectorCmdlet += makeparam "SmartHosts" $OutboundConnector.SmartHosts
$OutboundConnectorCmdlet += makeparam "TlsDomain" $OutboundConnector.TlsDomain
$OutboundConnectorCmdlet += makeparam "TlsSettings" $OutboundConnector.TlsSettings
$OutboundConnectorCmdlet += makeparam "UseMXRecord" $OutboundConnector.UseMXRecord
Add-Content $outfile "`n$OutboundConnectorCmdlet"
}
}else{
Write-Host "No Outbound Connectors to add."
}
#*****************************************************************************
# TransportRule
#*****************************************************************************
Add-Content $outfile "`n[Byte[]]$Data = Get-Content -Path `".TransportRules.xml`" -Encoding Byte -ReadCount 0"
Add-Content $outfile "`nImport-TransportRuleCollection -FileData $Data"
#****************************************************************************
# Domain Type
#****************************************************************************
$Domains = Import-Clixml ".\Domains.xml"
$DomainCount = $Domains.Name.Count
if($HostedContentFilterPolicyCount -gt 0){
Write-Host "Importing $DomainCount Domains"
ForEach ($Domain in $Domains) {
$DomainCmdlet = "Set-AcceptedDomain"
$DomainCmdlet += makeparam "Identity" $Domain.Name
$DomainCmdlet += makeparam "DomainType" $Domain.DomainType
Add-Content $outfile "`n$DomainCmdlet"
}
}else{
Write-Host "No Domains to add."
}

Step 8: Revert your DNS settings to stop mail queuing


If you chose to set your MX records to an invalid address to cause the senders to queue mail during your
transition, you'll need to set them back to the correct value as specified in the Office 365 admin center. For more
information about configuring DNS, see Create DNS records for Office 365.
Switch to EOP from Google Postini, the Barracuda
Spam and Virus Firewall, or Cisco IronPort
6/26/2018 • 4 minutes to read • Edit Online

The purpose of this topic is to help you understand the process for switching to Exchange Online Protection (EOP )
from an on-premises email hygiene appliance or cloud-based protection service, and then to provide you with help
resources to get started. There are many spam-filtering solutions, but the process for switching to EOP is similar in
most cases.
If you are new to EOP and you want to read an overview of its features before you decide to switch, start with the
Exchange Online Protection overview on TechNet.
Before you switch to EOP, it's important to think about whether you want to host your EOP -protected mailboxes in
the cloud, with Exchange Online, on-premises, or in a hybrid scenario. (Hybrid means that you have some
mailboxes hosted on-premises and another portion hosted with Exchange Online.) Each of these hosting scenarios:
cloud, on-premises, and hybrid, is possible, but the setup steps can vary. Here are a few considerations to help you
choose the appropriate deployment:
EOP protection with on-premises mailboxes This scenario is appropriate if you have existing mail-
hosting infrastructure you want to use, or you have business requirements to keep mailboxes on-premises,
and you want EOP's cloud-based email protection. Switch to EOP standalone describes this scenario in
more detail.
EOP protection with Exchange Online mailboxes This scenario is appropriate if you want EOP
protection and all of your mailboxes hosted in the cloud. It can help you reduce complexity, because you
don't have to maintain on-premises messaging servers. Switch to Exchange Online describes this scenario.
EOP protection with hybrid mailboxes Perhaps you want cloud mailboxes, but you need to keep
mailboxes for some users on-premises. Choose this scenario if you want some mailboxes hosted on-
premises and another portion hosted with Exchange Online. Switch to a hybrid solution describes this
scenario.

Switch to EOP standalone


If you currently host your mailboxes on premises and use an on-premises protection appliance or a cloud
messaging-protection service, you can switch to EOP to take advantage of its protection features and availability.
To set up EOP in a standalone scenario, which means you host your mailboxes on premises and use EOP to
provide email protection, you can follow the steps outlined in Set up your EOP service. The topic outlines the steps
for setting up EOP protection, which include sign up, adding your domain, and setting up mail flow with
connectors.

Switch to Exchange Online


Perhaps you have on-premises mailboxes protected by an on-premises appliance, and you want to jump to
Exchange Online cloud-hosted mailboxes and EOP protection to take advantage of Office 365 cloud messaging
and protection features. To get started, you can sign up for Office 365 and add your domain. This scenario doesn't
require you to setup connectors, because there isn't any routing to on-premises mailboxes. Begin at the Office 365
sign up page. (Get started with Office 365 provides resources to get familiar with its features.)
During the Office 365 setup process, you will create your cloud-based mailbox users.
Switch to a hybrid solution
You may want to move only a portion of your mailboxes to the cloud because of business requirements or
regulatory considerations. When you deploy a hybrid scenario, you can move mailboxes to the cloud as your
business requirements dictate. Migrating to a hybrid scenario with EOP protection is more complicated than
moving to an all-cloud scenario, but Microsoft provides full hybrid support and ample resources to make the move
to hybrid easier.
The best place to start, if you are considering a hybrid deployment, is Exchange Server 2013 Hybrid Deployments.
Additionally, there are a few different ways you can route mail in a hybrid scenario that are important to
understand. Transport Routing in Exchange 2013 Hybrid Deployments explains each type, so you can choose the
best routing scenario, based on your business requirements.

Migration planning
When you decide to switch to EOP, make sure you give special consideration to the following areas:
Custom Filtering Rules If you have custom filtering or business-policy rules to catch specific spam, we
recommend that you try EOP with the default settings for a period, before you migrate your rules. EOP
offers enterprise-level spam protection with the default settings, it may turn out that you don't need to
migrate some of your rules to EOP. Of course, if you have rules in place that enforce specific custom
business policies, you can create those. Transport Rules provides detailed instructions for creating transport
rules in EOP.
IP allow lists and IP block lists If you have per-user allow lists and block lists, allow some time to copy
the lists to EOP as part of your setup process. For more information about IP allow lists and IP block lists,
see Configure the connection filter policy.
Secure Communication If you have a partner that requires encrypted messaging, we recommend that you
set this up in the Exchange admin center. To configure this scenario, see Create connectors for a secure mail
channel using transport layer security (TLS ).

TIP
When you switch from an on-premises appliance to EOP, it is possible to leave your appliance or a server in place that
performs business rule checks. For instance, if your appliance performs custom filtering on outbound mail, and you want it to
continue doing so, you can configure EOP to send mail directly to the appliance for additional filtering, before it is routed to
the Internet. Exchange Online Protection Connectors - Outbound Smart Host Scenario shows you how to set up mail flow in
this case.
Videos for getting started with protecting your email
8/21/2018 • 2 minutes to read • Edit Online

The following series of introductory videos will help you use Exchange Online Protection (EOP ) to protect your
mailboxes. These videos are applicable for EOP standalone customers who are protecting on-premises mailboxes
such as Exchange Server 2013, and for Exchange Online customers whose cloud-hosted mailboxes by default are
protected by EOP.
The following three videos are about tailoring your anti-spam settings to fit the needs of your organization. For
inbound mail traveling through the service to your organization, this includes creating safe sender and blocked
sender lists based on IP addresses, and configuring content filter settings. There's also a video showing how
admins can find and release content-filtered spam messages or messages that matched a transport rule that were
sent to the quarantine, and also how to report spam messages to help us improve the service.
Configure IP Allow and IP Block Lists in EOP

For more details, see the Configure the connection filter policy topic.
Configure Spam Content Filtering in EOP

For more details, see the Configure your spam filter policies topic.
Find and Release Messages From the Quarantine

For more details, see the Find and release quarantined messages as an administrator topic.
You'll also want to configure the outbound spam policy because you'll want to monitor if spam is being sent from
your organization. Check out the outbound spam video to learn how.
Configure the Outbound Spam Policy

For more details, see the Configure the outbound spam policy
There are also settings for how to handle malware that's detected by the service, which the anti-malware filtering
video describes.
Configure the Anti-Malware Policy

For more details, see the Configure anti-malware policies topic.


To filter and route messages based on specific conditions you set, based on company policy or regulations, you'll
want to watch the video about how to create transport rules.
Configure Exchange Transport Rules in EOP

For more details, see the Mail flow rules (transport rules) in Exchange Online Protection topic if you use EOP
standalone, or see the Transport rules topic if you use Exchange Online.
Videos for getting started with protecting your email
8/21/2018 • 2 minutes to read • Edit Online

The following series of introductory videos will help you use Exchange Online Protection (EOP ) to protect your
mailboxes. These videos are applicable for EOP standalone customers who are protecting on-premises mailboxes
such as Exchange Server 2013, and for Exchange Online customers whose cloud-hosted mailboxes by default are
protected by EOP.
The following three videos are about tailoring your anti-spam settings to fit the needs of your organization. For
inbound mail traveling through the service to your organization, this includes creating safe sender and blocked
sender lists based on IP addresses, and configuring content filter settings. There's also a video showing how
admins can find and release content-filtered spam messages or messages that matched a transport rule that were
sent to the quarantine, and also how to report spam messages to help us improve the service.
Configure IP Allow and IP Block Lists in EOP

For more details, see the Configure the connection filter policy topic.
Configure Spam Content Filtering in EOP

For more details, see the Configure your spam filter policies topic.
Find and Release Messages From the Quarantine

For more details, see the Find and release quarantined messages as an administrator topic.
You'll also want to configure the outbound spam policy because you'll want to monitor if spam is being sent from
your organization. Check out the outbound spam video to learn how.
Configure the Outbound Spam Policy

For more details, see the Configure the outbound spam policy
There are also settings for how to handle malware that's detected by the service, which the anti-malware filtering
video describes.
Configure the Anti-Malware Policy

For more details, see the Configure anti-malware policies topic.


To filter and route messages based on specific conditions you set, based on company policy or regulations, you'll
want to watch the video about how to create transport rules.
Configure Exchange Transport Rules in EOP

For more details, see the Mail flow rules (transport rules) in Exchange Online Protection topic if you use
EOP standalone, or see the Transport rules topic if you use Exchange Online.
How to help ensure that a message isn't marked as
spam
8/21/2018 • 2 minutes to read • Edit Online

As an Exchange Online or Exchange Online Protection (EOP ) administrator, you can help ensure that an email
message traveling through the service isn't marked as spam. See the updated version of the tips and procedures to
accomplish this in Prevent false positive email marked as spam with a safelist or other techniques.

See also
Safe sender and blocked sender lists in Exchange Online
Office 365 Email Anti-Spam Protection
Ensure that spam is routed to each user's Junk Email
folder
8/21/2018 • 2 minutes to read • Edit Online

IMPORTANT
This topic only applies to Exchange Online Protection (EOP) customers who host mailboxes on-premises in a hybrid
deployment. Exchange Online customers whose mailboxes are fully-hosted in Office 365 do not need to run these
commands.

The default anti-spam action for EOP customers is to move spam messages to the recipients' Junk Email folder. In
order for this action to work with on-premises mailboxes, you must configure Exchange Transport rules on your
on-premises Edge or Hub servers to detect spam headers added by EOP. These Transport rules set the spam
confidence level (SCL ) used by the SclJunkThreshold property of the Set-OrganizationConfig cmdlet to move
spam into the Junk Email folder of each mailbox.
To add transport rules to ensure spam is moved to the Junk Email folder by using Windows PowerShell
1. Access the Exchange Management Shell for your on-premises Exchange server. To learn how to open the
Exchange Management Shell in your on-premises Exchange organization, see Open the Shell.
2. Run the following command to route content-filtered spam messages to the Junk Email folder:

New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" -


HeaderContainsWords "SFV:SPM" -SetSCL 6

Where _NameForRule_ is the name for the new rule, for example, JunkContentFilteredMail.

3. Run the following command to route messages marked as spam prior to reaching the content filter to the Junk
Email folder:

New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" -


HeaderContainsWords "SFV:SKS" -SetSCL 6

Where _NameForRule_ is the name for the new rule, for example, JunkMailBeforeReachingContentFilter.

4. Run the following command to ensure that messages from senders in a block list in the spam filter policy, such
as the Sender block list, are routed to the Junk Email folder:

New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" -


HeaderContainsWords "SFV:SKB" -SetSCL 6

Where _NameForRule_ is the name for the new rule, for example, JunkMailInSenderBlockList.

If you do not want to use the Move message to Junk Email folder action, you can choose another action in
your content filter policies in the Exchange admin center. For more information, see Configure your spam filter
policies. For more information about these fields in the message header, see Anti-spam message headers.

See also
New -TransportRule cmdlet
Report junk email messages to Microsoft
8/21/2018 • 2 minutes to read • Edit Online

The Microsoft Junk Email Reporting Add-in for Microsoft Office Outlook offers several ways for you to report junk
email messages:
From the Outlook ribbon
From your Inbox
From within an opened email message
The Junk Email Reporting Add-in helps you submit reports to the Microsoft Exchange Online Protection (EOP )
service. If your mailbox is not protected by the service, your junk email report submission will not affect your spam
filters. Administrators can learn about more spam settings that apply to a whole organization at How to help
ensure that a message isn't marked as spam or Block email spam with the Office 365 spam filter to prevent false
negative issues. These are helpful if you have administrator-level control and you want to prevent false positives or
false negatives.

TIP
You can also submit spam messages directly to Microsoft by using the junk@office365.microsoft.com email address, and false
positive (non-spam) messages by using the [not_junk@office365.microsoft.com](mailto: not_junk@office365.microsoft.com)
email address. For more information, see Submit spam, non-spam, and phishing scam messages to Microsoft for analysis.

To report junk email messages from Outlook


Use the Report Message add-in
To report junk email messages from your Inbox
1. Right-click the message or messages that you want to report as junk.

2. Select Junk and then click Report Junk.


3. The Microsoft Junk E -mail Reporting Add-in dialog box opens. If you're sure that you want to submit

the messages you selected as junk, click Yes.

NOTE
If you don't want to receive this confirmation message when submitting junk messages, check Do not show this
message again.

The selected messages will be sent to Microsoft for analysis and moved to the Junk Email folder. To confirm that
the messages have been submitted, open your Sent Items folder to view the submitted messages.
To report a junk email message from within an opened message
1. From within an opened message, click the Report Junk button on the message ribbon. For example, click

Junk > Report Junk


2. The Microsoft Junk E -mail Reporting Add-in dialog box opens. If you're sure that you want to submit

the message you selected as junk, click Yes.

NOTE
If you don't want to receive this confirmation message when submitting junk messages, check Do not show this
message again.
The selected message will be sent to Microsoft for analysis and moved to the Junk Email folder. To confirm that the
message has been submitted, open your Sent Items folder to view the submitted message.

For more information


Enable the Report Message add-in
Troubleshooting and support information
How to help ensure that a message isn't marked as spam
Block email spam with the Office 365 spam filter to prevent false negative issues
Manage safe sender lists for bulk mailers
8/21/2018 • 2 minutes to read • Edit Online

If you want to use safe sender lists, you should know that Exchange Online Protection (EOP ) and Outlook handle
processing differently. The service respects safe senders and domains by inspecting the RFC 5321.MailFrom
address and the RFC 5322.From address, while Outlook adds the RFC 5322.From address to a user's safe sender
list. (Note: The service inspects both the 5321.MailFrom address and 5322.From address for blocked senders and
domains.)
The SMTP MAIL FROM address, otherwise known as the RFC 5321.MailFrom address, is the email address that's
used to perform SPF checks, and if the mail can't be delivered, the path to which the bounced message is delivered.
It's this email address that is placed into the Return-Path in the message headers by default, though it's possible for
the sender to designate a different Return-Path address.
The From: address in the message headers, otherwise known as the RFC 5322.From address, is the email address
that is displayed in the mail client such as Outlook.
Much of the time, the 5321.MailFrom and 5322.From addresses are the same. This is typical for person-to-person
communication. However, when email is sent on behalf of someone else, the addresses are frequently different.
This usually happens most often for bulk email messages.
For example, suppose that the airline Blue Yonder Airlines has contracted out Margie's Travel to send out its email
advertising. You then get a message in your inbox from sender blueyonder@news.blueyonderairlines.com. In this
case, the 5321.MailFrom address is blueyonder.airlines@margiestravel.com, and
blueyonder@news.blueyonderairlines.com is the 5322.From address which is the one you see in Outlook. Because
the service respects the RFC 5322.From address, to prevent this message from getting filtered, you can simply add
the RFC 5322.From address as a safe sender in Outlook.
Configure anti-malware policies
9/23/2018 • 8 minutes to read • Edit Online

Malware filtering is automatically enabled company-wide via the default anti-malware policy. As an
administrator, you can view and edit, but not delete, the default anti-malware policy so that it is tailored to best
meet the needs of your organization. For greater granularity, you can also create custom malware filter policies
and apply them to specified users, groups, or domains in your organization. Custom policies always take
precedence over the default policy, but you can change the priority (running order) of your custom policies.
The following video shows some of the configuration steps detailed in this topic for the anti-malware policies:

What do you need to know before you begin?


You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the Anti-malware entry in the Feature Permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

Use the EAC to configure anti-malware policies


1. In the Exchange admin center (EAC ), navigate to Protection > Malware filter.
2. Do one of the following:
Double-click the default policy in order to edit this company-wide policy.
Click the New icon in order to create a new policy that can be applied to users, groups, and domains in
your organization. You can also edit existing custom policies by double-clicking them.
3. For custom policies only, specify a name for this policy. You can optionally specify a more detailed
description as well. You cannot rename the default policy.

NOTE
When creating a new policy, all configuration settings appear on a single screen, whereas when editing a policy you
must navigate through different screens. The settings are the same in either case, but the rest of this procedure
describes how to access these settings when editing a policy.

4. Click the Settings menu option. In the Malware Detection Response section, use the option buttons to
select the action to take when malware is detected in a message:
Delete the entire message Prevents the entire message, including attachments, from being delivered to
the intended recipients. This is the default value.
Delete all attachments and use default alert text Deletes all message attachments, not just the
infected one, and inserts the following default alert text into a text file that replaces the attachments:
Malware was detected in one or more attachments included with this email. All attachments
have been deleted.
Delete all attachments and use custom alert text Deletes all message attachments, not just the
infected one, and inserts a custom message into a text file that replaces the attachments. Selecting this
option enables the Custom alert text field where you must type a custom message.

IMPORTANT
If malware is detected in the message body, the entire message, including all attachments, will be deleted regardless
of which option you select. This action is applied to both inbound and outbound messages.

5. In the Common attachment types filter filter section, choose which file types you want to have the
Malware Detection Response option selected above applied on. New policies have the most commonly
used malicious file types selected to be detected as malware by default. The filter supports both true file
types when available and file extensions.
6. There are several types of files that typically deliver malware through email and this on and off setting
will prevent the selected files from being delivered to your inboxes as well as sent by your users.
7. The list of files the malware filter detects can be customized per policy by choosing and adding the
additional file types to the list..
8. In the Notifications section, you have the option to send a notification email message to senders or
administrators when a message is detected as malware and is not delivered. These notifications are only
sent when the entire message is deleted.
9. In the Sender Notifications section, select the check boxes to Notify internal senders (those within
your organization) or to Notify external senders (those outside your organization) when a detected
message is not delivered.
10. Similarly, in the Administrator Notifications section, select the check boxes to Notify administrator
about undelivered messages from internal senders or to Notify administrator about undelivered
messages from external senders. Specify the email address or addresses of the administrator in their
respective Administrator email address fields after selecting one or both of these check boxes.

The default notification text is "This message was created automatically by mail delivery software. Your
email message was not delivered to the intended recipients because malware was detected." The language
in which the default notification text is sent is dependent on the locale of the message being processed.
11. In the Customize Notifications section, you can create customized notification text to be used in place of
the default notification text for sender and administrator notifications. Select the Use customized
notification text check box, and then specify values in the following required fields:
From name The name you want to be used as the sender of the customized notification.
From address The email address you want to be used as the sender of the customized notification.
Messages from internal senders The Subject and Message of the notification if the detected message
originated from an internal sender.
Messages from external senders The Subject and Message of the notification if the detected message
originated from an external sender.

The default Subject text is "Undeliverable message."


4. For custom policies only, click the Apply to menu item and then create a condition-based rule to specify the
users, groups, and/or domains for whom to apply this policy. You can create multiple conditions provided that
they are unique.
To select users, select The recipient is. In the subsequent dialog box, select one or more senders from
your company from the user picker list and then click add. To add senders who aren't on the list, type their
email addresses and click Check names. In this box, you can also use wildcards for multiple email
addresses (for example: *@ domainname). When you are done with your selections, click ok to return to
the main screen.
To select groups, select The recipient is a member of and then, in the subsequent dialog box, select or
specify the groups. Click ok to return to the main screen.
To select domains, select The recipient domain is and then, in the subsequent dialog box, add the
domains. Click ok to return to the main screen.
You can create exceptions within the rule, for example you can filter messages from all domains except for
a certain domain. Click add exception and then create your exception conditions similar to the way you
created the other conditions.
5. Click Save. A summary of your default policy settings appears in the right pane.

TIP
You can select or clear the check boxes in the ENABLED column to enable or disable your custom policies. All policies are
enabled by default, and the default policy cannot be disabled. > To delete a custom policy, select the policy, click the
Delete icon, and then confirm that you want to delete the policy. The default policy cannot be deleted. > Custom policies
always take precedence over the default policy. Custom policies run in the reverse order that you created them (from
oldest to newest), but you can change the priority (running order) of your custom policies by clicking the up arrow and
down arrow. The policy with a PRIORITY of 0 will run first, followed by 1, then 2, and so on.

Use remote PowerShell to configure anti-malware policies


You can also configure and apply malware filter policies in PowerShell. To learn how to use Windows PowerShell
to connect to Exchange Online, see Connect to Exchange Online PowerShell. To learn how to use Windows
PowerShell to connect to Exchange Online Protection, see Connect to Exchange Online Protection PowerShell.
Get-MalwareFilterPolicy View your malware filter settings.
Set-MalwareFilterPolicy Edit your malware filter settings.
New -MalwareFilterPolicy Create a new custom malware filter policy.
Remove-MalwareFilterPolicy Delete a custom malware filter policy.
To apply a custom malware filter policy to users, groups, and/or domains, use the New -MalwareFilterRule
cmdlet (to create a new filter rule that can be applied to custom policies) or the Set-MalwareFilterRule cmdlet (to
edit an existing filter rule that can be applied to custom policies). Use the Enable-MalwareFilterRule cmdlet or the
Disable-MalwareFilterRule cmdlet to enable or disable the rule applied to the policy.

How do you know this worked?


The following procedure provides instructions for using the EICAR.TXT antivirus test file to verify that malware
filtering is working correctly. Use an email client that does not block the file.

IMPORTANT
The EICAR.TXT file is not a virus. However, because users often have the need to test that installations function correctly,
the antivirus industry, through the European Institute for Computer Antivirus Research, has adopted the EICAR standard in
order to meet this need.
Use the EICAR.TXT file to verify malware filtering functionality
1. Create a new text file, and then name the file EICAR.TXT.
2. Copy the following line into the text file:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Make sure that this is the only string in the file. When done, you will have a 68-byte file.
If you are using a desktop antivirus program, make sure that the folder you are saving the file to is excluded from
scanning. 3. Attach this file to an email message that will be filtered by the service.
Check the recipient mailbox of the test message. Depending on the malware detection response you have
configured, the entire message will be deleted, or the attachment will be deleted and replaced with the alert text file.
Any configured notifications will also be distributed.
The recipient may receive a notification message (if configured) that appears similar to the following: "This message
was created automatically by mail delivery software. Your email message was not delivered to the intended
recipients because malware was detected. The following additional information will also be included: the subject of
the message, the sender of the message, the time the message was received by the service, the Message ID (the
Internet message ID (also known as the Client ID ) found in the header of the message with the "Message-ID: token),
and the detection found (which will be eicar.txt). 4. Delete the EICAR.TXT file after testing is completed so that other
users are not unnecessarily alarmed. ## For more information
Anti-malware protection
Anti-malware protection FAQ
Configure the anti-spam policies
8/21/2018 • 2 minutes to read • Edit Online

Spam filtering is automatically enabled company-wide through the default anti-spam policies (connection filter,
spam filter, and outbound spam). As an administrator, you can view and edit, but not delete, the default anti-spam
policies so that they are tailored to best meet the needs of your organization. For greater granularity, you can also
create custom policies and apply them to specified users, groups, or domains in your organization. By default,
custom policies take precedence over the default policy, but you can change the priority of your policies.
For more about configuring your anti-spam policies, see the following topics:
Configure the connection filter policy
Configure your spam filter policies

IMPORTANT
For EOP standalone customers: By default, the EOP content filters send spam-detected messages to each recipients' Junk
Email folder. However, in order to ensure that the Move message to Junk Email folder action will work with on-premises
mailboxes, you must configure two Exchange Transport rules on your on-premises servers to detect spam headers added by
EOP. For details, see Ensure that spam is routed to each user's Junk Email folder.

Configure the outbound spam policy


Create organization-wide safe sender or blocked
sender lists in Office 365
8/21/2018 • 7 minutes to read • Edit Online

If you want to be sure that you receive mail from a particular sender, because you trust them and their messages,
you can adjust your allow list in a spam filter policy in the Exchange admin center (EAC ) at Protection > Spam
filter. Learn more about this at Configure your spam filter policies. Another option would be create an Exchange
transport rule that works like the domain or user-based allow list in the spam filter. You can block messages sent
from a particular domain or user in a similar manner too.
A transport rule would be useful in this situation if you need to filter for complex criteria such as checking message
headers or the names of attachments or if you want to add complex actions such as adding a disclaimer to the
message or applying a time period where the rule is active. However, the preferred method to make sure emails
from a specific sender or domain bypass your spam filter is to add them to your spam filter policy. Get started with
this in the EAC by going to Protection > Spam filter. Learn more at Configure your spam filter policies.

TIP
A domain-based list in a transport rule isn't as secure as an IP address-based list, because domains can be spoofed. Also, if
the sending IP address is on a Block list, it will still be blocked even if filtering for the domain or user is being bypassed. This is
because a transport rule on a domain or user does not override the global IP Block list. We recommend using an IP address-
based list in most cases. To create an IP address-based list, you can use the IP Allow list or IP Block list in the connection filter.
Any messages sent from these IP addresses aren't checked by the content filter. For instructions on how to configure the
connection filter policy by adding IP addresses to the IP Allow list or IP Block list, see Configure the connection filter policy.

For additional management tasks related to transport rules, see Transport Rules.

Use the EAC to customize a block or allow list to prevent or receive


email from a domain or user
1. In the EAC, go to Protection > Spam filter.
2. On the general page, do one of the following:
Double-click the default policy or an existing policy in order to start editing it.
Click New in order to create a new custom spam-filter policy that can be applied to users, groups, and
domains in your organization.
3. On the Allow Lists page, you can specify entries, such as senders or domains, that will always be delivered to
the inbox. Email from these entries is not processed by the spam filter. Do the following:
Add trusted senders to the Sender allow list. Click Add, and then in the selection dialog box, add the sender
addresses you wish to allow. You can separate multiple entries using a semi-colon or a new line. Click ok to
return to the Allow Lists page.
Add trusted domains to the Domain allow list. Click Add, and then in the selection dialog box, add the
domains you wish to allow. You can separate multiple entries using a semi-colon or a new line. Click ok to
return to the Allow Lists page.
Cau t i on
If you allow top-level domains, it's likely that email you don't want will be delivered to an inbox.
4. On the Block Lists page, you can specify entries, such as senders or domains, that will always be marked as
spam. The service will apply the configured high confidence spam action on email that matches these entries.
Add unwanted senders to the Sender block list. Click Add , and then in the selection dialog box, add the
sender addresses you want to block. You can separate multiple entries using a semi-colon or a new line.
Click Ok to return to the Block Lists page.
Add unwanted domains to the Domain block list. Click Add , and then in the selection dialog box, add the
domains you want to block. You can separate multiple entries using a semi-colon or a new line. Click Ok to
return to the Block Lists page.
Cau t i on

If you block top-level domains, it's likely that email you want will be marked as spam.

What do you need to know before you begin creating a transport rule?
You don't need to create a transport rule to bypass spam filtering or mark email as spam for a sender or
domain. Use the Exchange Online Protection block and allow lists in a spam policy instead of this transport
rule if you simply want to block or allow a specific sender or domain and not attach any extra conditions.
Learn more about this at Configure your spam filter policies.
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Transport rules" entry in the Messaging policy and compliance permissions
topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server, Exchange Online, or Exchange
Online Protection.

Use the EAC to create a transport rule to bypass spam filtering for a
domain or user
1. In the EAC, navigate to Mail flow > Rules. Choose Add and then choose Bypass spam filtering.
2. Give the rule a name. Under Apply this rule if, choose The sender and then select one of the following
conditions:
If you want to specify a domain, choose domain is. In the Specify domain dialog box, enter the domain of
the sender you want to designate as safe, such as contoso.com. Add to move it to the list of phrases.
Repeat this step if you want to add additional domains, and click OK when you are finished.
If you want to specify a user, choose is this person. In the Select members dialog box, add the user from
the list or type the user and click Check names. Repeat this step if you want to add additional users, and
click OK when you are finished.
3. Select the Stop processing more rules check box to ensure that no other rule can reverse the bypass
action
4. For the Match sender address in message option, select Header or envelope.
5. If you'd like, you can make selections to audit the rule, test the rule, activate the rule during a specific time
period, and other selections. We recommend testing the rule for a period of time before enforcing it in your
organization. For more information about these selections, see Manage Transport Rules.
6. Choose Save to save the rule.
After you create and enforce the rule, spam filtering is bypassed for the domain or user you specified.

Use the EAC to create a transport rule that blocks messages sent from
a domain or user
1. In the EAC, navigate to Mail flow > Rules. Choose Add and then choose Create a new rule.
2. Give the rule a name and then click More options.
3. Under Apply this rule if, choose The sender and then select one of the following conditions:
If you want to specify a domain, choose domain is. In the Specify domain dialog box, enter the sender
domain from which you want to block messages, such as contoso.com. Click Add to move it to the list of
phrases. Repeat this step if you want to add additional domains, and click OK when you are finished.
If you want to specify a user, choose is this person. In the Select members dialog box, add the user from
the list or type the user and click Check names. Repeat this step if you want to add additional users, and
click OK when you are finished.
4. Under Do the following, choose Block the message and then click one of the other options such as
Delete the message without notifying anyone.
5. Click More options, and then for the Match sender address in message option, select Header or
envelope.
6. If you'd like, you can make selections to audit the rule, test the rule, activate the rule during a specific time
period, and other selections. We recommend testing the rule for a period of time before enforcing it in your
organization. For more information about these selections, see Manage Transport Rules.
7. Choose Save to save the rule.
After you create and enforce the rule, any messages sent from the domain or user you specify will be blocked.

See also
Configure your spam filter policies
Use transport rules to configure bulk email filtering
Configure your spam filter policies
12/5/2018 • 12 minutes to read • Edit Online

Basic spam filter settings include selecting the action to take on messages that are identified as spam, and
choosing whether to filter messages that are written in specific languages or sent from specific countries or
regions. Spam filter policy settings are applied to inbound messages only. You can edit the default spam filter
policy to configure your company-wide spam filter settings and create custom spam filter policies, and then
apply them to specific users, groups, or domains in your organization. Custom policies always take
precedence over the default policy. You can change the order in which your custom policies run by changing
the priority of each custom policy.

IMPORTANT
For Exchange Online Protection (EOP) stand-alone customers: By default, the EOP spam filters send spam-detected
messages to each recipient's Junk Email folder. However, in order to ensure that the Move message to Junk Email
folder action works for on-premises mailboxes, you must configure Exchange Transport rules on your on-premises
servers to detect spam headers that are added by EOP. For details, see Ensure that spam is routed to each user's Junk
Email folder.

What you must know before you begin


Estimated time to complete: 30 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the Anti-spam entry in the Feature Permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

Use the Exchange Admin Center (EAC) to configure spam filter


policies
1. In the Exchange admin center (EAC ), navigate to Protection > Spam filter.
2. Do one of the following on the general page:
Double-click the default policy in order to edit this company-wide policy.
Click the New icon in order to create a new custom spam-filter policy that can be applied to
users, groups, and domains in your organization. You can also edit existing custom policies by
double-clicking them.
3. For custom policies only, specify a name for this policy. Optionally, you can also specify a more
detailed description. You cannot rename the default policy.

NOTE: When you create a policy, all configuration settings appear on a single screen. By contrast,
when you edit a policy, you must navigate through multiple screens. The settings are the same in
either case, but the rest of this procedure describes how to access these settings when you edit a
policy.
4. On the spam and bulk email actions page, under Spam and High confidence spam, select the
action to take for incoming spam and bulk email. By default, Move messages to Junk Email folder
is selected. The other possible values are:
Delete message Deletes the entire message, including all attachments.
Quarantine message Sends the message to quarantine instead of to the intended recipients. If
you select this option, in the Retain spam for (days) input box, specify the number of days
during which the spam message will be quarantined. (It will automatically be deleted after the
time elapses. The default value is 15 days which is the maximum value. The minimum value is 1
day.)

TIP: For information about how administrators can manage email messages that reside in the
quarantine in the EAC, see Quarantine and Find and release quarantined messages as an
administrator. > For information about how to configure spam notification messages to be sent
to users, see Configure end-user spam notifications in EOP or Configure end-user spam
notifications in Exchange Online.
Move message to Junk Email folder Sends the message to the Junk Email folder of the
specified recipients. This is the default action for both confidence threshold levels.

IMPORTANT: For Exchange Online Protection (EOP ) customers: In order for this action
to work with on-premises mailboxes, you must configure two Exchange Transport rules
on your on-premises servers to detect spam headers added by EOP. For details, see
Ensure that spam is routed to each user's Junk Email folder.
Add X-header Sends the message to the specified recipients, but adds X-header text to the
message header in order to identify the message as spam. Using this text as an identifier, you
can optionally create inbox rules or use a downstream device to act on the message. The default
X-header text is This message appears to be spam.
You can customize the X-header text by using the Add this X-header text input box. If you
customize the X-header text, be aware of the following conditions:
If you specify only the header in the format < header >, where there are no spaces within the <
header >, a colon will be appended to the custom text, followed by the default text. For example,
if you specify "This-is-my-custom-header," the X-header text will appear as "This-is-my-custom-
header: This message appears to be spam."
If you include spaces within the custom header text, or if you add the colon yourself (such as "X
This is my custom header" or "X-This-is-my-custom-header:"), the X-header text reverts to the
default as "X-This-Is-Spam: This message appears to be spam."
You can't specify the header text in the format < header >:< value >. If you do this, both values
before and after the colon will be ignored, and the default X-header text appears instead: "X-
This-Is-Spam: This message appears to be spam."
Prepend subject line with text Sends the message to the intended recipients but prepends
the subject line with the text that you specify in the Prefix subject line with this text input
box. Using this text as an identifier, you can optionally create rules to filter or route the
messages as necessary.
Redirect message to email address Sends the message to a designated email address
instead of to the intended recipients. Specify the "redirect" address in the Redirect to this
email address input box.

NOTE: For more information about spam confidence levels, see Spam confidence levels.
5. Under Bulk email, you can select a threshold to treat bulk email as spam. This threshold is based on
the bulk complaint level of the message. You can choose a threshold setting from 1 to 9, where 1
indicates most bulk email as spam, and 9 allows the most bulk email to be delivered. The service then
performs the configured action, such as sending the message to the recipient's Junk Email folder. See
Bulk Complaint Level values and What's the difference between junk email and bulk email? for more
details.
6. On the Block Lists page, you can specify entries, such as senders or domains, that will always be
marked as spam. The service will apply the configured high confidence spam action on email that
matches these entries.
Add unwanted senders to the Sender block list. Click Add , and then in the selection dialog
box, add the sender addresses you want to block. You can separate multiple entries using a
semi-colon or a new line. Click Ok to return to the Block Lists page.
Add unwanted domains to the Domain block list. Click Add , and then in the selection dialog
box, add the domains you want to block. You can separate multiple entries using a semi-colon
or a new line. Click Ok to return to the Block Lists page.

CAUTION: If you block top-level domains, it's likely that email you want will be
marked as spam.
7. On the Allow Lists page, you can specify entries, such as senders or domains, that will always be
delivered to the inbox. Email from these entries is not processed by the spam filter.
Add trusted senders to the Sender allow list. Click Add , and then in the selection dialog box,
add the sender addresses you wish to allow. You can separate multiple entries using a semi-
colon or a new line. Click ok to return to the Allow Lists page.
Add trusted domains to the Domain allow list. Click Add , and then in the selection dialog box,
add the domains you wish to allow. You can separate multiple entries using a semi-colon or a
new line. Click ok to return to the Allow Lists page.

CAUTION: If you allow top-level domains, it's likely that email you don't want will be
delivered to an inbox.
8. On the International Spam page you can filter email messages that are written in specific languages
or sent from specific countries or regions. You can configure up to 86 different languages and 250
different regions. The service will apply the configured action for high-confidence spam.
9. Select the Filter email messages written in the following languages check box to enable this
functionality. Click , and then, in the selection dialog box, make your choices (multi-selection is
supported). For example, if you select to filter messages written in Arabic (AR ), and Quarantine
message is your configured action for high confidence spam messages, any messages written in
Arabic will be quarantined. Click ok to return to the International Spam pane.
10. Select the Filter email messages sent from the following countries or regions check box to
enable this functionality. Click , and then, in the selection dialog box, make your choices (multi-
selection is supported). For example, if you select to filter all messages that are sent from Australia
(AU ), and Quarantine message is your configured action for high-confidence spam messages, then
any messages that is sent from Australia will be quarantined. Click ok to return to the International
Spam pane.

By default, if no international spam options are selected, the service performs normal spam filtering on
messages sent in all languages and from all regions. Messages are analyzed and the configured
actions are applied if the message is determined to be spam or high confidence spam.
11. On the Advanced Options page, you can select On, Off, or Test for each advanced spam filtering
option.
12. On Messages are actively filtered according to the rule that is associated with that option. Messages
are either marked as spam or will have their spam scores increased, depending on which options you
turn on.
13. Off No action is taken on messages that meet the spam filter criteria. All options are turned off by
default.
14. Test No action is taken on messages that meet the spam filter criteria. However, messages can be
tagged by adding an X-header before they are delivered to the intended recipient. This X-header lets
you know which ASF option was matched. If you specified Test for any of the advanced options, you
can configure the following test mode settings to be applied when a match is made to a test-enabled
option:
None Take no test mode action on the message. This is the default.
Add the default test X-header text Selecting this option sends the message to the specified
recipients, but also adds a special X-header to the message to identify it as having matched a
specific advanced spam filtering option.
Send a Bcc message to this address Selecting this option sends a blind carbon copy of the
message to the email address that you specify in the input box.

For more information about the advanced spam filtering options, including descriptions about
each option and the X-header text that is associated with each one, see Advanced spam filtering
options.
15. For custom policies only, click the Apply to menu item, and then create a condition-based rule to
specify the users, groups, and domains to which to apply this policy. You can create multiple
conditions, if they are unique.
To select users, select The recipient is. In the subsequent dialog box, select one or more
senders from your company from the user picker list, and then click add. To add senders who
aren't on the list, type their email addresses, and then click Check names. In this box, you can
also use wildcards for multiple email addresses (for example: *@ domainname). When you are
done making your selections, click ok to return to the main screen.
To select groups, select The recipient is a member of. Then, in the subsequent dialog box,
select or specify the groups. Click ok to return to the main screen.
To select domains, select The recipient domain is. Then, in the subsequent dialog box, add the
domains. Click ok to return to the main screen.

You can create exceptions within the rule. For example, you can filter messages from all
domains except for a certain domain. Click add exception, and then create your exception
conditions similar to the way that you created the other conditions.

Applying a spam policy to a group is supported only for Mail Enabled Security Groups.
16. Click save. A summary of your policy settings appears in the right pane.
TIP
You can select or clear the check boxes in the ENABLED column to enable or disable your custom policies. By default,
all policies are enabled. The default policy cannot be disabled. > To delete a custom policy, select the policy, click the
Delete icon, and then confirm that you want to delete the policy. The default policy cannot be deleted. > Custom
policies always take precedence over the default policy. Custom policies run in the reverse order in which you created
them (from oldest to newest), but you can change the priority (running order) of your custom policies by clicking the
up arrow and down arrow. The policy that has a PRIORITY of 0 will run first, followed by 1, then 2, and so on.

Use remote PowerShell to configure spam filter policies


You can also configure and apply spam filter policies in PowerShell. To learn how to use Windows PowerShell
to connect to Exchange Online, see Connect to Exchange Online PowerShell. To learn how to use Windows
PowerShell to connect to Exchange Online Protection, see Connect to Exchange Online Protection
PowerShell.
Get-HostedContentFilterPolicy View your spam filter settings.
Set-HostedContentFilterPolicy Edit your spam filter settings.
New -HostedContentFilterPolicy Create a new custom spam filter policy.
Remove-HostedContentFilterPolicy Delete a custom spam filter policy.
To apply a custom spam filter policy to users, groups, and/or domains, use the New -HostedContentFilterRule
cmdlet (to create a new filter rule that can be applied to custom policies) or the Set-HostedContentFilterRule
cmdlet (to edit an existing filter rule that can be applied to custom policies). Use the Enable-
HostedContentFilterRule cmdlet or the Disable-HostedContentFilterRule cmdlet to enable or disable the rule
applied to the policy.

How do you know this worked?


To ensure that spam is being properly detected and acted upon, you can send a GTUBE message through the
service. Similar to the EICAR antivirus test file, GTUBE provides a test by which you can verify that the
service is detecting incoming spam. A GTUBE message should always be detected as spam by the spam filter,
and the actions that are performed upon the message should match your configured settings.
Include the following GTUBE text in a mail message on a single line, without any spaces or line breaks:

XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X

Fine tuning your spam filter policy to prevent false positives and
false negatives
You can enable advanced spam filtering options if you want to pursue an aggressive approach to spam
filtering. For general spam settings that apply to the whole organization, take a look at Prevent false positive
email marked as spam with a safelist or other techniques or Block email spam with the Office 365 spam filter
to prevent false negative issues. These are helpful if you have administrator-level control and you want to
prevent false positives or false negatives.

For more information


Configure the connection filter policy
Configure the outbound spam policy
Quarantine
Prevent false positive email marked as spam with a safelist or other techniques
Block email spam with the Office 365 spam filter to prevent false negative issues
Configure the connection filter policy
10/25/2018 • 7 minutes to read • Edit Online

Most of us have friends and business partners we trust. It can be frustrating to find email from them in your junk
email folder, or even blocked entirely by a spam filter. If you want to make sure that email sent from people you
trust isn't blocked, you can use the connection filter policy to create an Allow list, also known as a safe sender list,
of IP addresses that you trust. You can also create a blocked senders list, which is a list of IP addresses, typically
from known spammers, that you don't ever want to receive email messages from.
For more spam settings that apply to the whole organization, take a look at How to help ensure that a message
isn't marked as spam or Block email spam with the Office 365 spam filter to prevent false negative issues. These
are helpful if you have administrator-level control and you want to prevent false positives or false negatives.
The following video shows the configuration steps for the connection filter policy:

What do you need to know before you begin?


Estimated time to complete: 15 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Anti-spam" entry in the Feature Permissions in Exchange Online topic.
To obtain the IP address of the sender whose messages you want to allow or block, you can check the
Internet header of the message. Look for the CIP header as described in Anti-spam message headers. For
information about how to view a message header in various email clients, see Message Header Analyzer.
Email messages sent from an IP address on the IP Block list are rejected, not marked as spam, and no
additional filtering occurs.
The following connection filter procedure can also be performed via remote PowerShell. Use the Get-
HostedConnectionFilterPolicy cmdlet to review your settings, and the Set-HostedConnectionFilterPolicy
to edit your connection filter policy settings. To learn how to use Windows PowerShell to connect to
Exchange Online Protection, see Connect to Exchange Online Protection PowerShell. To learn how to use
Windows PowerShell to connect to Exchange Online, see Connect to Exchange Online PowerShell.

Use the EAC to edit the default connection filter policy


You create an IP Allow list or IP Block list by editing the connection filter policy in the Exchange admin center
(EAC ). The connection filter policy settings are applied to inbound messages only.
1. In the Exchange admin center (EAC ), navigate to Protection > Connection filter, and then double-click
the default policy.
2. Click the Connection filtering menu item and then create the lists you want: an IP Allow list, an IP Block
list, or both.
To create these lists, click . In the subsequent dialog box, specify the IP address or address range, and
then click ok. Repeat this process to add additional addresses. (You can also edit or remove IP addresses
after they have been added.)
NOTE
If you add an IP address to both lists, email sent from that IP address is allowed.

Specify IPV4 IP addresses in the format nnn.nnn.nnn.nnn where nnn is a number from 0 to 255. You can
also specify Classless Inter-Domain Routing (CIDR ) ranges in the format nnn.nnn.nnn.nnn/rr where rr is a
number from 24 to 32. To specify ranges outside of the 24 to 32 range, see Additional considerations
when configuring IP Allow lists.
You can specify a maximum of 1273 entries, where an entry is either a single IP address or a CIDR range
of IP addresses from /24 to /32. > If you're sending TLS -encrypted messages, IPv6 addresses and
address ranges are not supported.
3. Optionally, select the Enable safe list check box to prevent missing email from certain well-known
senders. How? Microsoft subscribes to third-party sources of trusted senders. Using this safe list means
that these trusted senders aren't mistakenly marked as spam. We recommend selecting this option
because it should reduce the number of false positives (good mail that's classified as spam) that you
receive.
4. Click save. A summary of your default policy settings appears in the right pane.

Additional considerations when configuring IP Allow lists


The following are additional considerations you may want to consider or that you should be aware of when
configuring an IP Allow list.
Specifying a CIDR range that falls outside of the recommended range
To specify a CIDR IP address range from /1 to /23, you must create a mail flow rule that operates on the IP
address range that sets the spam confidence level (SCL ) to Bypass spam filtering (meaning that all messages
received from within this IP address range are set to "not spam") and no additional filtering is performed by the
service). However, if any of these IP addresses appear on any of Microsoft's proprietary block lists or on any of
our third-party block lists, these messages will still be blocked. It is therefore strongly recommended that you
use the /24 to /32 IP address range.
To create this mail flow rule, perform the following steps.
1. In the EAC, navigate to Mail flow > Rules.
2. Click and then select Create a new rule.
3. Give the rule a name and then click More options.
4. Under Apply this rule if, select The sender and then choose IP address is in any of these ranges or
exactly matches.
5. In the specify IP addresses, specify the IP address range, click Add , and then click ok.
6. Under Do the following box, set the action by choosing Modify the message properties and then set
the spam confidence level (SCL ). In the specify SCL box, select Bypass spam filtering, and click ok.
7. If you'd like, you can make selections to audit the rule, test the rule, activate the rule during a specific time
period, and other selections. We recommend testing the rule for a period before you enforce it.
Procedures for mail flow rules in Exchange Server contains more information about these selections.
8. Click save to save the rule. The rule appears in your list of rules.
After you create and enforce the rule, the service bypasses spam filtering for the IP address range you specified.
Scoping an IP Allow list exception for a specific domain
In general, we recommend that you add the IP addresses (or IP address ranges) for all your domains that you
consider safe to the IP Allow list. However, if you don't want your IP Allow List entry to apply to all your
domains, you can create a Transport rule that excepts specific domains.
For example, let's say you have three domains: ContosoA.com, ContosoB.com, and ContosoC.com, and you want
to add the IP address (for simplicity's sake, let's use 1.2.3.4) and skip filtering only for domain ContosoB.com.
You would create an IP Allow list for 1.2.3.4, which sets the spam confidence level (SCL ) to -1 (meaning it is
classified as non-spam) for all domains. You can then create a Transport rule that sets the SCL for all domains
except ContosoB.com to 0. This results in the message being rescanned for all domains associated with the IP
address except for ContosoB.com which is the domain listed as the exception in the rule. ContosoB.com still has
an SCL of -1 which means skip filtering, whereas ContosoA.com and ContosoC.com have SCLs of 0, meaning
they will be rescanned by the content filter.
To do this, perform the following steps:
1. In the EAC, navigate to Mail flow > Rules.
2. Click and then select Create a new rule.
3. Give the rule a name and then click More options.
4. Under Apply this rule if, select The sender and then choose IP address is in any of these ranges or
exactly matches.
5. In the specify IP addresses box, specify the IP address or IP address range you entered in the IP Allow
list, click Add , and then click ok.
6. Under Do the following, set the action by choosing Modify the message properties and then set the
spam confidence level (SCL ). In the specify SCL box, select 0, and click ok.
7. Click add exception, and under Except if, select The sender and choose domain is.
8. In the specify domain box, enter the domain for which you want to bypass spam filtering, such as
contosob.com. Click Add to move it to the list of phrases. Repeat this step if you want to add
additional domains as exceptions, and click ok when you are finished.
9. If you'd like, you can make selections to audit the rule, test the rule, activate the rule during a specific time
period, and other selections. We recommend testing the rule for a period before you enforce it.
Procedures for mail flow rules in Exchange Server contains more information about these selections.
10. Click save to save the rule. The rule appears in your list of rules.
After you create and enforce the rule, spam filtering for the IP address or IP address range you specified is
bypassed only for the domain exception you entered.

New to Office 365?

New to Office 365? Discover free video courses for Office 365 admins and IT pros, brought to you by LinkedIn
Learning.

For more information


Safe sender and blocked sender lists in Exchange Online
Configure your spam filter policies
Configure the outbound spam policy
How to help ensure that a message isn't marked as spam
Block email spam with the Office 365 spam filter to prevent false negative issues
Configure the outbound spam policy
8/21/2018 • 2 minutes to read • Edit Online

Outbound spam filtering is always enabled if you use the service for sending outbound email, thereby protecting
organizations using the service and their intended recipients. Similar to inbound filtering, outbound spam
filtering is comprised of connection filtering and content filtering, however the outbound filter settings are not
configurable. If an outbound message is determined to be spam, it is routed through the higher risk delivery
pool, which reduces the probability of the normal outbound-IP pool being added to a block list. If a customer
continues to send outbound spam through the service, they will be blocked from sending messages. Although
outbound spam filtering cannot be disabled or changed, you can configure several company-wide outbound
spam settings via the default outbound spam policy.
The following video shows how to configure the outbound spam policy:

What do you need to know before you begin?


Estimated time to complete: 5 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Anti-spam entry in the Feature Permissions in Exchange Online topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.
The following procedure can also be performed via remote PowerShell. Use the Get-
HostedOutboundSpamFilterPolicy cmdlet to review your settings, and the Set-
HostedOutboundSpamFilterPolicy to edit your outbound spam policy settings. To learn how to use Windows
PowerShell to connect to Exchange Online Protection, see Connect to Exchange Online Protection PowerShell.
To learn how to use Windows PowerShell to connect to Exchange Online, see Connect to Exchange Online
PowerShell.

Use the EAC to edit the default outbound spam policy


Use the following procedure to edit the default outbound spam policy:
To configure the default outbound spam policy
1. In the Exchange admin center (EAC ), navigate to Protection > Outbound spam, and then double-click
the default policy.
2. Select the Outbound spam preferences menu option.
3. Select the following check boxes pertaining to outbound messages, and then specify an associated email
address or addresses in the accompanying input box (these can be distribution lists if they resolve as valid
SMTP destinations):
4. Send a copy of all suspicious outbound email messages to the following email address or
addresses. These are messages that are marked as spam by the filter (regardless of the SCL rating). They
are not rejected by the filter but are routed through the higher risk delivery pool. Separate multiple
addresses with a semicolon. Note that the recipients specified will receive the messages as a Blind carbon
copy (Bcc) address (the From and To fields are the original sender and recipient).
5. Send a notification to the following email address when a sender is blocked sending outbound
spam. Separate multiple addresses with a semicolon.
When a significant amount of spam is originating from a particular user, the user is disabled from sending
email messages. The administrator for the domain, who is specified using this setting, will be informed
that outbound messages are blocked for this user. To see what this notification looks like, see Sample
notification when a sender is blocked sending outbound spam. For information about getting re-enabled,
see Removing a user, domain, or IP address from a block list after sending spam email.
6. Click save. A summary of your default policy settings appears in the right pane.

For more information


High-risk delivery pool for outbound messages
Anti-spam protection FAQ
Removing a user, domain, or IP address from a block
list after sending spam email
11/1/2018 • 2 minutes to read • Edit Online

If a user continuously sends email messages from Office 365 that is classified as spam, they will be blocked from
sending any more messages. The user will be listed in the service as a bad outbound sender and will receive a
Non-Delivery Report (NDR ) that states:
Your message couldn't be delivered because you weren't recognized as a valid sender. The most common
reason for this is that your email address is suspected of sending spam and it's no longer allowed to send
messages outside of your organization. Contact your email admin for assistance. Remote Server returned '550
5.1.8 Access denied, bad outbound sender'
You can configure your outbound spam policy settings so that you get a notification when an Office 365 user is
blocked from sending email. After the problem with the user's mailbox is resolved, you can remove the block on
that sender.

Unblock a blocked Office 365 email account


You complete this task in the Office 365 Security & Compliance Center (SCC ). Go to the Office 365 Security &
Compliance Center for more details about SCC.
1. Using a work or school account that has Office 365 global administrator privileges, sign into the Office 365
Security and Compliance Center and in the list on the left, expand Threat Management, choose Review,
and then choose Restricted Users.

TIP
To go directly to the Restricted Users page (formerly known as the Action Center) in the Security & Compliance
Center, use this URL: > https://protection.office.com/?hash=/restrictedusers

2. This page will contain the list of users that have been blocked from sending mail to outside of your
organization. Find the user you wish to remove restrictions on and then click on Unblock.
3. Click Yes to confirm the change.

NOTE
There's a limit to the number of times that an account can be unblocked by the tenant admin. If the limit for a user has been
exceeded, an error message appears. You will then need to contact Support to unblock the user.
It may take up to 1 hour before the user is unblocked.

Third-party block lists


Exchange Online Protection also uses third-party block lists to help make decisions in spam filtering. Users,
websites, domains, and IP addresses can be added to block lists just for appearing in a spam message. As the
Office 365 admin, you should try to get these objects removed from the third-party list providers if they belong to
you.
NOTE
If someone outside Office 365 cannot send messages to your Office 365 account, their account may be on the external
blocked senders list. Users outside Office 365 can try to remove themselves by using the self-service delisting portal.

For more information


Responding to a compromised email account
Configure the outbound spam policy
High-risk delivery pool for outbound messages
Spam confidence levels
8/21/2018 • 2 minutes to read • Edit Online

When an email message goes through spam filtering it is assigned a spam score. That score is mapped to an
individual Spam Confidence Level (SCL ) rating and stamped in an X-header. The service takes actions upon the
messages depending upon the spam confidence interpretation of the SCL rating. The following table shows how
the different SCL ratings are interpreted by the filters and the default action that is taken on inbound messages for
each rating.

SCL RATING SPAM CONFIDENCE INTERPRETATION DEFAULT ACTION

-1 Non-spam coming from a safe sender, Deliver the message to the recipients'
safe recipient, or safe listed IP address inbox.
(trusted partner)

0, 1 Non-spam because the message was Deliver the message to the recipients'
scanned and determined to be clean inbox.

5, 6 Spam Deliver the message to the recipients'


Junk Email folder.

7, 8, 9 High confidence spam Deliver the message to the recipients'


Junk Email folder.

TIP
SCL ratings of 2, 3, 4, 7, and 8 are not set by the service. An SCL rating of 5 or 6 is considered suspected spam, which is less
certain to be spam than an SCL rating of 9, which is considered certain spam. Different actions for spam and high
confidence spam can be configured via your content filter policies in the Exchange admin center. For more information, see
Configure your spam filter policies. You can also set the SCL rating for messages that match specific conditions by using
Transport rules, as described in Use mail flow rules to set the spam confidence level (SCL) in messages. If you use a transport
rule to set SCL of 7, 8, or 9 the message will be treated as high confidence spam.

New to Office 365? Discover free video courses for Office 365 admins and IT pros, brought to you by LinkedIn Learning.
Use mail flow rules to set the spam confidence level
(SCL) in messages
9/23/2018 • 3 minutes to read • Edit Online

You can create a transport rule that sets the spam confidence level (SCL ) of an email message. The SCL is a
measure of how likely a message is to be spam. Spam is unsolicited (and typically unwanted) email messages. The
service takes different action on a message depending on its SCL rating. For example, you might want to bypass
spam content filtering for messages that are sent from people inside your organization because you trust that a
message sent internally from a colleague isn't spam. Using transport rules to set the SCL value of a message gives
you increased control in handling spam.
What do you need to know before you begin?
Estimated time to complete this procedure: 10 minutes.
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Transport rules" entry in Feature Permissions in Exchange Online or Feature
permissions in EOP.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.
To create a transport rule that sets the SCL of a message
1. In the Exchange admin center (EAC ), choose Mail flow > Rules.
2. Choose New , and then select Create a new rule.
3. Specify a name for the rule.
4. Choose More options, and then under Apply this rule if, specify a condition that will trigger the action
you'll be setting for this rule (which is to set the SCL value).
For example, you can set The sender > is internal/external, and then in the select sender location
dialog box, select Inside the organization, and choose ok.

5. Under Do the following, select Modify the message properties > set the spam confidence level
(SCL ).
6. In the specify SCL dialog box, select one of the following values, and choose ok:
Bypass spam filtering - This sets the SCL to -1, which means that content filtering won't be performed.
0-4 - When you set the SCL to one of these values, the message will be passed along to the content filter
for additional processing.
5, 6 - When you set the SCL to one of these values, the action specified for Spam in the applicable content
filter policies will be applied. By default, the action is to send the message to the recipient's Junk Email
folder.
7-9 - When you set the SCL to one of these values, the action specified for High confidence spam in the
applicable content filter policies will be applied. By default, the action is to send the message to the
recipient's Junk Email folder.
For more information about configuring your content filter policies, see Configure your spam filter policies.
For more information about SCL values in the service, see Spam confidence levels.
7. Specify additional properties for the rule, and choose save.

TIP
For more information about the additional properties you can select or specify for this rule, see Use the EAC to
create a transport rule.

How do you know this worked?


To verify that this procedure is working correctly, send an email message to someone inside your organization, and
verify that the action performed on the message is as expected. For example, if you set the spam confidence
level (SCL ) to Bypass spam filtering, then the message should be sent to the specified recipient's inbox.
However, if you set the spam confidence level (SCL ) to 9, and the High confidence spam action for your
applicable content filter policies is to move the message to the Junk Email folder, then the message should be sent
to the specified recipient's Junk Email folder.
Submit spam, non-spam, and phishing scam
messages to Microsoft for analysis
8/21/2018 • 5 minutes to read • Edit Online

It can be frustrating when users in your organization receive junk messages (spam) or phishing scam messages in
their Inbox, or if they don't receive a legitimate email message because it's marked as junk. We're constantly fine-
tuning our spam filters to be more accurate. You and your users can help this process by submitting false negative
and false positive spam messages to Microsoft for analysis. A "false negative" is a spam message that should have
been but was not identified as spam. A "false positive" is a legitimate email message that was incorrectly identified
as spam.

NOTE
Because of the high volume of submissions that we receive, we may not be able to answer all requests for analysis.

Submit junk or phishing messages that passed through the spam filters
If you receive a message that passed through the spam filters that and should be classified as junk or a phishing
scam, you can submit the "false negative" message to the Microsoft Spam Analysis and Microsoft Phishing
Analysis teams, as appropriate. The analysts will review the message and add it to the service-wide filters if it
meets the classification criteria.
For more spam settings that apply to the whole organization, see Block email spam with the Office 365 spam
filter to prevent false negative issues. This article contains tips to help prevent false negatives.
You can submit junk email messages in the following ways:
For Outlook and Outlook on the web users, use the Report Message Add-in for Microsoft Outlook. For
information about how to install and use this tool, see Enable the Report Message add-in.
You can also use email to submit messages to Microsoft that should be classified as junk or phishing
scams, as described in the following procedure.
Use email to submit junk (spam) or phishing scam messages to Microsoft
To submit a junk or phishing scam message to Microsoft:
1. Create a blank email message.
2. Address the message to the Microsoft team that reviews messages, as follows:
For junk messages: junk@office365.microsoft.com
For phishing scam messages: phish@office365.microsoft.com
3. Copy and paste the junk or phishing scam message into the new message as an attachment.

NOTE
You can attach multiple messages to the new message. Make sure that all the messages are the same type — either
phishing scam messages or junk email messages. > Leave the body of the new message empty.
4. Click Send.

Submit messages that were tagged as junk but should have been
allowed through
If a message was incorrectly identified as junk, you can submit the "false positive" message to the Microsoft Spam
Analysis Team. The analysts will evaluate and analyze the message. Depending on the results of the analysis, the
service-wide spam content filter rules may be adjusted to allow the message through.
Administrators can review more spam setting information that applies to a whole organization. See How to help
ensure that a message isn't marked as spam. This information is helpful if you have administrator-level control
and you want to prevent false positives.
You can submit non-spam messages in the following ways:
If you use the Move message to Junk Email folder action when you configure your content filters (this
is the default action), users can release false positive messages in their Outlook or OWA Junk Email folder.
Outlook users can release false positive messages by using the Not Junk right-click menu option.
However, they must submit the message to Microsoft through email, as shown in the procedure in
this article.
OWA users can release false positive messages and submit them to Microsoft for analysis using the
Mark as not junk action. For more information about how to do this, see Report junk email and
phishing scams in Outlook on the web .
If you use the Quarantine message action instead of the Move message to Junk Email folder action
when you configure your content filters:
Administrators can release spam-quarantined messages and report them as false positives from the
Exchange Admin Center. For more information, see Find and release quarantined messages as an
administrator.
Users can release their own spam-quarantined messages and report them as false positives through
the following channels:
The Exchange admin center (EAC ) user interface. For more information, see Find and Release
Quarantined Messages (End Users).
End-user spam notification messages (if they're enabled by your administrator).
You can also use email to submit messages to Microsoft that should not be classified as spam. When you
do this, make sure that you use the steps in the following procedure.
Use email to submit false positive messages
Use the same procedure as described in the "Use email to submit junk (spam) or phishing scam messages to
Microsoft ," but send the message to not_junk@office365.microsoft.com.

Spam evaluation and rules deployment


The spam analysis team examines messages that you submit, and adjusts the spam filters to prevent future junk
mail. As a result, Office 365 spam filters areconstantly refined. Any submitted items are evaluated at the network-
wide level. False positive submissions are examined and assessed for possible rule adjustment to allow future
messages through the spam filters. Therefore, notifying the service of false positives and also false negatives
(unfiltered spam) is advantageous for you and all customers who use the global network. The spam team
examines indicators within each submitted message, such as the following:
From address
Sending IP address
Keywords
Phrases
Frequency of transmission
Other trends and patterns
After they review this information, the spam team might make changes to the service's spam filtering layers. For
more information about the spam team, you can watch the following English-only video:
Microsoft Exchange Spam team video
Spam evaluation is an ongoing process that applies regardless of the originating language or character set.
Because a spam message can be vague or even lack text in the subject or message body, the spam team relies on
other message characteristics to perform filtering. This means that after the spam team flags a given message as
spam and makes the necessary changes to its rule base, that message will be blocked in the future until its
characteristics have been modified enough to avoid our filters. New spam rules are deployed continuously. Time
frames for rules on individual submissions vary depending on the quantity and quality of submissions. Because
new spam rules are set globally for all customers, not all individual spam submissions will result in a new spam
rule.

For more information


Anti-spam and anti-malware protection
How to help ensure that a message isn't marked as spam
Block email spam with the Office 365 spam filter to prevent false negative issues
Submitting malware and non-malware to Microsoft
for analysis
8/21/2018 • 2 minutes to read • Edit Online

When customers receive an email with a suspected virus, they often ask "What do I do now?"
This topic helps answer that question and guides you through our recommended process. It's intended for
customers using Office 365 or Exchange Online Protection (EOP ) with on-premises mail servers.
It's important to understand the difference between an infected and uninfected email. Any email that has an
attachment containing a script or malicious executable is considered a virus. This doesn't include subscription-
based messages with links to malicious sites. Those messages would be considered spam and not viruses, and a
different approach is used for spam messages. For more information about combating spam using the service, see
Anti-Spam Protection and its associated sub-topics, including Submit spam, non-spam, and phishing scam
messages to Microsoft for analysis.
By using the service, you're automatically provided with anti-malware protection. To further combat potential
threats, you should avoid opening messages that look suspicious and never open an attachment from someone
you don't know. Also avoid opening messages that urge you to open or click.

Submitting malware to Microsoft for analysis


If you suspect that your device has been infected by a virus that made it past our filters, you should submit the
email virus sample immediately to the Windows Defender Security Intelligence (WSDI) website for further
analysis. To receive analysis updates, sign into the WDSI website, or enter a valid email address. We recommend
that you use your Microsoft work or school account email address.
After you've uploaded the file or files, note the Submission ID that's created for your sample submission (for
example, 7c6c214b-17d4-4703-860b-7f1e9da03f7f).

After we receive the sample, we'll investigate and if it's determined that the sample contains malware, we'll take
corrective action to prevent the virus from going undetected.
If you continue receiving infected messages or attachments, then you should copy the message headers from the
email virus, and contact Microsoft Customer Service and Support for further assistance. Be sure to have your
Submission ID ready as well.

Submitting non-malware to Microsoft for analysis


You can also submit a file that you believe was incorrectly detected as malware to the WDSI website (just select
No for the question, Do you believe this file contains malware?).
After we receive the sample, we'll investigate and if it's determined that the sample is clean, we'll take corrective
action to prevent the file from being detected as malware.
Use the delist portal to remove yourself from the
Office 365 blocked senders list
8/21/2018 • 2 minutes to read • Edit Online

Are you getting an error message when you try to send an email to a recipient whose email address is in Office
365? If you think you should not be receiving the error message, you can use the delist portal to remove yourself
from the Office 365 blocked senders list.

What is the Office 365 blocked senders list?


Microsoft uses the blocked senders list to protect its customers from spam, spoofing, and phishing attacks. Your
mail server's IP address, that is, the address your mail server uses to identify itself on the Internet, was tagged as a
potential threat to Office 365 for one of a variety of reasons. When Office 365 adds the IP address to the list, it
prevents all further communication between the IP address and any of our customers through our datacenters.
You will know you have been added to the list when you receive a response to a mail message that includes an
error that looks something like this:
550 5.7.606-649 Access denied, banned sending IP [IP address]; To request removal from this list please visit
https://sender.office.com/ and follow the directions. For more information please see Email non-delivery reports in
Office 365.
where IP address is the IP address of the computer on which the mail server runs.
To use the Office 365 delist portal to remove yourself from the blocked senders list
1. In a web browser, go to https://sender.office.com.
2. Follow the instructions on the page. Ensure that you use the email address to which the error message was
sent, and the IP address that is specified in the error message. You can only enter one email address and
one IP address per visit.
3. Click Submit.
The portal sends an email to the email address that you supply. The email will look something like the

following:
4. Click the confirmation link in the email sent to you by the delisting portal.
This brings you back to the delist portal.
5. In the delist portal, click Delist IP.
After the IP address is removed from the blocked senders list, email messages from that IP address will be
delivered to recipients who use Office 365. So, make sure you're confident that email sent from that IP
address won't be abusive or malicious; otherwise, the IP address might be blocked again.
How Office 365 uses Sender Policy Framework (SPF)
to prevent spoofing
8/21/2018 • 12 minutes to read • Edit Online

Summary: This article describes how Office 365 uses the Sender Policy Framework (SPF ) TXT record in DNS to
ensure that destination email systems trust messages sent from your custom domain. This applies to outbound
mail sent from Office 365. Messages sent from Office 365 to a recipient within Office 365 will always pass SPF.
An SPF TXT record is a DNS record that helps prevent spoofing and phishing by verifying the domain name from
which email messages are sent. SPF validates the origin of email messages by verifying the IP address of the
sender against the alleged owner of the sending domain.

NOTE
SPF record types were deprecated by the Internet Engineering Task Force (IETF) in 2014. Instead, ensure that you use TXT
records in DNS to publish your SPF information. The rest of this article uses the term SPF TXT record for clarity.

Domain administrators publish SPF information in TXT records in DNS. The SPF information identifies authorized
outbound email servers. Destination email systems verify that messages originate from authorized outbound
email servers. If you are already familiar with SPF, or you have a simple deployment, and just need to know what
to include in your SPF TXT record in DNS for Office 365, you can go to Set up SPF in Office 365 to help prevent
spoofing. If you do not have a deployment that is fully-hosted in Office 365, or you want more information about
how SPF works or how to troubleshoot SPF for Office 365, keep reading.

NOTE
Previously, you had to add a different SPF TXT record to your custom domain if you also used SharePoint Online. This is no
longer required. This change should reduce the risk of SharePoint Online notification messages ending up in the Junk Email
folder. You do not need to make any changes immediately, but if you receive the "too many lookups" error, modify your SPF
TXT record as described in Set up SPF in Office 365 to help prevent spoofing.

How SPF works to prevent spoofing and phishing in Office 365


SPF determines whether or not a sender is permitted to send on behalf of a domain. If the sender is not permitted
to do so, that is, if the email fails the SPF check on the receiving server, the spam policy configured on that server
determines what to do with the message.
Each SPF TXT record contains three parts: the declaration that it is an SPF TXT record, the IP addresses that are
allowed to send mail from your domain and the external domains that can send on your domain's behalf, and an
enforcement rule. You need all three in a valid SPF TXT record. This article describes how you form your SPF TXT
record and provides best practices for working with the services in Office 365. Links to instructions on working
with your domain registrar to publish your record to DNS are also provided.
SPF basics: IP addresses allowed to send from your custom domain
Take a look at the basic syntax for an SPF rule:
v=spf1 <IP> <enforcement rule>
For example, let's say the following SPF rule exists for contoso.com:
v=spf1 <IP address #1> <IP address #2> <IP address #3> <enforcement rule>
In this example, the SPF rule instructs the receiving email server to only accept mail from these IP addresses for
the domain contoso.com:
IP address #1
IP address #2
IP address #3
This SPF rule tells the receiving email server that if a message comes from contoso.com, but not from one of these
three IP addresses, the receiving server should apply the enforcement rule to the message. The enforcement rule is
usually one of these options:
Hard fail. Mark the message with 'hard fail' in the message envelope and then follow the receiving server's
configured spam policy for this type of message.
Soft fail. Mark the message with 'soft fail' in the message envelope. Typically, email servers are configured
to deliver these messages anyway. Most end users do not see this mark.
Neutral. Do nothing, that is, do not mark the message envelope. This is usually reserved for testing
purposes and is rarely used.
The following examples show how SPF works in different situations. In these examples, contoso.com is the sender
and woodgrovebank.com is the receiver.
Example 1: Email authentication of a message sent directly from sender to receiver
SPF works best when the path from sender to receiver is direct, for example:

When woodgrovebank.com receives the message, if IP address #1 is in the SPF TXT record for contoso.com, the
message passes the SPF check and is authenticated.
Example 2: Spoofed sender address fails the SPF check
Suppose a phisher finds a way to spoof contoso.com:
Since IP address #12 is not in contoso.com's SPF TXT record, the message fails the SPF check and the receiver
may choose to mark it as spam.
Example 3: SPF and forwarded messages
One drawback of SPF is that it doesn't work when an email has been forwarded. For example, suppose the user at
woodgrovebank.com has set up a forwarding rule to send all email to an outlook.com account:

The message originally passes the SPF check at woodgrovebank.com but it fails the SPF check at outlook.com
because IP #25 is not in contoso.com's SPF TXT record. Outlook.com might then mark the message as spam. To
work around this problem, use SPF in conjunction with other email authentication methods such as DKIM and
DMARC.
SPF basics: Including third-party domains that can send mail on behalf of your domain
In addition to IP addresses, you can also configure your SPF TXT record to include domains as senders. These are
added to the SPF TXT record as "include" statements. For example, contoso.com might want to include all of the IP
addresses of the mail servers from contoso.net and contoso.org which it also owns. To do this, contoso.com
publishes an SPF TXT record that looks like this:

IN TXT "v=spf1 include:contoso.net include:contoso.org -all"

When the receiving server sees this record in DNS, it also performs a DNS lookup on the SPF TXT record for
contoso.net and then for contoso.org. If it finds an additional include statement within the records for contoso.net
or contoso.org, it will follow those too. In order to help prevent denial of service attacks, the maximum number of
DNS lookups for a single email message is 10. Each include statement represents an additional DNS lookup. If a
message exceeds the 10 limit, the message fails SPF. Once a message reaches this limit, depending on the way the
receiving server is configured, the sender may receive a message that states that the message generated "too
many lookups" or that the "maximum hop count for the message has been exceeded". For tips on how to avoid
this, see Troubleshooting: Best practices for SPF in Office 365.

Requirements for your SPF TXT record and Office 365


If you set up mail when you set up Office 365, you already created an SPF TXT record that identifies the Microsoft
messaging servers as a legitimate source of mail for your domain. This record probably looks like this:

v=spf1 include:spf.protection.outlook.com -all

If you're a fully-hosted Office 365 customer, that is, you have no on-premises mail servers that send outbound
mail, this is the only SPF TXT record that you need to publish for Office 365.
If you have a hybrid deployment (that is, you have some mailboxes on-premises and some hosted in Office 365),
or if you're an Exchange Online Protection (EOP ) standalone customer (that is, your organization uses EOP to
protect your on-premises mailboxes), you should add the outbound IP address for each of your on-premises edge
mail servers to the SPF TXT record in DNS.
Form your SPF TXT record for Office 365
Use the syntax information in this article to form the SPF TXT record for your custom domain. Although there are
other syntax options that are not mentioned here, these are the most commonly used options. Once you have
formed your record, you need to update the record at your domain registrar.
For information about the domains you will need to include for Office 365, see External DNS records required for
SPF. Use the step-by-step instructions for updating SPF (TXT) records for your domain registrar. If your registrar is
not listed, you will need to contact them separately to learn how to update your record.
SPF TXT record syntax for Office 365
A typical SPF TXT record for Office 365 has the following syntax:

v=spf1 [<ip4>|<ip6>:<IP address>] [include:<domain name>] <enforcement rule>

For example:

v=spf1 ip4:192.168.0.1 ip4:192.168.0.2 include:spf.protection.outlook.com -all

where:
v=spf1 is required. This defines the TXT record as an SPF TXT record.
ip4 indicates that you are using IP version 4 addresses. ip6 indicates that you are using IP version 6
addresses. If you are using IPv6 IP addresses, replace ip4 with ip6 in the examples in this article. You can
also specify IP address ranges using CIDR notation, for example ip4:192.168.0.1/26.
IP address is the IP address that you want to add to the SPF TXT record. Usually, this is the IP address of the
outbound mail server for your organization. You can list multiple outbound mail servers. For more
information, see Example: SPF TXT record for multiple outbound on-premises mail servers and Office 365.
domain name is the domain you want to add as a legitimate sender. For a list of domain names you should
include for Office 365, see External DNS records required for SPF.
Enforcement rule is usually one of the following:
-all
Indicates hard fail. If you know all of the authorized IP addresses for your domain, list them in the
SPF TXT record and use the -all (hard fail) qualifier. Also, if you are only using SPF, that is, you are
not using DMARC or DKIM, you should use the -all qualifier. We recommend that you use always
this qualifier.
~all
Indicates soft fail. If you're not sure that you have the complete list of IP addresses, then you should
use the ~all (soft fail) qualifier. Also, if you are using DMARC with p=quarantine or p=reject, then
you can use ~all. Otherwise, use -all.
?all
Indicates neutral. This is used when testing SPF. We do not recommend that you use this qualifier in
your live deployment.
Example: SPF TXT record to use when all of your mail is sent by Office 365
If all of your mail is sent by Office 365, use this in your SPF TXT record:
v=spf1 include:spf.protection.outlook.com -all

Example: SPF TXT record for a hybrid scenario with one on-premises Exchange Server and Office 365
In a hybrid environment, if the IP address of your on-premises Exchange Server is 192.168.0.1, in order to set the
SPF enforcement rule to hard fail, form the SPF TXT record as follows:

v=spf1 ip4:192.168.0.1 include:spf.protection.outlook.com -all

Example: SPF TXT record for multiple outbound on-premises mail servers and Office 365
If you have multiple outbound mail servers, include the IP address for each mail server in the SPF TXT record and
separate each IP address with a space followed by an "ip4:" statement. For example:

v=spf1 ip4:192.168.0.1 ip4:192.168.0.2 ip4:192.168.0.3 include:spf.protection.outlook.com -all

Next steps: Set up SPF for Office 365


Once you have formulated your SPF TXT record, follow the steps in Set up SPF in Office 365 to help prevent
spoofing to add it to your domain.
Although SPF is designed to help prevent spoofing, but there are spoofing techniques that SPF cannot protect
against. In order to protect against these, once you have set up SPF, you should also configure DKIM and DMARC
for Office 365. To get started, see Use DKIM to validate outbound email sent from your custom domain in Office
365. Next, see Use DMARC to validate email in Office 365.

Troubleshooting: Best practices for SPF in Office 365


You can only create one SPF TXT record for your custom domain. Creating multiple records causes a round robin
situation and SPF will fail. To avoid this, you can create separate records for each subdomain. For example, create
one record for contoso.com and another record for bulkmail.contoso.com.
If an email message causes more than 10 DNS lookups before it is delivered, the receiving mail server will
respond with a permanent error, also called a permerror, and cause the message to fail the SPF check. The
receiving server may also respond with a non-delivery report (NDR ) that contains an error similar to these:
The message exceeded the hop count.
The message required too many lookups.

Avoiding the "too many lookups" error when you use third-party
domains with Office 365
Some SPF TXT records for third-party domains direct the receiving server to perform a large number of DNS
lookups. For example, at the time of this writing, Salesforce.com contains 5 include statements in its record:

v=spf1 include:_spf.google.com
include:_spfblock.salesforce.com
include:_qa.salesforce.com
include:_spfblock1.salesforce.com
include:spf.mandrillapp.com mx ~all

To avoid the error, you can implement a policy where anyone sending bulk email, for example, has to use a
subdomain specifically for this purpose. You then define a different SPF TXT record for the subdomain that
includes the bulk email.
In some cases, like the salesforce.com example, you have to use the domain in your SPF TXT record, but in other
cases, the third-party may have already created a subdomain for you to use for this purpose. For example,
exacttarget.com has created a subdomain that you need to use for your SPF TXT record:

cust-spf.exacttarget.com

When you include third-party domains in your SPF TXT record, you need to confirm with the third-party which
domain or subdomain to use in order to avoid running into the 10 lookup limit.

How to view your current SPF TXT record and determine the number
of lookups that it requires
You can use nslookup to view your DNS records, including your SPF TXT record. Or, if you prefer, there are a
number of free, online tools available that you can use to view the contents of your SPF TXT record. By looking at
your SPF TXT record and following the chain of include statements and redirects, you can determine how many
DNS lookups the record requires. Some online tools will even count and display these lookups for you. Keeping
track of this number will help prevent messages sent from your organization from triggering a permanent error,
called a permerror, from the receiving server.

For more information


Need help adding the SPF TXT record? Step-by-step instructions for updating SPF (TXT) records at a variety of
popular domain registrars is available. Anti-spam message headers includes the syntax and header fields used by
Office 365 for SPF checks.
Set up SPF in Office 365 to help prevent spoofing
8/21/2018 • 6 minutes to read • Edit Online

Summary: This article describes how to update a Domain Name Service (DNS ) record so that you can use
Sender Policy Framework (SPF ) with your custom domain in Office 365. Using SPF helps to validate outbound
email sent from your custom domain.
In order to use a custom domain, Office 365 requires that you add a Sender Policy Framework (SPF ) TXT record
to your DNS record to help prevent spoofing. SPF identifies which mail servers are allowed to send mail on your
behalf. Basically, SPF, along with DKIM, DMARC, and other technologies supported by Office 365 help prevent
spoofing and phishing. SPF is added as a TXT record that is used by DNS to identify which mail servers can send
mail on behalf of your custom domain. Recipient mail systems refer to the SPF TXT record to determine whether
a message from your custom domain comes from an authorized messaging server.
For example, let's say that your custom domain contoso.com uses Office 365. You add an SPF TXT record that
lists the Office 365 messaging servers as legitimate mail servers for your domain. When the receiving messaging
server gets a message from joe@contoso.com, the server looks up the SPF TXT record for contoso.com and finds
out whether the message is valid. If the receiving server finds out that the message comes from a server other
than the Office 365 messaging servers listed in the SPF record, the receiving mail server can choose to reject the
message as spam.
Also, if your custom domain does not have an SPF TXT record, some receiving servers may reject the message
outright. This is because the receiving server cannot validate that the message comes from an authorized
messaging server.
If you've already set up mail for Office 365, then you have already included Microsoft's messaging servers in
DNS as an SPF TXT record. However, there are some cases where you may need to update your SPF TXT record
in DNS. For example:
Previously, you had to add a different SPF TXT record to your custom domain if you were using
SharePoint Online. This is no longer required. This change should reduce the risk of SharePoint Online
notification messages ending up in the Junk Email folder. Update your SPF TXT record if you are hitting
the 10 lookup limit and receiving errors that say things like, "exceeded the lookup limit" and "too many
hops".
If you have a hybrid environment with Office 365 and Exchange on-premises.
You intend to set up DKIM and DMARC (recommended).

Updating your SPF TXT record for Office 365


Before you update the TXT record in DNS, you need to gather some information and determine the format of the
record. This will help prevent you from generating DNS errors. For advanced examples, a more detailed
discussion about supported SPF syntax, see How SPF works to prevent spoofing and phishing in Office 365.
Gather this information:
The current SPF TXT record for your custom domain. For instructions, see Gather the information you
need to create Office 365 DNS records.
IP addresses of all on-premises messaging servers. For example, 192.168.0.1.
Domain names to use for all third-party domains that you need to include in your SPF TXT record. Some
bulk mail providers have set up subdomains to use for their customers. For example, the company
MailChimp has set up servers.mcsv.net.
Determine what enforcement rule you want to use for your SPF TXT record. We recommend -all. For
detailed information about other syntax options, see SPF TXT record syntax for Office 365.
To add or update your SPF TXT record
1. If you have not already done so, form your SPF TXT record by using the syntax from the following table:

COMMON FOR OFFICE 365


IF YOU'RE USING... CUSTOMERS? ADD THIS...

1 Any email system (required) Common. All SPF TXT v=spf1


records start with this value

2 Exchange Online Common include:spf.protection.outloo


k.com

3 Exchange Online dedicated Not common ip4:23.103.224.0/19


only ip4:206.191.224.0/19
ip4:40.103.0.0/16
include:spf.protection.outloo
k.com

4 Office 365 Germany, Not common include:spf.protection.outloo


Microsoft Cloud Germany k.de
only

5 Third-party email system Not common include:<domain name>


Where domain name is the
domain name of the third
party email system.

6 On-premises mail system. Not common Use one of these for each
For example, Exchange additional mail system:
Online Protection plus ip4:< IP address>
another mail system ip6:< IP address>
include:< domain name>
Where the value for < IP
address> is the IP address
of the other mail system
and < domain name> is the
domain name of the other
mail system that sends mail
on behalf of your domain.

7 Any email system (required) Common. All SPF TXT < enforcement rule>
records end with this value This can be one of several
values. We recommend that
you use -all.

1.1 For example, if you are fully-hosted in Office 365, that is, you have no on-premises mail servers, your SPF
TXT record would include rows 1, 2, and 7 and would look like this:

v=spf1 include:spf.protection.outlook.com -all

1.2 This is the most common Office 365 SPF TXT record. This record works for just about everyone, regardless of
whether your Office 365 datacenter is located in the United States, or in Europe (including Germany), or in
another location.
1.3 However, if you have purchased Office 365 Germany, part of Microsoft Cloud Germany, you should use the
include statement from line 4 instead of line 2. For example, if you are fully-hosted in Office 365 Germany, that is,
you have no on-premises mail servers, your SPF TXT record would include rows 1, 4, and 7 and would look like
this:

v=spf1 include:spf.protection.outlook.de -all

1.4 If you are already deployed in Office 365 and have set up your SPF TXT records for your custom domain, and
you are migrating to Office 365 Germany, you need to update your SPF TXT record. To do this, change
include:spf.protection.outlook.com to include.spf.protection.outlook.de.
2. Once you have formed your SPF TXT record, you need to update the record in DNS. You can only have
one SPF TXT record for a domain. If an SPF TXT record exists, instead of adding a new record, you need to
update the existing record. Go to Create DNS records for Office 365, and then click the link for your DNS
host. (If your DNS host doesn't have a link on the page, you can follow the general instructions to add
records or contact your DNS host for help.)
3. Test your SPF TXT record.

More information about SPF


For advanced examples, a more detailed discussion about supported SPF syntax, spoofing, troubleshooting, and
how Office 365 supports SPF, see How SPF works to prevent spoofing and phishing in Office 365.

Next steps: After you set up SPF for Office 365


Having trouble with your SPF TXT record? Read Troubleshooting: Best practices for SPF in Office 365.
SPF is designed to help prevent spoofing, but there are spoofing techniques that SPF cannot protect against. In
order to protect against these, once you have set up SPF, you should also configure DKIM and DMARC for Office
365. To get started, see Use DKIM to validate outbound email sent from your custom domain in Office 365. Next,
see Use DMARC to validate email in Office 365.
Use DKIM to validate outbound email sent from your
custom domain in Office 365
12/7/2018 • 10 minutes to read • Edit Online

Summary: This article describes how you use DomainKeys Identified Mail (DKIM ) with Office 365 to ensure that
destination email systems trust messages sent from your custom domain.
You should use DKIM in addition to SPF and DMARC to help prevent spoofers from sending messages that look
like they are coming from your domain. DKIM lets you add a digital signature to email messages in the message
header. Sounds complicated, but it's really not. When you configure DKIM, you authorize your domain to
associate, or sign, its name to an email message by using cryptographic authentication. Email systems that receive
email from your domain can use this digital signature to help determine if incoming email that they receive is
legitimate.
Basically, you use a private key to encrypt the header in your domain's outgoing email. You publish a public key to
your domain's DNS records that receiving servers can then use to decode the signature. They use the public key
to verify that the messages are really coming from you and not coming from someone spoofing your domain.
Office 365 automatically sets up DKIM for initial domains. The initial domain is the domain that Office 365
created for you when you signed up with the service, for example, contoso.onmicrosoft.com. You don't need to do
anything to set up DKIM for your initial domain. For more information about domains, see Domains FAQ.
You can choose to do nothing about DKIM for your custom domain too. If you do not set up DKIM for your
custom domain, Office 365 creates a private and public key pair, enables DKIM signing, and then configures the
Office 365 default policy for your custom domain. While this is sufficient coverage for most Office 365 customers,
you should manually configure DKIM for your custom domain in the following circumstances:
You have more than one custom domain in Office 365
You're going to set up DMARC too (recommended)
You want control over your private key
You want to customize your CNAME records
You want to set up DKIM keys for email originating out of a third-party domain, for example, if you use a
third-party bulk mailer.
In this article:
How DKIM works better than SPF alone to prevent malicious spoofing in Office 365
What you need to do to manually set up DKIM in Office 365
To configure DKIM for more than one custom domain in Office 365
Disabling the DKIM signing policy for a custom domain in Office 365
Default behavior for DKIM and Office 365
Set up DKIM so that a third-party service can send, or spoof, email on behalf of your custom domain
Next steps: After you set up DKIM for Office 365

How DKIM works better than SPF alone to prevent malicious spoofing
in Office 365
SPF adds information to a message envelope but DKIM actually encrypts a signature within the message header.
When you forward a message, portions of that message's envelope can be stripped away by the forwarding
server. Since the digital signature stays with the email message because it's part of the email header, DKIM works
even when a message has been forwarded as shown in the following example.

In this example, if you had only published an SPF TXT record for your domain, the recipient's mail server could
have marked your email as spam and generated a false positive result. The addition of DKIM in this scenario
reduces false positive spam reporting. Because DKIM relies on public key cryptography to authenticate and not
just IP addresses, DKIM is considered a much stronger form of authentication than SPF. We recommend using
both SPF and DKIM, as well as DMARC in your deployment.
The nitty gritty: DKIM uses a private key to insert an encrypted signature into the message headers. The signing
domain, or outbound domain, is inserted as the value of the d= field in the header. The verifying domain, or
recipient's domain, then use the d= field to look up the public key from DNS and authenticate the message. If the
message is verified, the DKIM check passes.

What you need to do to manually set up DKIM in Office 365


To configure DKIM, you will complete these steps:
Publish two CNAME records for your custom domain in DNS
Enable DKIM signing for your custom domain in Office 365
Publish two CNAME records for your custom domain in DNS
For each domain for which you want to add a DKIM signature in DNS, you need to publish two CNAME records.
A CNAME record is used by DNS to specify that the canonical name of a domain is an alias for another domain
name.
Office 365 performs automatic key rotation using the two records that you establish. If you have provisioned
custom domains in addition to the initial domain in Office 365, you must publish two CNAME records for each
additional domain. So, if you have two domains, you must publish two additional CNAME records, and so on.
Use the following format for the CNAME records:

Host name: selector1._domainkey


Points to address or value: selector1-<domainGUID>._domainkey.<initialDomain>
TTL: 3600

Host name: selector2._domainkey


Points to address or value: selector2-<domainGUID>._domainkey.<initialDomain>
TTL: 3600
Where:
For Office 365, the selectors will always be "selector1" or "selector2".
domainGUID is the same as the domainGUID in the customized MX record for your custom domain that
appears before mail.protection.outlook.com. For example, in the following MX record for the domain
contoso.com, the domainGUID is contoso-com:

contoso.com. 3600 IN MX 5 contoso-com.mail.protection.outlook.com

initialDomain is the domain that you used when you signed up for Office 365. Initial domains always end
in onmicrosoft.com. For information about determining your initial domain, see Domains FAQ.
For example, if you have an initial domain of cohovineyardandwinery.onmicrosoft.com, and two custom domains
cohovineyard.com and cohowinery.com, you would need to set up two CNAME records for each additional
domain, for a total of four CNAME records.

Host name: selector1._domainkey


Points to address or value: **selector1-cohovineyard-com**._domainkey.cohovineyardandwinery.onmicrosoft.com
TTL: 3600

Host name: selector2._domainkey


Points to address or value: **selector2-cohovineyard-com**._domainkey.cohovineyardandwinery.onmicrosoft.com
TTL: 3600

Host name: selector1._domainkey


Points to address or value: **selector1-cohowinery-com**._domainkey.cohovineyardandwinery.onmicrosoft.com
TTL: 3600

Host name: selector2._domainkey


Points to address or value: **selector2-cohowinery-com**._domainkey.cohovineyardandwinery.onmicrosoft.com
TTL: 3600

Enable DKIM signing for your custom domain in Office 365


Once you have published the CNAME records in DNS, you are ready to enable DKIM signing through Office 365.
You can do this either through the Office 365 admin center or by using PowerShell.
To enable DKIM signing for your custom domain through the Office 365 admin center
1. Sign in to Office 365 with your work or school account.
2. Select the app launcher icon in the upper-left and choose Admin.
3. In the lower-left navigation, expand Admin and choose Exchange.
4. Go to Protection > dkim.
5. Select the domain for which you want to enable DKIM and then, for Sign messages for this domain with
DKIM signatures, choose Enable. Repeat this step for each custom domain.
To enable DKIM signing for your custom domain by using PowerShell
1. Connect to Exchange Online PowerShell.
2. Run the following command:

New-DkimSigningConfig -DomainName <domain> -Enabled $true

Where domain is the name of the custom domain that you want to enable DKIM signing for.
For example, for the domain contoso.com:

New-DkimSigningConfig -DomainName contoso.com -Enabled $true

To Confirm DKIM signing is configured properly for Office 365


Wait a few minutes before you follow these steps to confirm that you have properly configured DKIM. This allows
time for the DKIM information about the domain to be spread throughout the network.
Send a message from an account within your Office 365 DKIM -enabled domain to another email account
such as outlook.com or Hotmail.com.
Do not use an aol.com account for testing purposes. AOL may skip the DKIM check if the SPF check
passes. This will nullify your test.
Open the message and look at the header. Instructions for viewing the header for the message will vary
depending on your messaging client. For instructions on viewing message headers in Outlook, see View e-
mail message headers.
The DKIM -signed message will contain the host name and domain you defined when you published the
CNAME entries. The message will look something like this example:

From: Example User <example@contoso.com>


DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
s=selector1; d=contoso.com; t=1429912795;
h=From:To:Message-ID:Subject:MIME-Version:Content-Type;
bh=<body hash>;
b=<signed field>;

Look for the Authentication-Results header. While each receiving service uses a slightly different format to
stamp the incoming mail, the result should include something like DKIM=pass or DKIM=OK.

To configure DKIM for more than one custom domain in Office 365
If at some point in the future you decide to add another custom domain and you want to enable DKIM for the new
domain, you must complete the steps in this article for each domain. Specifically, complete all steps in What you
need to do to manually set up DKIM in Office 365.

Disabling the DKIM signing policy for a custom domain in Office 365
Disabling the signing policy does not completely disable DKIM. After a period of time, Office 365 will
automatically apply the default Office 365 policy for your domain. For more information, see Default behavior for
DKIM and Office 365.
To disable the DKIM signing policy by using Windows PowerShell
1. Connect to Exchange Online PowerShell.
2. Run one of the following commands for each domain for which you want to disable DKIM signing.

$p=Get-DkimSigningConfig -identity <domain>


$p[0] | set-DkimSigningConfig -enabled $false

For example:
$p=Get-DkimSigningConfig -identity contoso.com
$p[0] | set-DkimSigningConfig -enabled $false

Or

Set-DkimSigningConfig -identity $p[<number>].identity -enabled $false

Where number is the index of the policy. For example:

Set-DkimSigningConfig -identity $p[0].identity -enabled $false

Default behavior for DKIM and Office 365


If you do not enable DKIM, Office 365 automatically creates a 1024-bit DKIM public key for your custom domain
and the associated private key which we store internally in our datacenter. By default, Office 365 uses a default
signing configuration for domains that do not have a policy in place. This means that if you do not set up DKIM
yourself, Office 365 will use its default policy and keys it creates in order to enable DKIM for your domain.
Also, if you disable DKIM signing after enabling it, after a period of time, Office 365 will automatically apply the
Office 365 default policy for your domain.
In the following example, suppose that DKIM for fabrikam.com was enabled by Office 365, not by the
administrator of the domain. This means that the required CNAMEs do not exist in DNS. DKIM signatures for
email from this domain will look something like this:

From: Second Example <second.example@fabrikam.com>


DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
s=selector1-fabrikam-com; d=contoso.onmicrosoft.com; t=1429912795;
h=From:To:Message-ID:Subject:MIME-Version:Content-Type;
bh=<body hash>;
b=<signed field>;

In this example, the host name and domain contain the values to which the CNAME would point if DKIM -signing
for fabrikam.com had been enabled by the domain administrator. Eventually, every single message sent from
Office 365 will be DKIM -signed. If you enable DKIM yourself, the domain will be the same as the domain in the
From: address, in this case fabrikam.com. If you don't, it will not align and instead will use your organization's
initial domain. For information about determining your initial domain, see Domains FAQ.

Set up DKIM so that a third-party service can send, or spoof, email on


behalf of your custom domain
Some bulk email service providers, or software-as-a-service providers, let you set up DKIM keys for email that
originates from their service. This requires coordination between yourself and the third-party in order to set up
the necessary DNS records. No two organizations do it exactly the same way. Instead, the process depends
entirely on the organization.
An example message showing a properly configured DKIM for contoso.com and bulkemailprovider.com might
look like this:
Return-Path: <communication@bulkemailprovider.com>
From: <sender@contoso.com>
DKIM-Signature: s=s1024; d=contoso.com
Subject: Here is a message from Bulk Email Provider's infrastructure, but with a DKIM signature authorized by
contoso.com

In this example, in order to achieve this result:


1. Bulk Email Provider gave Contoso a public DKIM key.
2. Contoso published the DKIM key to its DNS record.
3. When sending email, Bulk Email Provider signs the key with the corresponding private key. By doing so,
Bulk Email Provider attached the DKIM signature to the message header.
4. Receiving email systems perform a DKIM check by authenticating the DKIM -Signature d=<domain> value
against the domain in the From: (5322.From) address of the message. In this example, the values match:
sender@contoso.com
d=contoso.com

Next steps: After you set up DKIM for Office 365


Although DKIM is designed to help prevent spoofing, DKIM works better with SPF and DMARC. Once you have
set up DKIM, if you have not already set up SPF you should do so. For a quick introduction to SPF and to get it
configured quickly, see Set up SPF in Office 365 to help prevent spoofing. For a more in-depth understanding of
how Office 365 uses SPF, or for troubleshooting or non-standard deployments such as hybrid deployments, start
with How Office 365 uses Sender Policy Framework (SPF ) to prevent spoofing. Next, see Use DMARC to validate
email in Office 365. Anti-spam message headers includes the syntax and header fields used by Office 365 for
DKIM checks.
Support for validation of DKIM signed messages
11/9/2018 • 2 minutes to read • Edit Online

Exchange Online Protection (EOP ) and Exchange Online support inbound validation of Domain Keys Identified
Mail (DKIM ) messages. DKIM is a method for validating that a message was sent from the domain it says it
originated from and that it was not spoofed by someone else. It ties an email message to the organization
responsible for sending it. DKIM verification is automatically used for all messages sent over IPv6
communications. (For more information about IPv6 support, see Support for anonymous inbound email messages
over IPv6.)
DKIM validates a digitally signed message that appears in the DKIM -Signature header in the message headers.
The results of a DKIM -Signature validation is stamped in the Authentication-Results header which conforms with
RFC 7001 (Message Header Field for Indicating Message Authentication Status). The message header text appears
similar to the following (where contoso.com is the sender):
Authentication-Results: <contoso.com>; dkim=pass (signature was verified) header.d=example.com;

Admins can create Exchange mail flow rules (also known as transport rules) on the results of a DKIM validation to
filter or route messages as needed.
Support for anonymous inbound email messages
over IPv6
11/9/2018 • 2 minutes to read • Edit Online

Exchange Online Protection (EOP ) and Exchange Online support receiving anonymous inbound email messages
over IPv6 communications from senders who don't send messages over Transport Layer Security (TLS ). You can
opt-in to receive messages over IPv6 by requesting this functionality from Microsoft Support by opening the
Office 365 admin center at https://portal.office.com/adminportal/home, clicking Support, and then clicking New
service request). If you don't opt-in to IPv6 you'll continue to receive messages over IPv4.
Senders who transmit messages to the service over IPv6 must comply with the following two requirements:
1. The sending IPv6 address must have a valid PTR record (reverse DNS record of the sending IPv6 address).
2. The sender must pass either SPF verification (defined in RFC 7208) or DKIM verification (defined in RFC
6376).
Meeting these requirements is mandatory regardless of your configuration prior to opting-in to IPv6. If both
requirements are met, the message will go through normal email message filtering provided by the service. If one
or the other isn't met, the message will be rejected with one of the following 450 responses:
450 4.7.25 Service unavailable, sending IPv6 address [2a01:111:f200:2004::240] must have reverse DNS
record.

450 4.7.26 Service unavailable, message sent over IPv6 [2a01:111:f200:2004::240] must pass either SPF or
DKIM validation.

If you aren't opted in to receive messages over IPv6 and the sender tries to force a message over IPv6 by manually
connecting to the mail server, the message will be rejected with a 550 response that looks similar to the following:
550 5.2.1 Service unavailable, [contoso.com] does not accept email over IPv6.

For more information


Support for validation of DKIM signed messages
Use DMARC to validate email in Office 365
11/9/2018 • 12 minutes to read • Edit Online

Domain-based Message Authentication, Reporting, and Conformance (DMARC ) works with Sender Policy
Framework (SPF ) and DomainKeys Identified Mail (DKIM ) to authenticate mail senders and ensure that
destination email systems trust messages sent from your domain. Implementing DMARC with SPF and DKIM
provides additional protection against spoofing and phishing email. DMARC helps receiving mail systems
determine what to do with messages sent from your domain that fail SPF or DKIM checks.

How do SPF and DMARC work together to protect email in Office


365?
An email message may contain multiple originator, or sender, addresses. These addresses are used for different
purposes. For example, consider these addresses:
"Mail From" address: Identifies the sender and specifies where to send return notices if any problems
occur with the delivery of the message, such as non-delivery notices. This appears in the envelope portion
of an email message and is not usually displayed by your email application. This is sometimes called the
5321.MailFrom address or the reverse-path address.
"From" address: The address displayed as the From address by your mail application. This address
identifies the author of the email. That is, the mailbox of the person or system responsible for writing the
message. This is sometimes called the 5322.From address.
SPF uses a DNS TXT record to provide a list of authorized sending IP addresses for a given domain. Normally,
SPF checks are only performed against the 5321.MailFrom address. This means that the 5322.From address is
not authenticated when you use SPF by itself. This allows for a scenario where a user can receive a message which
passes an SPF check but has a spoofed 5322.From sender address. For example, consider this SMTP transcript:

S: Helo woodgrovebank.com
S: Mail from: phish@phishing.contoso.com
S: Rcpt to: astobes@tailspintoys.com
S: data
S: To: "Andrew Stobes" <astobes@tailspintoys.com>
S: From: "Woodgrove Bank Security" <security@woodgrovebank.com>
S: Subject: Woodgrove Bank - Action required
S:
S: Greetings User,
S:
S: We need to verify your banking details.
S: Please click the following link to verify that we have the right information for your account.
S:
S: http://short.url/woodgrovebank/updateaccount/12-121.aspx
S:
S: Thank you,
S: Woodgrove Bank
S: .

In this transcript, the sender addresses are as follows:


Mail from address (5321.MailFrom): phish@phishing.contoso.com
From address (5322.From): security@woodgrovebank.com
If you configured SPF, then the receiving server performs a check against the Mail from address
phish@phishing.contoso.com. If the message came from a valid source for the domain phishing.contoso.com then
the SPF check passes. Since the email client only displays the From address, the user sees that this message came
from security@woodgrovebank.com. With SPF alone, the validity of woodgrovebank.com was never
authenticated.
When you use DMARC, the receiving server also performs a check against the From address. In the example
above, if there is a DMARC TXT record in place for woodgrovebank.com, then the check against the From address
fails.

What is a DMARC TXT record?


Like the DNS records for SPF, the record for DMARC is a DNS text (TXT) record that helps prevent spoofing and
phishing. You publish DMARC TXT records in DNS. DMARC TXT records validate the origin of email messages
by verifying the IP address of an email's author against the alleged owner of the sending domain. The DMARC
TXT record identifies authorized outbound email servers. Destination email systems can then verify that messages
they receive originate from authorized outbound email servers.
Microsoft's DMARC TXT record looks something like this:

_dmarc.microsoft.com. 3600 IN TXT "v=DMARC1; p=none; pct=100; rua=mailto:d@rua.agari.com;


ruf=mailto:d@ruf.agari.com; fo=1"

Microsoft sends its DMARC reports to Agari, a 3rd party. Agari collects and analyzes DMARC reports.

Implement DMARC for inbound mail


You don't have to do a thing to set up DMARC for mail that you receive in Office 365. We've taken care of
everything for you. If you want to learn what happens to mail that fails to pass our DMARC checks, see How
Office 365 handles inbound email that fails DMARC.

Implement DMARC for outbound mail from Office 365


If you use Office 365 but you aren't using a custom domain, that is, you use onmicrosoft.com, you don't need to
do anything else to configure or implement DMARC for your organization. SPF is already set up for you and
Office 365 automatically generates a DKIM signature for your outgoing mail. For more information about this
signature, see Default behavior for DKIM and Office 365.
If you have a custom domain or you are using on-premises Exchange servers in addition to Office 365, you need
to manually implement DMARC for your outbound mail. Implementing DMARC for your custom domain
includes these steps:
Step 1: Identify valid sources of mail for your domain
Step 2: Set up SPF for your domain in Office 365
Step 3: Set up DKIM for your custom domain in Office 365
Step 4: Form the DMARC TXT record for your domain in Office 365
Step 1: Identify valid sources of mail for your domain
If you have already set up SPF then you have already gone through this exercise. However, for DMARC, there are
additional considerations. When identifying sources of mail for your domain there are two questions you need to
answer:
What IP addresses send messages from my domain?
For mail sent from third parties on my behalf, will the 5321.MailFrom and 5322.From domains match?
Step 2: Set up SPF for your domain in Office 365
Now that you have a list of all your valid senders you can follow the steps to Set up SPF in Office 365 to help
prevent spoofing.
For example, assuming contoso.com sends mail from Exchange Online, an on-premises Exchange server whose IP
address is 192.168.0.1, and a web application whose IP address is 192.168.100.100, the SPF TXT record would
look like this:

contoso.com IN TXT " v=spf1 ip4:192.168.0.1 ip4:192.168.100.100 include:spf.protection.outlook.com -all"

As a best practice, ensure that your SPF TXT record takes into account third-party senders.
Step 3: Set up DKIM for your custom domain in Office 365
Once you have set up SPF, you need to set up DKIM. DKIM lets you add a digital signature to email messages in
the message header. If you do not set up DKIM and instead allow Office 365 to use the default DKIM
configuration for your domain, DMARC may fail. This is because the default DKIM configuration uses your initial
onmicrosoft.com domain as the 5322.From address, not your custom domain. This forces a mismatch between
the 5321.MailFrom and the 5322.From addresses in all email sent from your domain.
If you have third-party senders that send mail on your behalf and the mail they send has mismatched
5321.MailFrom and 5322.From addresses, DMARC will fail for that email. To avoid this, you need to set up DKIM
for your domain specifically with that third-party sender. This allows Office 365 to authenticate email from this
3rd-party service. However, it also allows others, for example, Yahoo, Gmail, and Comcast, to verify email sent to
them by the third-party as if it was email sent by you. This is beneficial because it allows your customers to build
trust with your domain no matter where their mailbox is located, and at the same time Office 365 won't mark a
message as spam due to spoofing because it passes authentication checks for your domain.
For instructions on setting up DKIM for your domain, including how to set up DKIM for third-party senders so
they can spoof your domain, see Use DKIM to validate outbound email sent from your custom domain in Office
365.
Step 4: Form the DMARC TXT record for your domain in Office 365
Although there are other syntax options that are not mentioned here, these are the most commonly used options
for Office 365. Form the DMARC TXT record for your domain in the format:

_dmarc.domainTTL IN TXT "v=DMARC1; pct=100; p=policy

where:
domain is the domain you want to protect. By default, the record protects mail from the domain and all
subdomains. For example, if you specify _dmarc.contoso.com, then DMARC protects mail from the domain
and all subdomains, such as housewares.contoso.com or plumbing.contoso.com.
TTL should always be the equivalent of one hour. The unit used for TTL, either hours (1 hour), minutes (60
minutes), or seconds (3600 seconds), will vary depending on the registrar for your domain.
pct=100 indicates that this rule should be used for 100% of email.
policy specifies what policy you want the receiving server to follow if DMARC fails. You can set the policy to
none, quarantine, or reject.
For information about which options to use, become familiar with the concepts in Best practices for implementing
DMARC in Office 365.
Examples:
Policy set to none

_dmarc.contoso.com 3600 IN TXT "v=DMARC1; p=none"

Policy set to quarantine

_dmarc.contoso.com 3600 IN TXT "v=DMARC1; p=quarantine"

Policy set to reject

_dmarc.contoso.com 3600 IN TXT "v=DMARC1; p=reject"

Once you have formed your record, you need to update the record at your domain registrar. For instructions on
adding the DMARC TXT record to your DNS records for Office 365, see Create DNS records for Office 365 when
you manage your DNS records.

Best practices for implementing DMARC in Office 365


You can implement DMARC gradually without impacting the rest of your mail flow. Create and implement a roll
out plan that follows these steps. Do each of these steps first with a sub-domain, then other sub-domains, and
finally with the top-level domain in your organization before moving on to the next step.
1. Monitor the impact of implementing DMARC
Start with a simple monitoring-mode record for a sub-domain or domain that requests that DMARC
receivers send you statistics about messages that they see using that domain. A monitoring-mode record is
a DMARC TXT record that has its policy set to none (p=none). Many companies publish a DMARC TXT
record with p=none because they are unsure about how much email they may lose by publishing a more
restrictive DMARC policy.
You can do this even before you've implemented SPF or DKIM in your messaging infrastructure. However,
you won't be able to effectively quarantine or reject mail by using DMARC until you also implement SPF
and DKIM. As you introduce SPF and DKIM, the reports generated through DMARC will provide the
numbers and sources of messages that pass these checks, and those that don't. You can easily see how
much of your legitimate traffic is or isn't covered by them, and troubleshoot any problems. You'll also begin
to see how many fraudulent messages are being sent, and from where.
2. Request that external mail systems quarantine mail that fails DMARC
When you believe that all or most of your legitimate traffic is protected by SPF and DKIM, and you
understand the impact of implementing DMARC, you can implement a quarantine policy. A quarantine
policy is a DMARC TXT record that has its policy set to quarantine (p=quarantine). By doing this, you are
asking DMARC receivers to put messages from your domain that fail DMARC into the local equivalent of a
spam folder instead of your customers' inboxes.
3. Request that external mail systems not accept messages that fail DMARC
The final step is implementing a reject policy. A reject policy is a DMARC TXT record that has its policy set
to reject (p=reject). When you do this, you're asking DMARC receivers not to accept messages that fail the
DMARC checks.
How Office 365 handles outbound email that fails DMARC
If a message is outbound from Office 365 and fails DMARC, and you have set the policy to p=quarantine or
p=reject, the message is routed through the High-risk delivery pool for outbound messages. There is no override
for outbound email.
If you publish a DMARC reject policy (p=reject), no other customer in Office 365 can spoof your domain because
messages will not be able to pass SPF or DKIM for your domain when relaying a message outbound through the
service. However, if you do publish a DMARC reject policy but don't have all of your email authenticated through
Office 365, some of it may be marked as spam for inbound email (as described above), or it will be rejected if you
do not publish SPF and try to relay it outbound through the service. This happens, for example, if you forget to
include some of the IP addresses for servers and apps that send mail on behalf of your domain when you form
your DMARC TXT record.

How Office 365 handles inbound email that fails DMARC


If the DMARC policy of the sending server is p=reject, EOP marks the message as spam instead of rejecting it. In
other words, for inbound email, Office 365 treats p=reject and p=quarantine the same way.
Office 365 is configured like this because some legitimate email may fail DMARC. For example, a message might
fail DMARC if it is sent to a mailing list that then relays the message to all list participants. If Office 365 rejected
these messages, people could lose legitimate email and have no way to retrieve it. Instead, these messages will
still fail DMARC but they will be marked as spam and not rejected. If desired, users can still get these messages in
their inbox through these methods:
Users add safe senders individually by using their email client
Administrators create an Exchange transport rule (ETR ) for all users that allows messages for those
particular senders.

Troubleshooting your DMARC implementation


If you have configured your domain's MX records where EOP is not the first entry, DMARC failures will not be
enforced for your domain.
If you're an Office 365 customer, and your domain's primary MX record does not point to EOP, you will not get
the benefits of DMARC. For example, DMARC won't work if you point the MX record to your on-premises mail
server and then route email to EOP by using a connector. In this scenario, the receiving domain is one of your
Accepted-Domains but EOP is not the primary MX. For example, suppose contoso.com points its MX at itself and
uses EOP as a secondary MX record, contoso.com's MX record looks like the following:

contoso.com 3600 IN MX 0 mail.contoso.com


contoso.com 3600 IN MX 10 contoso-com.mail.protection.outlook.com

All, or most, email will first be routed to mail.contoso.com since it's the primary MX, and then mail will get routed
to EOP. In some cases, you might not even list EOP as an MX record at all and simply hook up connectors to
route your email. EOP does not have to be the first entry for DMARC validation to be done. It just ensures the
validation, as we cannot be certain that all on-premise/non-O365 servers will do DMARC checks. DMARC is
eligible to be enforced for a customer’s domain (not server) when you set up the DMARC TXT record, but it is up
to the receiving server to actually do the enforcement. If you set up EOP as the receiving server, then EOP does
the DMARC enforcement.

For more information


Want more information about DMARC? These resources can help.
Anti-spam message headers includes the syntax and header fields used by Office 365 for DMARC checks.
Take the DMARC Training Series from M 3AAWG (Messaging, Malware, Mobile Anti-Abuse Working
Group).
Use the checklist at dmarcian.
Go directly to the source at DMARC.org.

See also
How Office 365 uses Sender Policy Framework (SPF ) to prevent spoofing
Set up SPF in Office 365 to help prevent spoofing
Use DKIM to validate outbound email sent from your custom domain in Office 365
Backscatter messages and EOP
8/21/2018 • 2 minutes to read • Edit Online

Backscatter messages are the automated bounce messages that are sent by mail servers, typically as a result of
incoming spam. Because Exchange Online Protection (EOP ) is a spam filtering service, email messages sent to
nonexistent recipients and to other suspicious destinations are rejected by our service. When this happens, EOP
generates a non-delivery report (NDR ) message and delivers it back to the "sender." Because spammers frequently
use a forged or invalid "From" address in their messages, the sender address to which the NDR is sent may result
in a backscatter message. When this happens, outgoing servers that are associated with the EOP network may be
listed on the Backscatterer DNS Block List (DNSBL ). The Backscatterer DNSBL is a list of IP addresses that send
backscatter messages. It isn't a spammer list, and we don't try to remove our servers from the Backscatterer
DNSBL.

TIP
According to the instructions on the Backscatterer website, the use of reject mode for all incoming mail isn't a recommended
configuration or use of that service. It should be used in safe mode instead. For more information about implementing the
correct backscatter configuration, visit the Backscatterer.org website.

For more information


The Backscatterer.org IP list
See the "NDR backscatter" entry in Advanced spam filtering options
Anti-spam message headers
11/9/2018 • 10 minutes to read • Edit Online

When Exchange Online Protection scans an inbound email message it inserts the X-Forefront-Antispam -
Report header into each message. The fields in this header can help provide administrators with information
about the message and about how it was processed. The fields in the X-Microsoft-Antispam header provide
additional information about bulk mail and phishing. In addition to these two headers, Exchange Online
Protection also inserts email authentication results for each message it processes in the Authentication-results
header.

TIP
For information about how to view an email message header in various email clients, see Message Header Analyzer. You can
copy and paste the contents of the message header into the Message Header Analyzer tool. When you select a message in
the quarantine in the Exchange admin center, the View message header link also easily lets you copy and paste the
message header text into the tool. Once in the Message Header Analyzer tool, click Analyze headers in order to retrieve
information about the header.

X-Forefront-Antispam-Report message header fields


After accessing the message header information, search for X-Forefront-Antispam -Report and then look for
these fields. Other fields in this header are used exclusively by the Microsoft anti-spam team for diagnostic
purposes.

HEADER FIELD DESCRIPTION

CIP: [IP address] The connecting IP address. You may want to specify this IP
address when creating an IP Allow list or an IP Block list in the
connection filter. For more information, see Configure the
connection filter policy.

CTRY The country from which the message connected to the


service. This is determined by the connecting IP address,
which may not be the same as the originating sending IP
address.

LANG The language in which the message was written, as specified


by the country code (for example, ru_RU for Russian).

SCL The Spam Confidence Level (SCL) value of the message. For
more information about interpreting these values, see Spam
confidence levels.

PCL The Phishing Confidence Level (PCL) value of the message.


See PCL for more information about PCL values.

SRV:BULK The message was identified as a bulk email message. If the


Block all bulk email messages advanced spam filtering
option is enabled, it will be marked as spam. If it is not
enabled, it will only be marked as spam if the rest of the
filtering rules determine that the message is spam.
HEADER FIELD DESCRIPTION

SFV:SFE Filtering was skipped and the message was let through
because it was sent from an address on an individual's safe
sender list.

SFV:BLK Filtering was skipped and the message was blocked because it
was sent from an address on an individual's blocked sender
list.
Tip: For more information about how end users can create
safe and blocked sender lists, see Block or allow (junk email
settings) (Outlook on the web) and Overview of the Junk
Email Filter (Outlook).

IPV:CAL The message was allowed through the spam filters because
the IP address was specified in an IP Allow list in the
connection filter.

IPV:NLI The IP address was not listed on any IP reputation list.

SFV:SPM The message was marked as spam by the content filter.

SFV:SKS The message was marked as spam prior to being processed


by the content filter. This includes messages where the
message matched a Transport rule to automatically mark it as
spam and bypass all additional filtering.

SFV:SKA The message skipped filtering and was delivered to the inbox
because it matched an allow list in the spam filter policy, such
as the Sender allow list.

SFV:SKB The message was marked as spam because it matched a


block list in the spam filter policy, such as the Sender block
list.

SFV:SKN The message was marked as non-spam prior to being


processed by the content filter. This includes messages where
the message matched a transport rule to automatically mark
it as non-spam and bypass all additional filtering.

SFV:SKI Similar to SFV:SKN, the message skipped filtering for another


reason such as being intra-organizational email within a
tenant.

SFV:SKQ The message was released from the quarantine and was sent
to the intended recipients.

SFV:NSPM The message was marked as non-spam and was sent to the
intended recipients.

H: [helostring] The HELO or EHLO string of the connecting mail server.

PTR: [ReverseDNS] The PTR record, or pointer record, of the sending IP address,
also known as the reverse DNS address.
HEADER FIELD DESCRIPTION

SFTY The message was identified as phishing and will also be


marked with one of the following values:
• 9.1: Default value. The message contains a phishing URL,
may contain other phishing content, or may have been
marked as phishing by another mail filter such as an on-
premises version of Exchange Server before relaying the
message to Office 365.
• 9.11: Message failed anti-spoofing checks where the
sending domain in the From: header is the same as, or aligns
with, or is part of the same organization as the receiving
domain.
• 9.21: Message failed anti-spoofing checks and the sending
domain in the From: header does not authenticate. Used in
combination with CompAuth (see Authentication-Results).
• 9.22: Same as 9.21, except that the user has a safe sender
that was overridden.
• 9.23: Same as 9.22, except that the organization has an
allowed sender or domain that was overridden.
• 9.24: Same as 9.23, except that the user has an Exchange
mail flow rule that was overridden.

X-CustomSpam: [ASFOption] The message matched an advanced spam filtering option. For
example, X-CustomSpam: Image links to remote sites
denotes that the Image links to remote sites ASF option
was matched. To find out which X-header text is added for
each specific ASF option, see Advanced spam filtering options.

X-Microsoft-Antispam message header fields


The following table describes useful fields in the X-Microsoft-Antispam message header. Other fields in this
header are used exclusively by the Microsoft anti-spam team for diagnostic purposes.

HEADER FIELD DESCRIPTION

BCL The Bulk Complaint Level (BCL) of the message. For more
information, see Bulk Complaint Level values.

PCL The Phishing Confidence Level (PCL) of the message, which


indicates whether it's a phishing message. This status can be
returned as one of the following numerical values:
• 0-3: The message's content isn't likely to be phishing.
• 4-8: The message's content is likely to be phishing.
• -9990: (Exchange Online Protection only) The message's
content is likely to be phishing.
The values are used to determine what action your email
client takes on messages. For example, Outlook uses the PCL
stamp to block the content of suspicious messages. For more
information about phishing, and how Outlook processes
phishing messages, see Turn on or off links in email
messages.

Authentication-results message header


The results of checks against SPF, DKIM, and DMARC are recorded, or stamped, by Office 365 in the
Authentication-results message header when our mail servers receive an email message.
check stamp syntax and examples
The following syntax examples show a portion of the text "stamp" that Office 365 applies to the message header
for each email that undergoes an email authentication check when it is received by our mail servers. The stamp is
added to the Authentication-Results header.
Syntax: SPF check stamp
For SPF, the following syntax applies.

spf=<pass (IP address)|fail (IP address)|softfail (reason)|neutral|none|temperror|permerror> smtp.mailfrom=


<domain>

Examples: SPF check stamp

spf=pass (sender IP is 192.168.0.1) smtp.mailfrom=contoso.com


spf=fail (sender IP is 127.0.0.1) smtp.mailfrom=contoso.com

Syntax: DKIM check stamp


For DKIM, the following syntax applies.

dkim=<pass|fail (reason)|none> header.d=<domain>

Examples: DKIM check stamp

dkim=pass (signature was verified) header.d=contoso.com


dkim=fail (body hash did not verify) header.d=contoso.com

Syntax: DMARC check stamp


For DMARC, the following syntax applies.

dmarc=<pass|fail|bestguesspass|none> action=<permerror|temperror|oreject|pct.quarantine|pct.reject>
header.from=<domain>

Examples: DMARC check stamp

dmarc=pass action=none header.from=contoso.com


dmarc=bestguesspass action=none header.from=contoso.com
dmarc=fail action=none header.from=contoso.com
dmarc=fail action=oreject header.from=contoso.com

Authentication-results message header fields used by Office 365 email authentication


This table describes the fields and possible values for each email authentication check.

HEADER FIELD DESCRIPTION


HEADER FIELD DESCRIPTION

spf Describes the results of the SPF check for the message.
Possible values include:
• pass (IP address): Indicates the SPF check for the message
passed and includes the sender's IP address. The client is
authorized to send or relay email on behalf of the sender's
domain.
• fail (IP address): Indicates the SPF check for the message
failed and includes the sender's IP address. This is sometimes
called hard fail.
• softfail (reason): Indicates that the SPF record has
designated the host as not being allowed to send but is in
transition.
• neutral: Indicates that the SPF record has explicitly stated
that it is not asserting whether the IP address is authorized.
• none: Indicates that the domain does not have an SPF
record or the SPF record does not evaluate to a result.
• temperror: Indicates that an error has occurred that may
be temporary in nature, for example, a DNS error. Trying
again later might succeed without any administrator action.
• permerror: Indicates that a permanent error has occurred.
This happens when, for example, the domain has a badly
formatted SPF record.

smtp.mailfrom Contains the source domain from which the message was
sent. Any errors about this email message will be sent to the
postmaster or the entity responsible for the domain. This is
sometimes called the 5321.MailFrom address or the reverse-
path address on the message envelope.

dkim Describes the results of the DKIM check for the message.
Possible values include:
• pass: Indicates the DKIM check for the message passed.
• fail (reason): Indicates the DKIM check for the message
failed and why. For example, if the message was not signed or
the signature was not verified.
• none: Indicates that the message was not signed. This may
or may not indicate that the domain has a DKIM record or
the DKIM record does not evaluate to a result, only that this
message was not signed.

header.d Domain identified in the DKIM signature if any. This is the


domain that's queried for the public key.

dmarc Describes the results of the DMARC check for the message.
Possible values include:
• pass: Indicates the DMARC check for the message passed.
• fail: Indicates the DMARC check for the message failed.
• bestguesspass: Indicates that no DMARC TXT record for
the domain exists, but if one had existed, the DMARC check
for the message would have passed. This is because the
domain in the 5321.MailFrom address matches the domain in
the 5322.From address.
• none: Indicates that no DKIM TXT record exists for the
sending domain in DNS.
HEADER FIELD DESCRIPTION

action Indicates the action taken by the spam filter based on the
results of the DMARC check. For example:
• permerror: A permanent error occurred during DMARC
evaluation, such as encountering an incorrectly formed
DMARC TXT record in DNS. Attempting to resend this
message isn't likely to end with a different result. Instead, you
may need to contact the domain's owner in order to resolve
the issue.
• temperror: A temporary error occurred during DMARC
evaluation. You may be able to request that the sender
resend the message later in order to process the email
properly.
• oreject or o.reject: Stands for override reject. In this case
Office 365 uses this action when it receives a message that
fails the DMARC check from a domain whose DMARC TXT
record has a policy of p=reject. Instead of deleting or
rejecting the message, Office 365 marks the message as
spam. For more information on why Office 365 is configured
this way, see How Office 365 handles inbound email that fails
DMARC.
• pct.quarantine: Indicates that a percentage less than 100%
of messages that do not pass DMARC will be delivered
anyway. This means that the message failed DMARC and the
policy was set to quarantine, but the pct field was not set to
100% and the system randomly determined not to apply the
DMARC action, as per the specified domain's policy.
• pct.reject: Indicates that a percentage less than 100% of
messages that do not pass DMARC will be delivered anyway.
This means that the message failed DMARC and the policy
was set to reject, but the pct field was not set to 100% and
the system randomly determined not to apply the DMARC
action, as per the specified domain's policy.

header.from The domain of the From address in the email message header.
This is sometimes called the 5322.From address.

compauth Composite authentication result. Used by Office 365 to


combine multiple types of authentication such as SPF, DKIM,
DMARC, or any other part of the message to determine
whether or not the message is authenticated. Uses the From:
domain as the basis of evaluation.

reason The reason the composite authentication passed or failed. The


value for the reason is made up of three digits:
• 000: The message explicitly failed authentication. For
example, the message received a DMARC fail with an action
of quarantine or reject.
• 001: The message implicitly failed authentication, and the
sending domain did not publish authentication policies. For
example, a DMARC policy of p=none.
• 1xx: The message passed authentication. The second two
digits are internal codes used by Office 365.
• 2xx: The message soft-passed authentication. The second
two digits are internal codes used by Office 365.
• 3xx: The message was not checked for composite
authentication.
• 4xx: The message bypassed composite authentication. The
second two digits are internal codes used by Office 365.
Information Rights Management in Exchange Online
8/21/2018 • 3 minutes to read • Edit Online

People often use email to exchange sensitive information, such as financial data, legal contracts, confidential
product information, sales reports and projections, patient health information, or customer and employee
information. As a result, mailboxes can become repositories for large amounts of potentially sensitive information
and information leakage can become a serious threat to your organization.
To help prevent information leakage, Exchange Online includes Information Rights Management (IRM )
functionality that provides online and offline protection of email messages and attachments. IRM protection can be
applied by users in Microsoft Outlook or Outlook on the web, and it can be applied by administrators using
transport protection rules or Outlook protection rules. IRM helps you and your users control who can access,
forward, print, or copy sensitive data within an email.

Changes to how IRM works with Office 365 Message Encryption (OME)
and Azure Active Directory
As of September 2017, when you set up the new Office 365 Message Encryption capabilities for your organization,
you also set up IRM for use with Azure Rights Management (Azure RMS ). You no longer set up IRM with Azure
RMS separately. Instead, OME and rights management work seamlessly together. For more details about the new
capabilities, see Office 365 Message Encryption FAQ. If you're ready to get started using the new OME capabilities
within your organization, see Set up new Office 365 Message Encryption capabilities built on top of Azure
Information Protection.

How IRM works with Exchange Online and Active Directory Rights
Management Services
Exchange Online IRM uses on-premises Active Directory Rights Management Services (AD RMS ), an information
protection technology in Windows Server 2008 and later. IRM protection is applied to email by applying an AD
RMS rights policy template to an email message. Rights are attached to the message itself so that protection occurs
online and offline and inside and outside of your organization's firewall.
Users can apply a template to an email message to control the permissions that recipients have on a message.
Actions, such as forwarding, extracting information from a message, saving a message or printing a message can
be controlled by applying an AD RMS rights policy to the message.
You can configure IRM to use an AD RMS server running Windows Server 2008 or later. You can use this AD RMS
server to manage the AD RMS rights policy templates for your cloud-based organization. Outlook also relies on
the AD RMS server to enable users to apply IRM protection to messages they send. For details, see Configure IRM
to use an on-premises AD RMS server.
After it's enabled, IRM protection can be applied to messages as follows:
Users can manually apply a template using Outlook and Outlook on the web. Users can apply an AD
RMS rights policy template to an email message by selecting the template from the Set permissions list.
When users send an IRM -protected message, any attached files that use a supported format also receive the
same IRM protection as the message. IRM protection is applied to files associated with Word, Excel, and
PowerPoint, as well as .xps files and attached email messages.
Administrators can use transport protection rules to apply IRM protection automatically to both
Outlook and Outlook on the web. You can create transport protection rules to IRM -protect messages.
Configure the transport protection rule action to apply an AD RMS rights policy template to messages that
meet the rule condition. After you enable IRM, your organization's AD RMS rights policy templates are
available to use with the transport protection rule action called Apply rights protection to the message
with.
Administrators can create Outlook protection rules. Outlook protection rules automatically apply IRM -
protection to messages in Outlook 2010 (not Outlook on the web) based on message conditions that include
the sender's department, who the message is sent to, and whether recipients are inside or outside your
organization. For details, see Create an Outlook Protection Rule.
Information Rights Management in Exchange Online
8/21/2018 • 3 minutes to read • Edit Online

People often use email to exchange sensitive information, such as financial data, legal contracts, confidential
product information, sales reports and projections, patient health information, or customer and employee
information. As a result, mailboxes can become repositories for large amounts of potentially sensitive information
and information leakage can become a serious threat to your organization.
To help prevent information leakage, Exchange Online includes Information Rights Management (IRM )
functionality that provides online and offline protection of email messages and attachments. IRM protection can be
applied by users in Microsoft Outlook or Outlook on the web, and it can be applied by administrators using
transport protection rules or Outlook protection rules. IRM helps you and your users control who can access,
forward, print, or copy sensitive data within an email.

Changes to how IRM works with Office 365 Message Encryption (OME)
and Azure Active Directory
As of September 2017, when you set up the new Office 365 Message Encryption capabilities for your organization,
you also set up IRM for use with Azure Rights Management (Azure RMS ). You no longer set up IRM with Azure
RMS separately. Instead, OME and rights management work seamlessly together. For more details about the new
capabilities, see Office 365 Message Encryption FAQ. If you're ready to get started using the new OME capabilities
within your organization, see Set up new Office 365 Message Encryption capabilities built on top of Azure
Information Protection.

How IRM works with Exchange Online and Active Directory Rights
Management Services
Exchange Online IRM uses on-premises Active Directory Rights Management Services (AD RMS ), an information
protection technology in Windows Server 2008 and later. IRM protection is applied to email by applying an AD
RMS rights policy template to an email message. Rights are attached to the message itself so that protection
occurs online and offline and inside and outside of your organization's firewall.
Users can apply a template to an email message to control the permissions that recipients have on a message.
Actions, such as forwarding, extracting information from a message, saving a message or printing a message can
be controlled by applying an AD RMS rights policy to the message.
You can configure IRM to use an AD RMS server running Windows Server 2008 or later. You can use this AD
RMS server to manage the AD RMS rights policy templates for your cloud-based organization. Outlook also relies
on the AD RMS server to enable users to apply IRM protection to messages they send. For details, see Configure
IRM to use an on-premises AD RMS server.
After it's enabled, IRM protection can be applied to messages as follows:
Users can manually apply a template using Outlook and Outlook on the web. Users can apply an
AD RMS rights policy template to an email message by selecting the template from the Set permissions
list. When users send an IRM -protected message, any attached files that use a supported format also
receive the same IRM protection as the message. IRM protection is applied to files associated with Word,
Excel, and PowerPoint, as well as .xps files and attached email messages.
Administrators can use transport protection rules to apply IRM protection automatically to both
Outlook and Outlook on the web. You can create transport protection rules to IRM -protect messages.
Configure the transport protection rule action to apply an AD RMS rights policy template to messages that
meet the rule condition. After you enable IRM, your organization's AD RMS rights policy templates are
available to use with the transport protection rule action called Apply rights protection to the message
with.
Administrators can create Outlook protection rules. Outlook protection rules automatically apply IRM -
protection to messages in Outlook 2010 (not Outlook on the web) based on message conditions that
include the sender's department, who the message is sent to, and whether recipients are inside or outside
your organization. For details, see Create an Outlook Protection Rule.
Configure IRM to use an on-premises AD RMS server
8/21/2018 • 6 minutes to read • Edit Online

For use with on-premises deployments, Information Rights Management (IRM ) in Exchange Online uses Active
Directory Rights Management Services (AD RMS ), an information protection technology in Windows Server 2008
and later. IRM protection is applied to email by applying an AD RMS rights policy template to an email message.
Rights are attached to the message itself so that protection occurs online and offline and inside and outside of
your organization's firewall.
This topic shows you how to configure IRM to use an AD RMS server. For information about using the new
capabilities for Office 365 Message Encryption with Azure Active Directory and Azure Rights Management, see
the Office 365 Message Encryption FAQ.
To learn more about IRM in Exchange Online, see Information Rights Management in Exchange Online.

What do you need to know before you begin?


Estimated time to complete this task: 30 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Information Rights Management" entry in the Messaging policy and
compliance permissions topic.
The AD RMS server must be running Windows Server 2008 or later. For details about how to deploy AD
RMS, see Installing an AD RMS Cluster.
For details about how to install and configure Windows PowerShell and connect to the service, see Connect
to Exchange Online Using Remote PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

How do you do this?


Step 1: Use the AD RMS console to export a trusted publishing domain (TPD) from an AD RMS server
The first step is to export a trusted publishing domain (TPD ) from the on-premises AD RMS server to an XML file.
The TPD contains the following settings needed to use RMS features:
The server licensor certificate (SLC ) used for signing and encrypting certificates and licenses
The URLs used for licensing and publishing
The AD RMS rights policy templates that were created with the specific SLC for that TPD
When you import the TPD, it's stored and protected in Exchange Online.
1. Open the Active Directory Rights Management Services console, and then expand the AD RMS cluster.
2. In the console tree, expand Trust Policies, and then click Trusted Publishing Domains.
3. In the results pane, select the certificate for the domain you want to export.
4. In the Actions pane, click Export Trusted Publishing Domain.
5. In the Publishing domain file box, click Save As to save the file to a specific location on the local
computer. Type a file name, making sure to specify the .xml file name extension, and then click Save.
6. In the Password and Confirm Password boxes, type a strong password that will be used to encrypt the
trusted publishing domain file. You will have to specify this password when you import the TPD to your
cloud-based email organization.
Step 2: Use the Exchange Management Shell to import the TPD to Exchange Online
After the TPD is exported to an XML file, you have to import it to Exchange Online. When a TPD is imported, your
organization's AD RMS templates are also imported. When the first TPD is imported, it becomes the default TPD
for your cloud-based organization. If you import another TPD, you can use the Default switch to make it the
default TPD that is available to users.
To import the TPD, run the following command in Windows PowerShell:

Import-RMSTrustedPublishingDomain -FileData $([byte[]](Get-Content -Encoding byte -Path <path to exported TPD


file> -ReadCount 0)) -Name "<name of TPD>" -ExtranetLicensingUrl <URL> -IntranetLicensingUrl <URL>

You can obtain the values for the ExtranetLicensingUrl and IntranetLicensingUrl parameters in the Active Directory
Rights Management Services console. Select the AD RMS cluster in the console tree. The licensing URLs are
displayed in the results pane. These URLs are used by email clients when content has to be decrypted and when
Exchange Online needs to determine which TPD to use.
When you run this command, you'll be prompted for a password. Enter the password that you specified when you
exported the TPD from your AD RMS server.
For example, the following command imports the TPD named Exported TPD using the XML file that you exported
from your AD RMS server and saved to the desktop of the Administrator account. The Name parameter is used to
specify a name to the TPD.

Import-RMSTrustedPublishingDomain -FileData $([byte[]](Get-Content -Encoding byte -Path


C:\Users\Administrator\Desktop\ExportTPD.xml -ReadCount 0)) -Name "Exported TPD" -ExtranetLicensingUrl
https://corp.contoso.com/_wmcs/licensing -IntranetLicensingUrl https://rmsserver/_wmcs/licensing

For detailed syntax and parameter information, see Import-RMSTrustedPublishingDomain.


How do you know this step worked?
To verify that you have successfully imported the TPD, run the Get-RMSTrustedPublishingDomain cmdlet to
retrieve TPDs in your Exchange Online organization. For details, see the examples in Get-
RMSTrustedPublishingDomain.
Step 3: Use the Exchange Management Shell to distribute an AD RMS rights policy template
After you import the TPD, you must make sure an AD RMS rights policy template is distributed. A distributed
template is visible to Outlook Web App users, who can then apply the templates to an email message.
To return a list of all templates contained in the default TPD, run the following command:

Get-RMSTemplate -Type All | fl

If the value of the Type parameter is Archived , the template isn't visible to users. Only distributed templates in the
default TPD are available in Outlook Web App.
To distribute a template, run the following command:

Set-RMSTemplate -Identity "<name of the template>" -Type Distributed

For example, the following command imports the Company Confidential template.

Set-RMSTemplate -Identity "Company Confidential" -Type Distributed

For detailed syntax and parameter information, see Get-RMSTemplate and Set-RMSTemplate.
The Do Not Forward template
When you import the default TPD from your on-premises organization into Exchange Online, one AD RMS rights
policy template named Do Not Forward is imported. By default, this template is distributed when you import the
default TPD. You can't use the Set-RMSTemplate cmdlet to modify the Do Not Forward template.
When the Do Not Forward template is applied to a message, only the recipients addressed in the message can
read the message. Additionally, recipients can't do the following:
Forward the message to another person.
Copy content from the message.
Print the message.

IMPORTANT
The Do Not Forward template can't prevent information in a message from being copied with third-party screen capture
programs, cameras, or users manually transcribing the information

You can create additional AD RMS rights policy templates on the AD RMS server in your on-premises
organization to meet your IRM protection requirements. If you create additional AD RMS rights policy templates,
you have to export the TPD from the on-premises AD RMS server again and refresh the TPD in the cloud-based
email organization.
How do you know this step worked?
To verify that you have successfully distributed and AD RMS rights policy template, run the Get-RMSTemplate
cmdlet to check the template's properties. For details, see the examples in Get-RMSTemplate.
Step 4: Use the Exchange Management Shell to enable IRM
After you import the TPD and distribute an AD RMS rights policy template, run the following command to enable
IRM for your cloud-based email organization.

Set-IRMConfiguration -InternalLicensingEnabled $true

For detailed syntax and parameter information, see Set-IRMConfiguration.


How do you know this step worked?
To verify that you have successfully enabled IRM, run the Get-IRMConfiguration cmdlet to check IRM
configuration in the Exchange Online organization.

How do you know this task worked?


To verify that you have successfully imported the TPD and enabled IRM, do the following:
Use the Test-IRMConfiguration cmdlet to test IRM functionality. For details, see "Example 1" in Test-
IRMConfiguration.
Compose a new message in Outlook Web App and IRM -protect it by selecting Set permissions option
from the extended menu ( ).
Messaging policy and compliance in EOP
6/26/2018 • 2 minutes to read • Edit Online

Microsoft Exchange Online Protection provides messaging policy and compliance features for that can help you
manage your email data.

Messaging policy and compliance documentation


TOPIC DESCRIPTION

Auditing reports in EOP Auditing reports provide information about how to run the
administrator role group report, which shows the changes to
management role groups in your organization within a
particular timeframe, and the administrator audit log, which
keeps a record of all configuration changes made in your
organization.

Transport Rules Provides information about Transport rules, which provide you
with the flexibility to apply your own company-specific policies
to email.
Auditing reports in EOP
6/26/2018 • 2 minutes to read • Edit Online

Auditing reports in Microsoft Exchange Online Protection (EOP ) can help you meet regulatory, compliance, and
litigation requirements for your organization. You can obtain auditing reports at any time to determine the
changes that have been made to your EOP configuration. These reports can help you troubleshoot configuration
issues or find the cause of security-related or compliance-related problems.
Looking for the Exchange Online or Exchange Server 2013 version of this topic? See Auditing Reports.

Auditing reports in EOP


There are two auditing reports available in EOP:
1. Administrator role group report The administrator role group report lets you view when a user is added
to or removed from membership in an administrator role group. You can use this report to monitor
changes to the administrative permissions assigned to users in your organization. For more information,
see Run an administrator role group report in EOP .
2. Administrator audit log The administrator audit log records any action, based on an Exchange
Management Shell cmdlet, performed by administrators or users who have been assigned administrative
privileges. For more information, see View the Administrator Audit Log.
Run an administrator role group report in EOP
6/26/2018 • 2 minutes to read • Edit Online

When an administrator adds members to or removes members from administrator role groups, Microsoft
Exchange Online Protection (EOP ) logs each occurrence. When you run an administrator role group report in the
Exchange admin center, entries are displayed as search results and include the role groups affected, who changed
the role group membership and when, and what membership updates were made. Use this report to monitor
changes to the administrative permissions assigned to users in your organization.

What do you need to know before you begin?


Estimated time to complete: 2 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Reports" section of the Feature permissions in EOP topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

Use the EAC to run an administrator role group report


Run the administrator role group report to find the changes to management role groups in your organization
within a particular timeframe.
1. In the EAC, navigate to Compliance management > Auditing, and choose Run an administrator role
group report.
2. Choose the Start date and End date. By default, the report searches for changes made to administrator
role groups in the past two weeks.
3. To view the changes for a specific role group, click Select role groups. Select the role group (or groups) in
the subsequent dialog box, and click OK. You can also leave the field blank to find all changed role groups.
4. Click Search.
If any changes are found using the criteria you specified, they will appear in the results pane. Click a role group in
the search results to see the changes in the details pane.

How do you know this worked?


If you've successfully run an administrator role group report, role groups that have been changed within the date
range are displayed in the search results pane. If there are no results, then no changes to role groups have taken
place within the specified date range. If you think there should be results, change the date range and then run the
report again.

Monitor changes to role group membership


When members are added to or removed from a role group, the search results displayed in the details pane
indicate that the role group membership was updated and lists the current members. The results don't explicitly
state which user was added or removed.
To determine if a user was added or removed, you have to compare two separate entries in the report. For
example, let's look at the following log entries for the HelpDesk role group:
1/27/2013 4:43 PM
Administrator
Updated members: Administrator;annb,florencef;pilarp
2/06/2013 10:09 AM
Administrator
Updated members: Administrator;annb;florencef;pilarp;tonip
2/19/2013 2:12 PM
Administrator
Updated members: Administrator;annb;florencef;tonip
In this example, the Administrator user account made the following changes:
On 2/06/2013, it added the user tonip.
On 2/19/2013, it removed the user pilarp.
Manage recipients and admin role groups in EOP
6/26/2018 • 2 minutes to read • Edit Online

Microsoft Exchange Online Protection (EOP ) offers several ways to manage your mail recipients. The following
topics and their associated subtopics provide information and configuration procedures for managing recipients
and assigning admin role group permissions.

TOPIC DESCRIPTION

Manage recipients in EOP Describes the types of recipients in EOP (mail users and
groups), how to add, remove, and edit recipients, where to
locate recipients in the EAC, and other aspects of managing
recipients.

Manage admin role group permissions in EOP Describes where to locate a list of admin roles in the EAC, how
to add or remove users from an existing admin role group,
and what permissions you need in order to manage specific
EOP features.

For more information


Use Directory Based Edge Blocking to Reject Messages Sent to Invalid Recipients
Manage recipients in EOP
6/26/2018 • 2 minutes to read • Edit Online

Microsoft Exchange Online Protection (EOP ) offers several ways to manage your mail recipients. As an
administrator, you can perform certain management tasks within the Exchange admin center (EAC ) or using
remote Windows PowerShell, and verify other management tasks performed in the Microsoft Office 365 admin
center.
EOP supports the following types of recipients:
Mail Users Mail users are recipients in your EOP managed domains. These recipients have logon
credentials in your Office 365 organization, but they have external email addresses, meaning that their
recipient mailboxes are located outside of your cloud organization. You can add mail users so that they can
receive mail and you can also create transport rules for specific users. You can also assign roles to mail users
in your organization; users with management role group privileges can access the Exchange admin center
(EAC ) and perform certain management tasks. To learn more about user roles and how to assign user roles
in EOP, see Manage admin role group permissions in EOP.
For more information about managing mail users in EOP, see Manage mail users in EOP.
Groups Mail users can be grouped together into distribution groups or security groups.
For more information about managing groups in EOP, see Manage groups in EOP.
Looking for the Exchange Online version of this topic? See Recipients in Exchange Online.
Looking for the Exchange Server version of this topic? See Recipients.
Manage mail users in EOP
8/21/2018 • 7 minutes to read • Edit Online

Defining mail users is an important part of managing the Exchange Online Protection (EOP ) service. There are
several ways that you can manage users in EOP:
Use directory synchronization to manage mail users: If your company has existing user accounts in an on-
premises Active Directory environment, you can synchronize those accounts to Azure Active Directory
(AD ), where a copy of the accounts is stored in the cloud. When you synchronize your existing user
accounts to Azure Active Directory, you can view those users in the Recipients pane of the Exchange
admin center (EAC ). Using directory synchronization is recommended.
Use the EAC to manage mail users: Add and manage mail users directly in the EAC. This is the easiest way
to add mail users and is useful for adding one user at a time.
Use remote Windows PowerShell to manage mail users: Add and manage mail users by running remote
Windows PowerShell. This method is useful for adding multiple records and creating scripts.

NOTE
You can add users in the Office 365 admin center, however these users can't be used as mail recipients.

Before you begin


Procedures in this topic require specific permissions. See each procedure for its permissions information.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

Use directory synchronization to manage mail users


This section provides information about managing email users by using directory synchronization.

IMPORTANT
If you use directory synchronization to manage your recipients, you can still add and manage users in the Office 365 admin
center, but they will not be synchronized with your on-premises Active Directory. This is because directory synchronization
only syncs recipients from your on-premises Active Directory to the cloud.
TIP
Using directory synchronization is recommended for use with the following features: > Outlook safe sender and blocked
sender lists - When synchronized to the service, these lists will take precedence over spam filtering in the service. This lets
users manage their own safe sender and blocked sender lists on a per-user or per-domain basis. > Directory Based Edge
Blocking (DBEB) - For more information about DBEB, see Use Directory Based Edge Blocking to Reject Messages Sent to
Invalid Recipients. > End user spam quarantine - In order to access the end user spam quarantine, end users must have a
valid Office 365 user ID and password. EOP customers protecting on-premises mailboxes must be valid email users. >
Transport rules - When you use directory synchronization, your existing Active Directory users and groups are
automatically uploaded to the cloud, and you can then create Transport rules that target specific users and/or groups
without having to manually add them via the EAC or remote Windows PowerShell. Note that dynamic distribution groups
can't be synchronized via directory synchronization.

Before you begin


Get the necessary permissions and prepare for directory synchronization, as described in Prepare for directory
synchronization.
To synchronize user directories
1. Activate directory synchronization, as described in Activate directory synchronization.
2. Set up your directory synchronization computer, as described in Set up your directory sync computer.
3. Synchronize your directories, as described in Use the Configuration Wizard to sync your directories.

IMPORTANT
When you finish the Azure Active Directory Sync Tool Configuration Wizard, the MSOL_AD_SYNC account is
created in your Active Directory forest. This account is used to read and synchronize your on-premises Active
Directory information. In order for directory synchronization to work correctly, make sure that TCP 443 on your
local directory synchronization server is open.

4. Activate synced users, as described in Activate synced users.


5. Manage directory synchronization, as described in Manage directory synchronization.
6. Verify that EOP is synchronizing correctly. In the EAC, go to Recipients > Contacts and view that the list
of users was correctly synchronized from your on-premises environment.

Use the EAC to manage mail users


This section provides information about adding and managing email users directly in the EAC.
Before you begin
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Users, Contacts, and Role Groups" entry in Feature permissions in EOP.
To add a mail user in the EAC
1. Create an email user by going to go to Recipients > Contacts in the EAC, and then clicking New +.
2. On the New mail user page, enter the user's information, including the following:
MAIL USER PROPERTY DESCRIPTION

First name, Initials, and Last name Type the user's full name in the appropriate boxes.

Display name Type a name, using up to 64 characters. By default, this box


shows the names in the First name, Initials, and Last name
boxes if any. The display name is required.

Alias Type a unique alias, using up to 64 characters, for the user.


The alias is required.

External email address Type the external email address of the user.

User id Type the name that the mail user will use to sign in to the
service. The user sign-in name consists of a user name on the
left side of the at (@) symbol and a suffix on the right side.
Typically, the suffix is the domain name in which the user
account resides.

New password Type the password that the mail user will use to sign in to
the service. Make sure that the password you supply
complies with the password length, complexity, and history
requirements of the domain in which you're creating the user
account.

Confirm password Retype the password to confirm it.

3. Click Save to create the new email user. The new user should appear in the list of users.
To edit or remove a mail user in the EAC
In the EAC, go to Recipients > Contacts. In the list of users, click the user that you want to view or change,
and then select Edit to update the user settings as needed. You can change the user's name, alias, or contact
information, and you can record detailed information about the user's role in the organization. You can also
select a user and then choose Remove to delete it.

Use remote Windows PowerShell to manage mail users


This section provides information about adding and managing mail users by using remote Windows PowerShell.
Before you begin
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Users, Contacts, and Role Groups" entry in Feature permissions in EOP.
Be aware that when creating mail users by using remote PowerShell cmdlets, you may encounter
throttling.
This cmdlet uses a batch processing method that results in a propagation delay of a few minutes before
the results of the cmdlet are visible.
To learn how to use Windows PowerShell to connect to Exchange Online Protection, see Connect to
Exchange Online Protection Using Remote PowerShell.
To add a mail user using remote PowerShell
This example uses the New -EOPMailUser cmdlet to create a mail-enabled user account for Jeffrey Zeng in EOP
with the following details:
The first name is Jeffrey and the last name is Zeng.
The name is Jeffrey and the display name is Jeffrey Zeng.
The alias is jeffreyz.
The external email address is jzeng@tailspintoys.com.
The Office 365 sign in name is jeffreyz@contoso.onmicrosoft.com.
The password is Pa$$word1.

New-EOPMailUser -LastName Zeng -FirstName Jeffrey -DisplayName "Jeffrey Zeng" -Name Jeffrey -Alias jeffreyz -
MicrosoftOnlineServicesID jeffreyz@contoso.onmicrosoft.com -ExternalEmailAddress jeffreyz@tailspintoys.com -
Password (ConvertTo-SecureString -String 'Pa$$word1' -AsPlainText -Force)

To verify that this worked


Run the Get-User cmdlet as follows to display information about new mail user Jeffrey Zeng:

Get-User "Jeffrey Zeng"

To edit the properties of a mail user using remote PowerShell


Use the Get-Recipient and Set-EOPMailUser cmdlets to view or change properties for mail users.
This example sets the external email address for Pilar Pinilla.

Set-EOPMailUser -Identity "Pilar Pinilla" -EmailAddresses pilarp@tailspintoys.com

This example sets the Company property for all mail users to Contoso.

$Recip = Get-Recipient -ResultSize unlimited -Filter {(RecipientTypeDetails -eq 'mailuser')}


$Recip | foreach {Set-EOPUser -Identity $_.Alias -Company Contoso}

To verify that this worked


In the previous example where we changed the properties for mail user Pilar Pinella, use the Get-Recipient
cmdlet to verify the changes. (Note that you can view multiple properties for multiple mail contacts.)

Get-Recipient -Identity "Pilar Pinilla" | Format-List

In the previous example where the Company property was set to Contoso for all mail users, run the following
command to verify the changes:

Get-Recipient -ResultSize unlimited -Filter {(RecipientTypeDetails -eq 'mailuser')} | Format-List


Name,Company
IMPORTANT
This cmdlet uses a batch processing method that results in a propagation delay of a few minutes before the results of the
cmdlet are visible.

To remove a mail user using remote PowerShell


This example uses the Remove-EOPMailUser cmdlet to delete user Jeffrey Zeng:

Remove-EOPMailUser -Identity Jeffrey

To verify that this worked


Run the Get-Recipient cmdlet as follows. You should get an error message since the user no longer exists.

Get-Recipient Jeffrey | fl
Manage groups in EOP
8/21/2018 • 5 minutes to read • Edit Online

You can use Exchange Online Protection (EOP ) to create mail-enabled groups for an Exchange organization. You
can also use EOP to define or update group properties that specify membership, email addresses, and other
aspects of groups. You can create distribution groups and security groups, depending on your needs. These groups
can be created by using the Exchange admin center (EAC ) or via remote Windows PowerShell.

Types of mail-enabled groups


You can create two types of groups for your Exchange organization:
Create a group in the EAC (also known as distribution groups) are collections of email users, such as a team
or other ad hoc group, who need to receive or send email regarding a common area of interest. Distribution
groups are exclusively for distributing email messages. In EOP, a distribution group refers to any mail-
enabled group, whether or not it has a security context.
Edit or remove a group in the EAC (also known as security groups) are collections of email users who need
access permissions for Admin roles. For example, you might want to give specific group of users admin role
permissions so they can configure anti-spam and anti-malware settings.

NOTE
By default, all new mail-enabled security groups require that all senders be authenticated. This prevents external
senders from sending messages to mail-enabled security groups.

Before you begin


You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Distribution Groups and Security Groups" entry in the Feature permissions
in EOP topic.
Be aware that when creating and managing groups by using remote PowerShell cmdlets, you may
encounter throttling.
This cmdlet uses a batch processing method that results in a propagation delay of a few minutes before the
results of the cmdlet are visible.
To learn how to use Windows PowerShell to connect to Exchange Online Protection, see Connect to
Exchange Online Protection Using Remote PowerShell.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

Create a group in the EAC


1. In the Exchange admin center (EAC ), go to Recipients > Groups.
2. Click New , and then click Distribution group or Security group, depending on your needs. See Types
of mail-enabled groups for the distinction.
3. On the New distribution group or New security group page, complete the following fields:
Display name Type a display name that's unique to your organization and meaningful to EOP users. The
display name is required.
Alias Type a group alias of up to 64 characters that's unique to your organization. EOP users type the alias
in the To: line of email messages and the alias resolves to the group's display name. If you change the alias,
the primary SMTP address for the group also changes and will contain the new alias. The alias is required.
Description Type a description of the group so that people will know the purpose of the group.
Owners By default, the person who creates the group is the owner. You can add an owner by choosing Add
. All groups must have at least one owner.

NOTE
Owners don't have to be members of the group.

Members Use this section to add group members and to specify whether approval is required for people
to join or leave the group. To add members to the group, click Add .
4. Click OK to return to the original page.
5. When you've finished, click Save to create the group. The new group should appear in the list of groups.

Edit or remove a group in the EAC


1. In the EAC, navigate to Recipients > Groups.
2. Do one of the following:
To edit a group: In the list of groups, click the distribution or security group that you want to view or change,
and then click Edit . You can update general settings, add or remove group owners, and add or remove
group members, as needed.
To remove a group: Select the group and click Remove .
3. When you're finished making your changes, click Save.

Create, edit, or remove a group using remote Windows PowerShell


This section provides information about creating groups and changing their properties by using remote Windows
PowerShell. It also shows how to remove an existing group.
To create a group using remote Windows PowerShell
This example uses the New -EOPDistributionGroup cmdlet to create a distribution group with an alias of itadmin
and the name IT Administrators. It also adds users as members of the group.

New-EOPDistributionGroup -Type "Distribution" -Name "IT Administrators" -Alias itadmin -Members


@("Member1","Member2","Member3") -ManagedBy "Member1"
To create a security group instead of a distribution group, specify -Type "Security" instead.
To verify that you've successfully created the IT Administrators group, run the Get-Recipient cmdlet to display
information about the new group:

Get-Recipient "IT Administrators" | Format-List

To get a list of members in the group, run the Get-DistributionGroupMember cmdlet as follows:

Get-DistributionGroupMember "IT Administrators"

To get a full list of all your groups, run the Get-Recipient cmdlet as follows:

Get-Recipient -RecipientType "MailUniversalDistributionGroup" | FT | more

To change the properties of a group using remote Windows PowerShell


Use the Get-Recipient and Set-EOPDistributionGroup cmdlets to view and change properties for groups. An
advantage of using remote PowerShell instead of the EAC is the ability to change properties for multiple groups.
Here are some examples of using remote Windows PowerShell to change group properties.
This example uses the Set-EOPDistributionGroup cmdlet to change the primary SMTP address (also called the
reply address) for the Seattle Employees group to sea.employees@contoso.com.

Set-EOPDistributionGroup "Seattle Employees" -PrimarysmptAddress "sea.employees@contoso.com"

To verify that you've successfully changed the properties for a group, use the Get-Recipient cmdlet to verify the
changes. One advantage of using remote PowerShell is that you can view multiple properties for multiple groups.
In the previous example where the primary SMTP address group was changed, run the following command to
verify the new value:

Get-Recipient "Seattle Employees" | FL "PrimarySmtpAddress"

This example uses the Update-EOPDistributionGroupMember cmdlet to update all the members of the Seattle
Employees group. Use a comma to separate all members.

Update-EOPDistributionGroupMember -Identity "Seattle Employees" -Members


@("Member1","Member2","Member3","Member4","Member5")

To get the list of all the members in the group Seattle Employees, use the Get-DistributionGroupMember cmdlet
as follows:

Get-DistributionGroupMember "Seattle Employees"

To remove a group using remote Windows PowerShell


This example uses the Remove-EOPDistributionGroup cmdlet to remove a distribution group named IT
Administrators.

Remove-EOPDistributionGroup -Identity "IT Administrators"

To verify that the group was removed, run the Get-Recipient cmdlet as follows, and confirm that the group (in this
case "It Administrators") was deleted.

Get-Recipient -RecipientType "MailUniversalDistributionGroup"


Manage admin role group permissions in EOP
8/21/2018 • 2 minutes to read • Edit Online

In Microsoft Exchange Online Protection (EOP ), you can use the Exchange admin center (EAC ) to make a user a
member of a role group or groups in order to assign them permissions to perform specific administrative tasks.
You can also remove a user from a role group or groups by using the EAC.

What do you need to know before you begin?


Estimated time to complete: 5-10 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Users, Contacts, and Role Groups" entry in the Feature permissions in EOP
topic.
Certain permissions in Office 365 map to EOP admin role group permissions. For more information, see
the "Role in Exchange Online" column in the "Which services do my Office 365 permissions extend to?"
section in Assigning Admin Roles.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

What do you want to do?


Use the EAC to assign members to admin role groups
1. In the EAC, navigate to Permissions > Admin Roles, click the role group that you want to add the user or
users to, and then click Edit .
2. Under Members, click Add . The Select Members window will appear.
3. Search for the user or users that you wish to add, or select them from the list.
4. When you have selected the user or users that you want to add, click Add, and then click OK. The Select
Members window will close.
5. You will see that the user has been added to the Members pane. Click Save.

NOTE
Users may have to sign out and sign in again to see the change in their administrative rights after you add or
remove members from the role group.

Use the EAC to remove members from admin role groups


1. In the EAC, navigate to Permissions > Admin Roles, click the role group that you want to remove a user
or users from, and then click Edit .
2. Under Members, select the user or users that you want to remove and click Remove .
3. Click Save to save the change to the role group and return to the Admin Roles page. To verify that you've
successfully removed the user from the administrator role group, make sure the member is no longer
displayed under Members in the details pane for the selected role group.

NOTE
Users may have to sign out and sign in again to see the change in their administrative rights after you add or
remove members from the role group.

For more information


Feature permissions in EOP
Mail flow in EOP
8/17/2018 • 2 minutes to read • Edit Online

As an Exchange Online Protection (EOP ) customer, all messages sent to your organization pass through EOP
before your workers see them. Whether you host all of your mailboxes in the cloud with Exchange Online, or you
host your mailboxes on premises (called a standalone scenario), perhaps to continue taking advantage of your
existing infrastructure, you have options about how to route messages that will pass through EOP for processing
before they are routed to your worker inboxes.
You may want to configure custom mail routing to conform your messaging to a business requirement. For
instance, you can pass all of your outbound mail through a policy-filtering appliance.

Working with messages and message access options


EOP offers a lot of flexibility in how your messages are routed. The following topics explain steps in the mail flow
process.
Use Directory Based Edge Blocking to Reject Messages Sent to Invalid Recipients Describes the Directory Based
Edge Blocking feature which lets you reject messages for invalid recipients at the service network perimeter.
View or Edit Managed Domains in EOP describes how to manage domains that are associated with your EOP
service.
If you add subdomains to your organization, your EOP service can help you manage these too. Learn more about
subdomains at Enable Mail Flow for Subdomains in Exchange Online.
Configure mail flow using connectors in Office 365 introduces connectors and shows how you can use them to
customize mail routing. Scenarios include ensuring secure communication with a partner organization and setting
up a smart host.
To ensure that junk email is routed correctly to each user's junk-email folder, you must perform a couple
configuration steps. These are detailed in Ensure that spam is routed to each user's Junk Email folder. If you do not
want to move messages to each user's junk-email folder, you may choose another action by editing your content
filter policies in the Exchange admin center. For more information, see Configure your spam filter policies.

Verify mail flow


To verify that your EOP setup, including your connector configuration, is working correctly, see the "How do you
know this task worked?" section in Set up your EOP service.
Test Mail Flow with the Remote Connectivity Analyzer provides instructions for testing that your mail flow is set up
correctly.
Mail flow rules (transport rules) in Exchange Online
Protection
6/26/2018 • 9 minutes to read • Edit Online

You can use mail flow rules (also known as transport rules) to identify and take action on messages that flow
through your Office 365 organization. Mail flow rules are similar to the Inbox rules that are available in Outlook
and Outlook on the web. The main difference is mail flow rules take action on messages while they're in transit,
and not after the message is delivered to the mailbox. Mail flow rules contain a richer set of conditions, exceptions,
and actions, which provides you with the flexibility to implement many types of messaging policies.
This article explains the components of mail flow rules, and how they work.
For steps to create, copy, and manage mail flow rules, see Manage mail flow rules. For each rule, you have the
option of enforcing it, testing it, or testing it and notifying the sender. To learn more about the testing options, see
Test a mail flow rule and Policy Tips.
For summary and detail reports about messages that matched mail flow rules, see Use mail protection reports
in Office 365 to view data about malware, spam, and rule detections.
To implement specific messaging policies by using mail flow rules, see these topics:
Use mail flow rules to inspect message attachments in Office 365
Set up encryption in Office 365 Enterprise
Organization-wide message disclaimers, signatures, footers, or headers in Office 365
Use mail flow rules to set the spam confidence level (SCL ) in messages
Create organization-wide safe sender or blocked sender lists in Office 365
Reducing malware threats through file attachment blocking in Exchange Online Protection
Define rules to encrypt or decrypt email messages
The following video provides a demonstration of setting up mail flow rules in Exchange Online Protection.

Mail flow rule components


A mail flow rule is made of conditions, exceptions, actions, and properties:
Conditions Identify the messages that you want to apply the actions to. Some conditions examine
message header fields (for example, the To, From, or Cc fields). Other conditions examine message
properties (for example, the message subject, body, attachments, message size, or message classification).
Most conditions require you to specify a comparison operator (for example, equals, doesn't equal, or
contains) and a value to match. If there are no conditions or exceptions, the rule is applied to all messages.
For more information about mail flow rule conditions in Exchange Online Protection, see Mail flow rule
conditions and exceptions (predicates) in Exchange Online Protection.
Exceptions Optionally identify the messages that the actions shouldn't apply to. The same message
identifiers that are available in conditions are also available in exceptions. Exceptions override conditions
and prevent the rule actions from being applied to a message, even if the message matches all of the
configured conditions.
Actions Specify what to do to messages that match the conditions in the rule, and don't match any of the
exceptions. There are many actions available, such as rejecting, deleting, or redirecting messages, adding
additional recipients, adding prefixes in the message subject, or inserting disclaimers in the message body.
For more information about mail flow rule actions that are available in Exchange Online Protection, see
Mail flow rule actions in Exchange Online Protection.
Properties Specify other rules settings that aren't conditions, exceptions or actions. For example, when the
rule should be applied, whether to enforce or test the rule, and the time period when the rule is active.
For more information, see the Mail flow rule properties section in this topic.
Multiple conditions, exceptions, and actions
The following table shows how multiple conditions, condition values, exceptions, and actions are handled in a rule.

COMPONENT LOGIC COMMENTS

Multiple conditions AND A message must match all the


conditions in the rule. If you need to
match one condition or another, use
separate rules for each condition. For
example, if you want to add the same
disclaimer to messages with
attachments and messages that
contain specific text, create one rule for
each condition. In the EAC, you can
easily copy a rule.

One condition with multiple values OR Some conditions allow you to specify
more than one value. The message
must match any one (not all) of the
specified values. For example, if an
email message has the subject Stock
price information, and the The subject
includes any of these words
condition is configured to match the
words Contoso or stock, the condition
is satisfied because the subject contains
at least one of the specified values.

Multiple exceptions OR If a message matches any one of the


exceptions, the actions are not applied
to the message. The message doesn't
have to match all the exceptions.
COMPONENT LOGIC COMMENTS

Multiple actions AND Messages that match a rule's conditions


get all the actions that are specified in
the rule. For example, if the actions
Prepend the subject of the message
with and Add recipients to the Bcc
box are selected, both actions are
applied to the message.
Keep in mind that some actions, such
as the Delete the message without
notifying anyone action, prevent
subsequent rules from being applied to
a message. Other actions such as
Forward the message do not allow
additional actions.
You can also set an action on a rule so
that when that rule is applied,
subsequent rules are not applied to the
message.

Mail flow rule properties


The following table describes the rule properties that are available in mail flow rules.

PROPERTY NAME IN THE EAC PARAMETER NAME IN POWERSHELL DESCRIPTION

Priority Priority Indicates the order that the rules are


applied to messages. The default
priority is based on when the rule is
created (older rules have a higher
priority than newer rules, and higher
priority rules are processed before
lower priority rules).
You change the rule priority in the EAC
by moving the rule up or down in the
list of rules. In the PowerShell, you set
the priority number (0 is the highest
priority).
For example, if you have one rule to
reject messages that include a credit
card number, and another one
requiring approval, you'll want the
reject rule to happen first, and stop
applying other rules.

Mode Mode You can specify whether you want the


rule to start processing messages
immediately, or whether you want to
test rules without affecting the delivery
of the message (with or without Data
Loss Prevention or DLP Policy Tips).
Policy Tips present a brief note in
Outlook or Outlook on the web that
provides information about possible
policy violations to the person that's
creating the message. For more
information, see Policy Tips.
For more information about the modes,
see Test a mail flow rule.
PROPERTY NAME IN THE EAC PARAMETER NAME IN POWERSHELL DESCRIPTION

Activate this rule on the following ActivationDate Specifies the date range when the rule
date ExpiryDate is active.
Deactivate this rule on the following
date

On check box selected or not selected New rules: Enabled parameter on the You can create a disabled rule, and
New-TransportRule cmdlet. enable it when you're ready to test it.
Existing rules: Use the Enable- Or, you can disable a rule without
TransportRule or Disable- deleting it to preserve the settings.
TransportRule cmdlets.
The value is displayed in the State
property of the rule.

Defer the message if rule processing RuleErrorAction You can specify how the message
doesn't complete should be handled if the rule
processing can't be completed. By
default, the rule will be ignored, but
you can choose to resubmit the
message for processing.

Match sender address in message SenderAddressLocation If the rule uses conditions or exceptions
that examine the sender's email
address, you can look for the value in
the message header, the message
envelope, or both.

Stop processing more rules SenderAddressLocation This is an action for the rule, but it
looks like a property in the EAC. You
can choose to stop applying additional
rules to a message after a rule
processes a message.

Comments Comments You can enter descriptive comments


about the rule.

How mail flow rules are applied to messages


All messages that flow through your organization are evaluated against the enabled mail flow rules in your
organization. Rules are processed in the order listed on the Mail flow > Rules page in EAC, or based on the
corresponding Priority parameter value in the PowerShell.
Each rule also offers the option of stopping processing more rules when the rule is matched. This setting is
important for messages that match the conditions in multiple mail flow rules (which rule do you want applied to
the message? All? Just one?).
Differences in processing based on message type
There are several types of messages that pass through an organization. The following table shows which
messages types can be processed by mail flow rules.

TYPE OF MESSAGE CAN A RULE BE APPLIED?

Regular messages Messages that contain a single rich text Yes


format (RTF), HTML, or plain text message body or a
multipart or alternative set of message bodies.
TYPE OF MESSAGE CAN A RULE BE APPLIED?

**Office 365 Message Encryption ** Messages encrypted by Rules can always access envelope headers and process
Office 365 Message Encryption in Office 365. For more messages based on conditions that inspect those headers.
information, see Office 365 Message Encryption. For a rule to inspect or modify the contents of an encrypted
message, you need to verify that transport decryption is
enabled (Mandatory or Optional; the default is Optional). For
more information, see Enable or disable transport decryption .
You can also create a rule that automatically decrypts
encrypted messages. For more information, see Define rules
to encrypt or decrypt email messages.

S/MIME encrypted messages Rules can only access envelope headers and process
messages based on conditions that inspect those headers.
Rules with conditions that require inspection of the message's
content, or actions that modify the message's content can't be
processed.

RMS protected messages Messages that had an Active Rules can always access envelope headers and process
Directory Rights Management Services (AD RMS) or Azure messages based on conditions that inspect those headers.
Rights Management (RMS) policy applied. For a rule to inspect or modify the contents of an RMS
protected message, you need to verify that transport
decryption is enabled (Mandatory or Optional; the default is
Optional). For more information, see Enable or disable
transport decryption.

Clear-signed messages Messages that have been signed Yes


but not encrypted.

UM messages Messages that are created or processed by Yes


the Unified Messaging service, such as voice mail, fax, missed
call notifications, and messages created or forwarded by
using Microsoft Outlook Voice Access.

Anonymous messages Messages sent by anonymous Yes


senders.

Read reports Reports that are generated in response to read Yes


receipt requests by senders. Read reports have a message
class of IPM.Note*.MdnRead or IPM.Note*.MdnNotRead .

What else should I know?


The Version or RuleVersion property value for a rule isn't important in Exchange Online Protection.
After you create or modify a mail flow rule, it can take up to 30 minutes for the new or updated rule to be
applied to messages.

For more information


Manage Transport Rules
Transport Rule Predicates
Transport Rule Actions
Using transport rules to inspect message attachments
Email encryption in Office 365
Transport rule procedures
Transport and Inbox rule limits
Use transport rules to configure bulk email filtering
8/21/2018 • 5 minutes to read • Edit Online

You can set company-wide content filters for spam and bulk email using the default spam content-filter policies.
Check out Configure your spam filter policies and Set-HostedContentFilterPolicy on how to set the content filter
policies.
If you want to more options to filter bulk messages, you can create Exchange Transport rules to search for text
patterns or phrases frequently found in bulk emails. Any message containing these characteristics will be marked
as spam. Using these rules can help reduce the amount of unwanted bulk email your organization receives.

NOTE
Before creating the Transport rules documented this topic, we recommend that you first read What's the difference between
junk email and bulk email? and Bulk Complaint Level values.

NOTE
The following procedures mark a message as spam for your entire organization. However, you can add another condition to
apply these rules only to specific recipients in your organization. This way, the aggressive bulk email filtering settings can
apply to a few users who are highly targeted, while the rest of your users (who mostly get the bulk email they signed up for)
aren't impacted.

Create an Exchange Transport rule to filter bulk email messages based on text patterns
1. In the Exchange admin center (EAC ), go to Mail flow > Rules.
2. Click Add and then select Create a new rule.
3. Specify a name for the rule.
4. Click More options. Under Apply this rule if, select The subject or body > subject or body matches
these text patterns.
5. In the specify words or phrases dialog box, add the following regular expressions commonly found in bulk
emails, one at a time, and click ok when you're done:
If you are unable to view the content of this email, please
\>(safe )?unsubscribe( here)?\</a\>
If you do not wish to receive further communications like this, please
\<img height="?1"? width="?1"? src=.?http://
To stop receiving these\s+emails:http://
To unsubscribe from \w+ (e-?letter|e?-?mail|newsletter)
no longer (wish )?(to )?(be sent|receive) \w+ email
If you are unable to view the content of this email, please click here
To ensure you receive (your daily deals|our e-?mails), add
If you no longer wish to receive these emails
to change your (subscription preferences|preferences or unsubscribe)
click (here to|the) unsubscribe
Notes:
The above list isn't an exhaustive set of regular expressions found in bulk emails; more can be added or
removed as needed. However, it's a good starting point.
The search for words or text patterns in the subject or other header fields in the message occurs after the
message has been decoded from the MIME content transfer encoding method that was used to transmit the
binary message between SMTP servers in ASCII text. You can't use conditions or exceptions to search for
the raw (typically, Base64) encoded values of the subject or other header fields in messages.
6. Under Do the following, select Modify the message properties > set the spam confidence level
(SCL ).
7. In the specify SCL dialog box, set the SCL to 5, 6, or 9, and click ok.
Setting the SCL to 5 or 6 takes the Spam action, while setting the SCL to 9 takes the High confidence
spam action, as configured in the content filter policy. The service will perform the action set in the content
filter policy. The default action is to deliver the message to the recipients' Junk Email folder, but different
actions can be configured as described in Configure your spam filter policies.

NOTE
If your configured action is to quarantine the message rather than send it to the recipients' Junk Email folder, the
message will be sent to the administrator quarantine as a transport rule match, and it will not be available in the end
user spam quarantine or via end-user spam notifications.

For more information about SCL values in the service, see Spam confidence levels.
8. Save the rule.
Create an Exchange Transport rule to filter bulk email messages based on phrases
1. In the EAC, go to Mail flow > Rules.
2. Click Add and then select Create a new rule.
3. Specify a name for the rule.
4. Click More options. Under Apply this rule if, select The subject or body > subject or body includes
any of these words.
5. In the specify words or phrases dialog box, add the following phrases commonly found in bulk emails, one
at a time, and click ok when you're done:
to change your preferences or unsubscribe
Modify email preferences or unsubscribe
This is a promotional email
You are receiving this email because you requested a subscription
click here to unsubscribe
You have received this email because you are subscribed
If you no longer wish to receive our email newsletter
to unsubscribe from this newsletter
If you have trouble viewing this email
This is an advertisement
you would like to unsubscribe or change your
view this email as a webpage
You are receiving this email because you are subscribed
Note: Once again, this list isn't an exhaustive set of phrases found in bulk emails; more can be added or
removed as needed. However, it's a good starting point.
6. Under Do the following, select Modify the message properties > set the spam confidence level
(SCL ).
7. In the specify SCL dialog box, set the SCL to 5, 6, or 9, and click ok.
Setting the SCL to 5 or 6 takes the Spam action, while setting the SCL to 9 takes the High confidence
spam action, as configured in the content filter policy. The service will perform the action set in the content
filter policy. The default action is to deliver the message to the recipients' Junk Email folder, but different
actions can be configured as described in Configure your spam filter policies.

NOTE
If your configured action is to quarantine the message rather than send it to the recipients' Junk Email folder, the
message will be sent to the administrator quarantine as a transport rule match, and it will not be available in the end
user spam quarantine or via end-user spam notifications.

For more information about SCL values in the service, see Spam confidence levels.
8. Save the rule.

For more information


What's the difference between junk email and bulk email?
Bulk Complaint Level values
Configure your spam filter policies
Advanced spam filtering options
Use mail flow rules to see what your users are
reporting to Microsoft
8/21/2018 • 2 minutes to read • Edit Online

There are multiple ways you can send false positive and false negative messages to Microsoft for analysis. As an
administrator, you can use mail flow rules to see what your users are reporting to Microsoft as spam, non-spam,
and phishing scams. For more information, see Submit spam, non-spam, and phishing scam messages to
Microsoft for analysis. Conversely, you can create an Exchange Transport rule to prevent your users from sending
email messages to Microsoft for analysis and use them in your own security processes.

What do you need to know before you begin?


Estimated time to complete: 5 minutes
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Transport rules" entry in the Messaging policy and compliance permissions topic
and the "Outlook Web App mailbox policies" entry in the Clients and mobile devices permissions topic.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard shortcuts
in the Exchange admin center.

Use the EAC to create a mail flow rule to view users' manual junk,
phishing, and not junk reports
1. In the EAC, navigate to Mail flow > Rules.
2. Click and then select Create a new rule.
3. Give the rule a name and then click More options.
4. Under Apply this rule if, select The recipient and then choose address includes any of these words.
5. In the specify words or phrases box, do the following:
Type abuse@messaging.microsoft.com and then click , and then type junk@office365.microsoft.com and
then click . These email addresses are used to submit false negative messages to Microsoft.
Type phish@office365.microsoft.com and then click . This email address is used to submit missed
phishing messages to Microsoft.
Type false_positive@messaging.microsoft.com and then click , and then type
not_junk@office365.microsoft.com and then click . These email addresses are used to submit false
positive messages to Microsoft.
Click ok.
6. Under Do the following, select Bcc the message to... and then and then select the mailboxes where you'd
like to receive the messages.
7. If you'd like, you can make selections to audit the rule, test the rule, activate the rule during a specific time
period, and other selections. We recommend testing the rule for a period before you enforce it. See
Procedures for mail flow rules.
8. Click the save button to save the rule. It appears in your list of rules.
After you create and enforce the rule, any messages that are sent from your organization to specified email
addresses will be copied to the specified mailbox.
Reducing malware threats through file attachment
blocking in Exchange Online Protection
6/26/2018 • 2 minutes to read • Edit Online

Most malware that enters an environment through email does so using an executable payload attached to an email
message. To reduce your risk from malware that may not be detected by Exchange Online Protection, you should
enable file attachment blocking.
File attachment blocking covers file types and file name extensions, and is useful to broadly block any email with
attachments. For example, following a malware outbreak, a company could apply this rule with a time limit
included so that everyone affected can get back to sending attachments after a specified length of time. The
following procedure explains how to reduce malware threats through file attachment blocking.

Reducing malware threats through file attachment blocking


To create a rule to block attachments that contain executable content in Exchange Online Protection, follow these
steps:
1. Sign in to the Exchange Admin Center.
2. Click Mail flow. Click Rules. Click New (+), and then click Create a new rule.
3. In the Name box, specify a name for the rule, and then click More options.
4. Under Apply this rule if, point to Any attachment, and then select has executable content near the
bottom of the page.
5. Under Do the following, point to Block the message, and then select the action that you want.
6. Click Save. Your attachment blocking rule is now in force.

For more information


For more information, see Using transport rules to inspect message attachments.
Reporting and message trace in Exchange Online
Protection
6/26/2018 • 3 minutes to read • Edit Online

Microsoft Exchange Online Protection (EOP ) offers many different reports that can help you determine the overall
status and health of your organization. There are also tools to help you troubleshoot specific events (such as a
message not arriving to its intended recipients), and auditing reports to aid with compliance requirements.

Usage reports
Office 365 groups activity View information about the number of Office 365 groups that are created and used.
Email activity View information about the number of messages sent, received and read in your whole
organization, and by specific users.
Email app usage View information about the email apps that are used. This include the total number of
connections for each app, and the versions of Outlook that are connecting.
Mailbox usage View information about storage used, quota consumption, item count, and last activity (send or
read activity) for mailboxes.
See the following resources for more information:
Office 365 Reports in the admin center - Office 365 groups
Office 365 Reports in the Admin Center - Email activity
Office 365 Reports in the Admin Center - Email apps usage
Office 365 Reports in the Admin Center - Mailbox usage

Security & compliance reports in the Office 365 admin center


These enhanced reports provide an interactive reporting experience for EOP admins, which includes summary
information, and the ability to drill down for more details.
Advanced Threat Protection (ATP ) View information about safe links and safe attachments that are part of ATP.
EOP View information about malware detections, spoofed mail, spam detections, and mail flow to and from your
organization.
View reports for Advanced Threat Protection and Exchange Online Protection
##Custom reports using Microsoft Graph
Programmatically create reports that are available in the Office 365 admin center by using Microsoft Graph See
the subtopics of Working with Office 365 usage reports in Microsoft Graph
##Custom reports using reporting web services
Programmatically create reports from the available Exchange Online Protection PowerShell reporting cmdlets by
using REST/ODATA2 query filtering.
See Office 365 Reporting Web Services
##Message trace
Follows email messages as they travel through EOP. You can determine if an email message was received, rejected,
deferred, or delivered by the service. It also shows what actions were taken on the message before it reached its
final status.
You can use this information to efficiently answer your user's questions, troubleshoot mail flow issues, validate
policy changes, and alleviates the need to contact technical support for assistance.
See Trace an Email Message

Audit logging
Tracks specific changes made by admins to your organization. These reports can help you troubleshoot
configuration issues or find the cause of security or compliance-related problems. see Auditing reports in EOP

Reporting and message trace data availability and latency


The following table describes when EOP reporting and message trace data is available and for how long.

Report type Data available for (look back Latency


period)

Mail protection summary reports 90 days Message data aggregation is mostly


complete within 24-48 hours. Some
minor incremental aggregated changes
may occur for up to 5 days.

Mail protection detail reports 90 days For detail data that's less than 7 days
old, data should appear within 24 hours
but may not be complete until 48
hours. Some minor incremental changes
may occur for up to 5 days.
To view detail reports for messages that
are greater than 7 days old, results may
take up to a few hours.

Message trace data 90 days When you run a message trace for
messages that are less than 7 days old,
the messages should appear within 5-
30 minutes.
When you run a message trace for
messages that are greater than 7 days
old, results may take up to a few hours.

NOTE
Data availability and latency is the same whether requested via the Office 365 admin center or remote PowerShell.
Search for and delete messages - Admin help
8/21/2018 • 5 minutes to read • Edit Online

Administrators can use the Search-Mailbox cmdlet to search user mailboxes and then delete messages from a
mailbox.
To search and delete messages in one step, run the Search-Mailbox cmdlet with the DeleteContent switch.
However, when you do this, you can't preview search results or generate a log of messages that will be returned by
the search, and you may inadvertently delete messages that you didn't intend to. To preview a log of the messages
found in the search before they're deleted, run the Search-Mailbox cmdlet with the LogOnly switch.
As an additional safeguard, you can first copy the messages to another mailbox by using the TargetMailbox and
TargetFolder parameters. By doing this, you retain a copy of the deleted messages in case you need to access them
again.

Before you begin


Estimated time to complete: 10 minutes. The actual time may vary depending on the size of the mailbox and
the search query.
You can't use the Exchange admin center (EAC ) to perform these procedures. You must use the Shell.
You need to be assigned both of the following management roles to search for and delete messages in
users' mailboxes:
Mailbox Search- This role allows you to search for messages across multiple mailboxes in your
organization. Administrators aren't assigned this role by default. To assign yourself this role so that
you can search mailboxes, add yourself as a member of the Discovery Management role group. See
Add a User to the Discovery Management Role Group.
Mailbox Import Export - This role allows you to delete messages from a user's mailbox. By default,
this role isn't assigned to any role group. To delete messages from users' mailboxes, you can add the
Mailbox Import Export role to the Organization Management role group. For more information, see
the "Add a role to a role group" section in Manage Role Groups .
If the mailbox from which you want to delete messages has single item recovery enabled, you must first
disable the feature. For more information, see Enable or disable single item recovery for a mailbox.
If the mailbox from which you want to delete messages is placed on hold, we recommend that you check
with your records management or legal department before removing the hold and deleting the mailbox
content. After you obtain approval, follow the steps listed in the topic Clean Up the Recoverable Items
Folder.
You can search a maximum of 10,000 mailboxes using the Search-Mailbox cmdlet. If you're an Exchange
Online organization and have more than 10,000 mailboxes, you can use the Compliance Search feature (or
the corresponding New-ComplianceSearch cmdlet) to search an unlimited number of mailboxes. Then
you can use the New-ComplianceSearchAction cmdlet to delete the messages returned by a compliance
search. For more information, see Search for and delete email messages from your Office 365 organization.
If you include a search query (by using the SearchQuery parameter), the Search-Mailbox cmdlet will
return a maximum of 10,000 items in the search results. Therefore if you include a search query, you might
have to run the Search-Mailbox command multiple times to delete more than 10,000 items.
The user's archive mailbox will also be searched when you run the Search-Mailbox cmdlet. Similarly, items
in the primary archive mailbox will be deleted when you use the Search-Mailbox cmdlet with the
DeleteContent switch. To prevent this, you can include the DoNotIncludeArchive switch. Also, we
recommend that you don't use the DeleteContent switch to delete messages in Exchange Online mailboxes
that have auto-expanding archiving enabled because unexpected data loss may occur.

Search messages and log the search results


This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field and logs the search results in the SearchAndDeleteLog folder of the administrator's mailbox.
Messages aren't copied to or deleted from the target mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -TargetMailbox


administrator -TargetFolder "SearchAndDeleteLog" -LogOnly -LogLevel Full

This example searches all mailboxes in the organization for messages that have any type of attached file that
contains the word "Trojan" in the filename and sends a log message to the administrator's mailbox.

Get-Mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery attachment:trojan* -TargetMailbox


administrator -TargetFolder "SearchAndDeleteLog" -LogOnly -LogLevel Full

For detailed syntax and parameter information, see Search-Mailbox.

Search and delete messages


This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field and deletes the messages from the source mailbox without copying the search results to another
folder. As previously explained, you need to be assigned the Mailbox Import Export management role to delete
messages from a user's mailbox.

IMPORTANT
When you use the Search-Mailbox cmdlet with the DeleteContent switch, messages are permanently deleted from the
source mailbox. Before you permanently delete messages, we recommend that you either use the LogOnly switch to
generate a log of the messages found in the search before they're deleted or copy the messages to another mailbox before
deleting them from the source mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -DeleteContent

This example searches April Stewart's mailbox for messages that contain the phrase "Your bank statement" in the
Subject field, copies the search results to the folder AprilStewart-DeletedMessages in the mailbox BackupMailbox,
and deletes the messages from April's mailbox.

Search-Mailbox -Identity "April Stewart" -SearchQuery 'Subject:"Your bank statement"' -TargetMailbox


"BackupMailbox" -TargetFolder "AprilStewart-DeletedMessages" -LogLevel Full -DeleteContent

This example searches all mailboxes in the organization for messages with the subject line "Download this file", and
then permanently deletes them.

Get-Mailbox -ResultSize unlimited | Search-Mailbox -SearchQuery 'Subject:"Download this file"' -DeleteContent


For detailed syntax and parameter information, see Search-Mailbox.

Using the -LogLevel Full parameter


In some of the previous examples, the LogLevel parameter, with the Full value is used to log detailed information
about the results returned by the Search-Mailbox cmdlet. When you included this parameter, an email message is
created and sent to the mailbox specified by the TargetMailbox parameter. The log file (which is a CSV -formatted
file named Search Results.csv) is attached to this email message, and will be located in the folder specified by the
TargetFolder parameter. The log file contains a row for each message that's included in the search results when you
run the Search-Mailbox cmdlet.
Mail flow intelligence in Office 365
8/21/2018 • 6 minutes to read • Edit Online

Typically, you use a connector to route messages from your Office 365 organization to your on-premises
messaging environment. You might also use a connector to route messages from Office 365 to a partner
organization. When Office 365 can't deliver these messages via the connector, they're queued in Office 365. Office
365 will continue to retry delivery for each message for 48 hours. After 48 hours, the queued message will expire,
and the message will be returned to the original sender in a non-delivery report (also known as an NDR or bounce
message).
Office 365 generates an error when a message can't be delivered by using a connector. The most common errors
and their solutions are described in this topic. Collectively, queuing and notification errors for undeliverable
messages sent via connectors is known as mailflow intelligence.
Contents
Error code: 450 4.4.312 DNS query failed
Error code: 450 4.4.315 Connection timed out
Error code: 450 4.4.316 Connection refused
Error code: 450 4.4.317 Cannot connect to remote server
Error code: 450 4.4.318 Connection was closed abruptly
Error code: 450 4.7.320 Certificate validation failed

Error code: 450 4.4.312 DNS query failed


Typically, this error means Office 365 tried to connect to the smart host that's specified in the connector, but the
DNS query to find the smart host IP addresses failed. The possible causes for this error are:
There's an issue with your domain's DNS hosting service (the party that maintains the authoritative name
servers for your domain).
Your domain has recently expired, so the MX record can't be retrieved.
Your domain's MX record has recently changed, and the Office 365 DNS servers still have previously cached
DNS information for your domain.
You need to fix the DNS issue by working with your DNS hosting service.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Error code: 450 4.4.315 Connection timed out


Typically, this means Office 365 can't connect to the destination messaging server. The error details will explain the
problem. For example:
Your on-premises messaging server is down.
There's an error in the connector's smart host settings, so Office 365 is trying to connect to the wrong IP
address.
Find out which scenario applies to you, and make the necessary corrections. For example, if mail flow has been
working correctly, and you haven't changed the connector settings, you need to check your on-premises messaging
environment to see if the server is down, or if there have been any changes to your network infrastructure (for
example, you've changed Internet service providers, so you now have different IP addresses).
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Error code: 450 4.4.316 Connection refused


Typically, this error means Office 365 encountered a connection error when it tried to connect to the destination
messaging server. A likely cause for this error is your firewall is blocking connections from Office 365 IP addresses.
Or, this error might be by design if you've completely migrated your on-premises messaging system to Office 365
and shut down your on-premises messaging environment..
If you have mailboxes in your on-premises environment, you need to modify your firewall settings to allow
connections from Office 365 IP addresses on TCP port 25 to your on-premises messaging servers. For a list
of the Office 365 IP addresses, see Office 365 URLs and IP address ranges.
If no more messages should be delivered to your on-premises environment, click Fix now in the alert so
Office 365 can immediately reject the messages with invalid recipients. This will reduce the risk of exceeding
your organization's quota for invalid recipients, which could impact normal message delivery. Or, you can
use the following instructions to manually fix the issue:
Disable or delete the connector from Office 365 to your on-premises environment: Office 365 admin
center > Admin centers > Exchange > Mail flow > Connectors > select the connector with the
From value Office 365 and the To value Your organization's email server. Delete the connector by
clicking Delete , or disable the connector by clicking Edit and unchecking Turn it on.
Change the accepted domain in Office 365 that's associated with your on-premises messaging
environment from Internal Relay to Authoritative. For instructions, see Manage Accepted
Domains in Exchange Online.
Note: Typically, these changes take between 30 minutes and one hour to take effect. After one hour,
verify that you no longer receive the error.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Error code: 450 4.4.317 Cannot connect to remote server


Typically, this error means Office 365 connected to the destination messaging server, but the server responded
with an immediate error, or doesn't meet the connection requirements. The error details will explain the problem.
For example:
The destination messaging server responded with a "Service not available" error, which indicates the server
is unable to maintain communication with Office 365.
The connector is configured to require TLS, but the destination messaging server doesn't support TLS.
Verify the TLS settings and certificates on your on-premises messaging servers, and the TLS settings on the
connector.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Error code: 450 4.4.318 Connection was closed abruptly


Typically, this error means Office 365 is having difficulty communicating with your on-premises messaging
environment, so the connection was dropped. The possible causes for this error are:
Your firewall uses SMTP packet examination rules, and those rules aren't working correctly.
Your on-premises messaging server isn't working correctly (for example, service hangs, crashes, or low
system resources), which is causing the server to time out and close the connection to Office 365.
There are network issues between your on-premises environment and Office 365. If the problem persists,
contact your network team to troubleshoot the issue.
Find out which scenario applies to you, and make the necessary corrections.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Error code: 450 4.7.320 Certificate validation failed


Typically, this error means Office 365 encountered an error while trying to validate the certificate of the destination
messaging server. The error details will explain the error. For example:
Certificate expired
Certificate subject mismatch
Certificate is no longer valid
Please fix the certificate or the connector so that queued messages in Office 365can be delivered.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.

Other error codes


Office 365 is having difficulty delivering messages to your on-premises or partner messaging server. Use the
Destination server information in the error to examine the issue in your environment, or modify the connector if
there's a configuration error.
If the error is from your partner organization (for example, a 3rd party cloud service provider), you need to contact
your partner to fix the issue.
Place a mailbox on Litigation Hold
9/26/2018 • 7 minutes to read • Edit Online

Place a mailbox on Litigation Hold to preserve all mailbox content, including deleted items and original versions of
modified items. When you place a user' mailbox on Litigation Hold, content in the user's archive mailbox (if it's
enabled) is also placed on hold. Deleted and modified items are preserved for a specified period, or until you
remove the mailbox from Litigation Hold. All such mailbox items are returned in an In-Place eDiscovery search.

IMPORTANT
Litigation Hold preserves items in the Recoverable Items folder in the user's mailbox. Depending on number and size of items
deleted or modified, the size of the Recoverable Items folder of the mailbox may increase quickly. The Recoverable Items folder
is configured with a high quota by default. In Exchange Online, this quota is automatically increased when you place a mailbox
on Litigation Hold. In Exchange Server 2013, we recommend that you monitor mailboxes that are placed on Litigation Hold
on a weekly basis to ensure they don't reach the limits of the Recoverable Items quotas.

What do you need to know before you begin?


Estimated time to complete: 5 minutes
The Litigation Hold setting may take up to 60 minutes to take effect.
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "In-Place Hold" entry in the Messaging policy and compliance permissions
topic.
To place an Exchange Online mailbox on Litigation Hold, it must be assigned an Exchange Online (Plan 2)
license. If a mailbox is assigned an Exchange Online (Plan 1) license, you would have to assign it a separate
Exchange Online Archiving license to place it on hold.
As previously explained, when you place a Litigation Hold on a user's mailbox, content in the user's archive
mailbox is also placed on hold. If you place a Litigation Hold on an on-premises primary mailbox in an
Exchange hybrid deployment, the cloud-based archive mailbox (if enabled) is also placed on hold.
In Exchange Online, the quota for the Recoverable Items folder is automatically increased to 100 GB when
you place a mailbox on Litigation Hold. The default size of this folder is 30 GB.
Litigation Hold preserves deleted items and also preserves original versions of modified items until the hold
is removed. You can optionally specify a hold duration, which preserves a mailbox item for the specified
duration period. If you specify a hold duration period, it's calculated from the date a message is received or a
mailbox item is created. To preserve items that meet your specified criteria, use an In-Place Hold to create a
query-based hold. For details, see Create or Remove an In-Place Hold.
To use the Shell to place an Exchange Online mailbox on hold, you have to use Exchange Online PowerShell.
For more information, see Connect to Exchange Online Using Remote PowerShell.
Placing a Litigation Hold on a public folder mailbox isn't supported. You have to use In-Place Hold to place a
hold on public folders.

Use the EAC to place a mailbox on Litigation Hold


1. Go to Recipients > Mailboxes.
2. In the list of user mailboxes, click the mailbox that you want to place on Litigation Hold, and then click Edit
.
3. On the mailbox properties page, click Mailbox features.
4. Under Litigation hold: Disabled, click Enable to place the mailbox on Litigation Hold.
5. On the Litigation Hold page, enter the following optional information:
Litigation hold duration (days) Use this box to specify how long mailbox items are held when the mailbox
is placed on Litigation Hold. The duration is calculated from the date a mailbox item is received or created. If
you leave this box blank, items are held indefinitely or until the hold is removed. Use days to specify the
duration.
Note Use this box to inform the user their mailbox is on Litigation Hold. The note will appear in the user's
mailbox if they're using Outlook 2010 or later.
URL Use this box to direct the user to a website for more information about Litigation Hold. This URL
appears in the user's mailbox if they are using Outlook 2010 or later.
6. Click Save on the Litigation Hold page, and then click Save on the mailbox properties page.

Use the Shell to place a mailbox on Litigation Hold indefinitely


This example places the mailbox bsuneja@contoso.com on Litigation Hold. Items in the mailbox are held
indefinitely or until the hold is removed.

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $true

NOTE
When you place a mailbox on Litigation Hold indefinitely (by not specifying a duration period), the value for the
LitigationHoldDuration property mailbox is set to Unlimited .

Use the Shell to place a mailbox on Litigation Hold and preserve items
for a specified duration
This example places the mailbox bsuneja@contoso.com on Litigation Hold and preserves items for 2555 days
(approximately 7 years).

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $true -LitigationHoldDuration 2555

Use the Shell to place all mailboxes on Litigation Hold for a specified
duration
Your organization may require that all mailbox data be preserved for a specific period of time. Before you place all
mailboxes in an organization on Litigation Hold, consider the following:
This example places all user mailboxes in the organization on Litigation Hold for one year (365 days).

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | Set-Mailbox -


LitigationHoldEnabled $true -LitigationHoldDuration 365
The example uses the Get-Mailbox cmdlet to retrieve all mailboxes in the organization, specifies a recipient filter to
include all user mailboxes, and then pipes the list of mailboxes to the Set-Mailbox cmdlet to enable the Litigation
Hold and hold duration.
To place all user mailboxes on an indefinite hold, run the previous command but don't include the
LitigationHoldDuration parameter.
See the More information section for examples of using other recipient properties in a filter to include or exclude
one or more mailboxes.

Use the Shell to remove a mailbox from Litigation Hold


This example removes the mailbox bsuneja@contoso.com from Litigation Hold.

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $false

How do you know this worked?


To verify that you have successfully placed a mailbox on Litigation Hold, do the one of the following:
In the EAC:
1. Go to Recipients > Mailboxes.
2. In the list of user mailboxes, click the mailbox that you want to verify Litigation Hold settings for, and then
click Edit .
3. On the mailbox properties page, click Mailbox features.
4. Under Litigation hold, verify that hold is enabled.
5. Click View details to verify when the mailbox was placed on Litigation Hold and by whom. You can also
verify or change the values in the optional Litigation hold duration (days), Note, and URL boxes.
In the Shell, run one of the following commands:

Get-Mailbox <name of mailbox> | FL LitigationHold*

or

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | FL


Name,LitigationHold*

If a mailbox is placed on Litigation Hold indefinitely, the value for the LitigationHoldDuration property
mailbox is set to Unlimited .

More information
If your organization requires that all mailbox data has to preserved for a specific period of time, consider the
following before you place all mailboxes in an organization on Litigation Hold.
When you use the previous command to place a hold on all mailboxes in an organization (or a subset
of mailboxes matching a specified recipient filter) only mailboxes that exist at the time that you run
the command are placed on hold. If you create new mailboxes later, you have to run the command
again to place the new mailboxes on hold. If you create new mailboxes often, you can run the
command as a scheduled task as frequently as required.
Placing all mailboxes on Litigation Hold can significantly impact mailbox sizes. In an Exchange Server
2013 organization, plan for adequate storage to meet your organization's preservation requirements.
The Recoverable Items folder has its own storage limit, so items in the folder don't count towards the
mailbox storage limit. As previously explained, preserving mailbox data for a long period of time will
result in growth of the Recoverable Items folder in a user's mailbox and archive. To accommodate for
this increase in Exchange Online, the quota for the Recoverable Items folder is automatically
increased from 30 GB to 100 GB when you place a mailbox on Litigation Hold.
In Exchange Server 2013, the default storage limit for the Recoverable Items folder is also 30 GB. We
recommend that you periodically monitor the size of this folder to ensure it doesn't reach the limit.
For more information, see Recoverable Items Folder.
The previous command to place a hold on all mailboxes uses a recipient filter that returns all user mailboxes.
You can use other recipient properties to return a list of specific mailboxes that you can then pipe to the Set-
Mailbox cmdlet to place a Litigation Hold on those mailboxes.
Here are some examples of using the Get-Mailbox and Get-Recipient cmdlets to return a subset of
mailboxes based on common user or mailbox properties. These examples assume that relevant mailbox
properties (such as CustomAttributeN or Department) have been populated.

Get-Mailbox -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'CustomAttribute15 -eq


"OneYearLitigationHold"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'Department -eq "HR"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'PostalCode -eq "98052"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'StateOrProvince -eq "WA"'

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -ne "DiscoveryMailbox"}

You can use other user mailbox properties in a filter to include or exclude mailboxes. For details, see
Filterable Properties for the -Filter Parameter.
Place a mailbox on Litigation Hold
9/26/2018 • 7 minutes to read • Edit Online

Place a mailbox on Litigation Hold to preserve all mailbox content, including deleted items and original versions of
modified items. When you place a user' mailbox on Litigation Hold, content in the user's archive mailbox (if it's
enabled) is also placed on hold. Deleted and modified items are preserved for a specified period, or until you
remove the mailbox from Litigation Hold. All such mailbox items are returned in an In-Place eDiscovery search.

IMPORTANT
Litigation Hold preserves items in the Recoverable Items folder in the user's mailbox. Depending on number and size of items
deleted or modified, the size of the Recoverable Items folder of the mailbox may increase quickly. The Recoverable Items
folder is configured with a high quota by default. In Exchange Online, this quota is automatically increased when you place a
mailbox on Litigation Hold. In Exchange Server 2013, we recommend that you monitor mailboxes that are placed on
Litigation Hold on a weekly basis to ensure they don't reach the limits of the Recoverable Items quotas.

What do you need to know before you begin?


Estimated time to complete: 5 minutes
The Litigation Hold setting may take up to 60 minutes to take effect.
You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "In-Place Hold" entry in the Messaging policy and compliance permissions
topic.
To place an Exchange Online mailbox on Litigation Hold, it must be assigned an Exchange Online (Plan 2)
license. If a mailbox is assigned an Exchange Online (Plan 1) license, you would have to assign it a separate
Exchange Online Archiving license to place it on hold.
As previously explained, when you place a Litigation Hold on a user's mailbox, content in the user's archive
mailbox is also placed on hold. If you place a Litigation Hold on an on-premises primary mailbox in an
Exchange hybrid deployment, the cloud-based archive mailbox (if enabled) is also placed on hold.
In Exchange Online, the quota for the Recoverable Items folder is automatically increased to 100 GB when
you place a mailbox on Litigation Hold. The default size of this folder is 30 GB.
Litigation Hold preserves deleted items and also preserves original versions of modified items until the hold
is removed. You can optionally specify a hold duration, which preserves a mailbox item for the specified
duration period. If you specify a hold duration period, it's calculated from the date a message is received or a
mailbox item is created. To preserve items that meet your specified criteria, use an In-Place Hold to create a
query-based hold. For details, see Create or Remove an In-Place Hold.
To use the Shell to place an Exchange Online mailbox on hold, you have to use Exchange Online PowerShell.
For more information, see Connect to Exchange Online Using Remote PowerShell.
Placing a Litigation Hold on a public folder mailbox isn't supported. You have to use In-Place Hold to place a
hold on public folders.

Use the EAC to place a mailbox on Litigation Hold


1. Go to Recipients > Mailboxes.
2. In the list of user mailboxes, click the mailbox that you want to place on Litigation Hold, and then click Edit
.
3. On the mailbox properties page, click Mailbox features.
4. Under Litigation hold: Disabled, click Enable to place the mailbox on Litigation Hold.
5. On the Litigation Hold page, enter the following optional information:
Litigation hold duration (days) Use this box to specify how long mailbox items are held when the
mailbox is placed on Litigation Hold. The duration is calculated from the date a mailbox item is received or
created. If you leave this box blank, items are held indefinitely or until the hold is removed. Use days to
specify the duration.
Note Use this box to inform the user their mailbox is on Litigation Hold. The note will appear in the user's
mailbox if they're using Outlook 2010 or later.
URL Use this box to direct the user to a website for more information about Litigation Hold. This URL
appears in the user's mailbox if they are using Outlook 2010 or later.
6. Click Save on the Litigation Hold page, and then click Save on the mailbox properties page.

Use the Shell to place a mailbox on Litigation Hold indefinitely


This example places the mailbox bsuneja@contoso.com on Litigation Hold. Items in the mailbox are held
indefinitely or until the hold is removed.

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $true

NOTE
When you place a mailbox on Litigation Hold indefinitely (by not specifying a duration period), the value for the
LitigationHoldDuration property mailbox is set to Unlimited .

Use the Shell to place a mailbox on Litigation Hold and preserve items
for a specified duration
This example places the mailbox bsuneja@contoso.com on Litigation Hold and preserves items for 2555 days
(approximately 7 years).

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $true -LitigationHoldDuration 2555

Use the Shell to place all mailboxes on Litigation Hold for a specified
duration
Your organization may require that all mailbox data be preserved for a specific period of time. Before you place all
mailboxes in an organization on Litigation Hold, consider the following:
This example places all user mailboxes in the organization on Litigation Hold for one year (365 days).

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | Set-Mailbox -


LitigationHoldEnabled $true -LitigationHoldDuration 365
The example uses the Get-Mailbox cmdlet to retrieve all mailboxes in the organization, specifies a recipient filter to
include all user mailboxes, and then pipes the list of mailboxes to the Set-Mailbox cmdlet to enable the Litigation
Hold and hold duration.
To place all user mailboxes on an indefinite hold, run the previous command but don't include the
LitigationHoldDuration parameter.
See the More information section for examples of using other recipient properties in a filter to include or exclude
one or more mailboxes.

Use the Shell to remove a mailbox from Litigation Hold


This example removes the mailbox bsuneja@contoso.com from Litigation Hold.

Set-Mailbox bsuneja@contoso.com -LitigationHoldEnabled $false

How do you know this worked?


To verify that you have successfully placed a mailbox on Litigation Hold, do the one of the following:
In the EAC:
1. Go to Recipients > Mailboxes.
2. In the list of user mailboxes, click the mailbox that you want to verify Litigation Hold settings for, and then
click Edit .
3. On the mailbox properties page, click Mailbox features.
4. Under Litigation hold, verify that hold is enabled.
5. Click View details to verify when the mailbox was placed on Litigation Hold and by whom. You can also
verify or change the values in the optional Litigation hold duration (days), Note, and URL boxes.
In the Shell, run one of the following commands:

Get-Mailbox <name of mailbox> | FL LitigationHold*

or

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} | FL


Name,LitigationHold*

If a mailbox is placed on Litigation Hold indefinitely, the value for the LitigationHoldDuration property
mailbox is set to Unlimited .

More information
If your organization requires that all mailbox data has to preserved for a specific period of time, consider the
following before you place all mailboxes in an organization on Litigation Hold.
When you use the previous command to place a hold on all mailboxes in an organization (or a subset
of mailboxes matching a specified recipient filter) only mailboxes that exist at the time that you run
the command are placed on hold. If you create new mailboxes later, you have to run the command
again to place the new mailboxes on hold. If you create new mailboxes often, you can run the
command as a scheduled task as frequently as required.
Placing all mailboxes on Litigation Hold can significantly impact mailbox sizes. In an Exchange Server
2013 organization, plan for adequate storage to meet your organization's preservation requirements.
The Recoverable Items folder has its own storage limit, so items in the folder don't count towards the
mailbox storage limit. As previously explained, preserving mailbox data for a long period of time will
result in growth of the Recoverable Items folder in a user's mailbox and archive. To accommodate for
this increase in Exchange Online, the quota for the Recoverable Items folder is automatically
increased from 30 GB to 100 GB when you place a mailbox on Litigation Hold.
In Exchange Server 2013, the default storage limit for the Recoverable Items folder is also 30 GB. We
recommend that you periodically monitor the size of this folder to ensure it doesn't reach the limit.
For more information, see Recoverable Items Folder.
The previous command to place a hold on all mailboxes uses a recipient filter that returns all user mailboxes.
You can use other recipient properties to return a list of specific mailboxes that you can then pipe to the Set-
Mailbox cmdlet to place a Litigation Hold on those mailboxes.
Here are some examples of using the Get-Mailbox and Get-Recipient cmdlets to return a subset of
mailboxes based on common user or mailbox properties. These examples assume that relevant mailbox
properties (such as CustomAttributeN or Department) have been populated.

Get-Mailbox -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'CustomAttribute15 -eq


"OneYearLitigationHold"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'Department -eq "HR"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'PostalCode -eq "98052"'

Get-Recipient -RecipientTypeDetails UserMailbox -ResultSize unlimited -Filter 'StateOrProvince -eq "WA"'

Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -ne "DiscoveryMailbox"}

You can use other user mailbox properties in a filter to include or exclude mailboxes. For details, see
Filterable Properties for the -Filter Parameter.
Preserve Bcc and expanded distribution group
recipients for eDiscovery
9/26/2018 • 5 minutes to read • Edit Online

In-Place Hold, Litigation Hold, and Office 365 retention policies (created in the Office 365 Security & Compliance
Center) allow you to preserve mailbox content to meet regulatory compliance and eDiscovery requirements.
Information about recipients directly addressed in the To and Cc fields of a message is included in all messages by
default, but your organization may require the ability to search for and reproduce details about all recipients of a
message. This includes:
Recipients addressed using the Bcc field of a message Bcc recipients are stored in the message in the
sender's mailbox, but not included in headers of the message delivered to recipients.
Expanded distribution group recipients Recipients who receive the message because they're members
of a distribution group to which the message was addressed, either in the To, Cc or Bcc fields.
Exchange Online and Exchange Server 2013 (Cumulative Update 7 and later versions) retain information about
Bcc and expanded distribution group recipients. You can search for this information by using an In-Place
eDiscovery search in the Exchange admin center (EAC ) or a Content Search in the Security & Compliance Center.

How Bcc recipients and expanded distribution group recipients are


preserved
As stated earlier, information about Bcc'ed recipients is stored with the message in the sender's mailbox. This
information is indexed and available to eDiscovery searches and holds.
Information about expanded distribution group recipients is stored with the message after you place a mailbox on
In-Place Hold or Litigation Hold. In Office 365, this information is also stored when an Office 365 retention policy
is applied to a mailbox. Distribution group membership is determined at the time the message is sent. The
expanded recipients list stored with the message is not impacted by changes to membership of the group after the
message is sent.

INFORMATION ABOUT… IS STORED IN… IS STORED BY DEFAULT? IS ACCESSIBLE TO…

To and Cc recipients Message properties in the Yes Sender, recipients, and


sender and recipients' compliance officers
mailboxes.

Bcc recipients Message property in the Yes Sender and compliance


sender's mailbox. officers

Expanded distribution group Message properties in the No. Expanded distribution Compliance officers
recipients sender's mailbox. group recipient information
is stored after a mailbox is
placed on In-Place Hold or
Litigation Hold, or assigned
to an Office 365 retention
policy.

Searching for messages sent to Bcc and expanded distribution group


recipients
When searching for messages sent to a recipient, eDiscovery search results now include messages sent to a
distribution group that the recipient is a member of. The following table shows the scenarios where messages sent
to Bcc and expanded distribution group recipients are returned in eDiscovery searches.
Scenario 1: John is a member of the US -Sales distribution group. This table shows eDiscovery search results when
Bob sends a message to John directly or indirectly via a distribution group.

WHEN YOU SEARCH BOB'S MAILBOX FOR


MESSAGES SENT… AND THE MESSAGE IS SENT WITH… RESULTS INCLUDE MESSAGE?

To:John John on TO Yes

To:John US-Sales on TO Yes

To:US-Sales US-Sales on TO Yes

Cc:John John on CC Yes

Cc:John US-Sales on CC Yes

Cc:US-Sales US-Sales on CC Yes

Scenario 2: Bob sends an email to John (To/Cc) and Jack (Bcc directly, or indirectly via a distribution group). The
table below shows eDiscovery search results.

WHEN YOU SEARCH… FOR MESSAGES SENT… RESULTS INCLUDE MESSAGE? NOTES

Bob's mailbox To/Cc:John Yes Presents an indication that


Jack was Bcc'ed.

Bob's mailbox Bcc:Jack Yes Presents an indication that


Jack was Bcc'ed.

Bob's mailbox Bcc:Jack (via distribution Yes List of members of the


group) Bcc'ed distribution group,
expanded when the message
was sent, is visible in
eDiscovery search preview,
export and logs.

John's mailbox To/Cc:John Yes No indication of Bcc


recipients.

John's mailbox Bcc:Jack (directly or via No Bcc information is not stored


distribution group) in the message delivered to
recipients. You must search
the sender's mailbox.

Jack's mailbox To/Cc:John (directly or via Yes To/Cc information is included


distribution group) in message delivered to all
recipients.
WHEN YOU SEARCH… FOR MESSAGES SENT… RESULTS INCLUDE MESSAGE? NOTES

Jack's mailbox Bcc:Jack (directly or via No Bcc information is not stored


distribution group) in the message delivered to
recipients. You must search
the sender's mailbox.

Frequently asked questions


Q. When and where is Bcc recipient information stored?
A. Bcc recipient information is preserved by default in the original message in sender's mailbox. If the Bcc recipient
is a distribution group, distribution group membership is only expanded if the sender's mailbox is on hold or
assigned to an Office 365 retention policy.
Q. When and where is the list of expanded distribution group recipients stored?
A. Group membership is expanded at the time the message is sent. The list of expanded distribution group
members is stored in the original message in the sender's mailbox. The sender's mailbox must be on In-Place Hold,
Litigation Hold, or assigned to an Office 365 retention policy.
Q. Can the To/Cc recipients see which recipients were Bcc'ed?
A. No. This information is not included in message headers, and isn't visible to To/Cc recipients. The sender can see
the Bcc field stored in the original message stored in their mailbox. Compliance officers can see this information
when searching the sender's mailbox.
Q. How can I ensure expanded distribution group recipients are always preserved?
A. To ensure expanded distribution group members are always preserved with a message, Place all mailboxes on
hold or create an organization-wide Office 365 retention policy.
Q. Which types of groups are supported?
A. Distribution groups, mail-enabled security groups, and dynamic distribution groups are supported.
Q. Is there a limit on the number of distribution group recipients that are expanded and stored in the
message?
A. Up to 10,000 members of a distribution group is preserved.
Q. Are nested distribution groups supported?
A. Yes, 25 levels of nested distribution groups are expanded.
Q. Where is the Bcc and expanded distribution group recipient information visible?
A. Bcc and expanded distribution group recipients information is visible to Compliance officers when performing
an eDiscovery search. Bcc and expanded distribution group recipients are included in search results copied to a
Discovery mailbox or exported to a PST file and in the eDiscovery log included in search results. Bcc recipient
information is also available in search preview.
Q. What happens if a member of a distribution group is hidden from the organization's global address
list (GAL )?
A. There's no impact. If recipients are hidden from the GAL, they're still included in the list of recipients for the
expanded distribution group.
Put an In-Place Hold on a soft-deleted mailbox in
Exchange Online
9/26/2018 • 3 minutes to read • Edit Online

Learn how to create an In-Place Hold for a soft-deleted mailbox to make it inactive and preserve its contents. Then
you can use Microsoft eDiscovery tools to search the inactive mailbox.

NOTE
We've postponed the July 1, 2017 deadline for creating new In-Place Holds in Exchange Online (in Office 365 and Exchange
Online standalone plans). But later this year or early next year, you won't be able to create new In-Place Holds in Exchange
Online. As an alternative to using In-Place Holds, you can use eDiscovery cases or retention policies in the Office 365 Security
& Compliance Center. After we decommission new In-Place Holds, you'll still be able to modify existing In-Place Holds, and
creating new In-Place Holds in Exchange Server 2013 and Exchange hybrid deployments will still be supported. And, you'll still
be able to place mailboxes on Litigation Hold.

You might have a situation where a person has left your organization, and their corresponding user account and
mailbox were deleted. Afterwards, you realize there's information in the mailbox that needs to be preserved. What
can you do? If the deleted mailbox retention period hasn't expired, you can put an In-Place Hold on the deleted
mailbox (called a soft-deleted mailbox ) and make it an inactive mailbox. An inactive mailbox is used to preserve a
former employee's email after he or she leaves your organization. The contents of an inactive mailbox are
preserved for the duration of the In-Place Hold that was is placed on the soft-deleted mailbox when it was made
inactive. After the mailbox is made inactive, you can search the mailbox by using In-Place eDiscovery in Exchange
Online, Content Search in the Office 365 Security & Compliance Center, or the eDiscovery Center in SharePoint
Online.

NOTE
In Exchange Online, a soft-deleted mailbox is a mailbox that's been deleted but can be recovered within a specific retention
period. The soft-deleted mailbox retention period in Exchange Online is 30 days. This means that the mailbox can be
recovered (or made an inactive mailbox) within 30 days of being deleted. After 30 days, a soft-deleted mailbox is marked for
permanent deletion and can't be recovered or made inactive.

Before you begin


You have to use the New-MailboxSearch cmdlet in Windows PowerShell to put an In-Place Hold on a
soft-deleted mailbox. You can't use the Exchange admin center (EAC ) or the eDiscovery Center in SharePoint
Online.
To learn how to use Windows PowerShell to connect to Exchange Online, see Connect to Exchange Online
PowerShell.
Run the following command to get identity information about the soft-deleted mailboxes in your
organization.

Get-Mailbox -SoftDeletedMailbox | FL
Name,WhenSoftDeleted,DistinguishedName,ExchangeGuid,PrimarySmtpAddress
For more information about inactive mailboxes, see Inactive mailboxes in Exchange Online.

Put an In-Place Hold on a soft-deleted mailbox to make it an inactive


mailbox
Use the New-MailboxSearch cmdlet to make a soft-deleted mailbox an inactive mailbox. For more information,
see New -MailboxSearch.
1. Create a variable that contains the properties of the soft-deleted mailbox.

$SoftDeletedMailbox = Get-Mailbox -SoftDeletedMailbox -Identity <identity of soft-deleted mailbox>

> [!IMPORTANT]
> In the previous command, use the value of the **DistinguishedName** or **ExchangeGuid** property to identify
the soft-deleted mailbox. These properties are unique for each mailbox in your organization, whereas it's
possible that an active mailbox and a soft-deleted mailbox might have the same primary SMTP address.

2. Create an In-Place Hold and place it on the soft-deleted mailbox. In this example, no hold duration is specified.
This means items will be held indefinitely or until the hold is removed from the inactive mailbox.

New-MailboxSearch -Name "InactiveMailboxHold" -SourceMailboxes $SoftDeletedMailbox.DistinguishedName -


InPlaceHoldEnabled $true

You can also specify a hold duration when you create the In-Place Hold. This example holds items in the
inactive mailbox for approximately 7 years.

New-MailboxSearch -Name "InactiveMailboxHold" -SourceMailboxes $SoftDeletedMailbox.DistinguishedName -


InPlaceHoldEnabled $true -ItemHoldPeriod 2777

3. After a few moments, run one of the following commands to verify that the soft-deleted mailbox is an inactive
mailbox.

Get-Mailbox -InactiveMailboxOnly

Or

Get-Mailbox -InactiveMailboxOnly -Identity $SoftDeletedMailbox.DistinguishedName | FL IsInactiveMailbox

More information
After you make a soft-deleted mailbox an inactive mailbox, there are a number of ways you can manage the
mailbox. For more information, see:
Change the hold duration for an inactive mailbox in Exchange Online
Recover an inactive mailbox in Exchange Online
Restore an inactive mailbox in Exchange Online
Remove a hold from an inactive mailbox in Exchange Online
Quarantine
8/21/2018 • 2 minutes to read • Edit Online

The following topics provide information about the hosted quarantine for both Exchange Online and Exchange
Online Protection (EOP ) admins and end users:
Quarantine FAQ - Provides general questions and answers about the quarantine for both admins and end
users
Find and release quarantined messages as an administrator - Describes how admins can find and release
any message that resides in the quarantine in the Exchange admin center (EAC ), and optionally report it as a
false positive (not junk) message to Microsoft.
Find and Release Quarantined Messages (End Users) - Describes how end users can find and release their
own spam-quarantined messages in the spam quarantine user interface, and report them as not junk to
Microsoft.

IMPORTANT
In order to access the end user spam quarantine, end users must have a valid Office 365 user ID and password. EOP
customers protecting on-premises mailboxes must be valid email users created via directory synchronization or the
EAC. For more information about managing users, EOP admins can refer to Manage mail users in EOP. For EOP
standalone customers, we recommend using directory synchronization and enabling Directory Based Edge Blocking;
for more information, see Use Directory Based Edge Blocking to Reject Messages Sent to Invalid Recipients.
Find and release quarantined messages as an
administrator
8/21/2018 • 9 minutes to read • Edit Online

This topic describes how Exchange Online and Exchange Online Protection (EOP ) admins can find, release, and
report on quarantined messages in the Exchange admin center (EAC ). Office 365 directs messages to quarantine
either because they were identified as spam or they matched a transport rule.
Use the Security & Compliance Center instead of the EAC to complete any of these tasks as well as view and
work with messages that were sent to quarantine because they contain malware. For more information, see
Quarantine email messages in Office 365.
Quarantined messages are listed on the quarantine page in EAC. By default, messages are sorted from newest
to oldest on the RECEIVED field. SENDER, SUBJECT, and EXPIRES values are also listed for each message.
You can sort on any of these fields by clicking their headers. If you click a column header a second time, the sort
order reverses. The quarantine page displays a maximum of 500 messages.
You can view a list of all quarantined messages, or you can search for specific messages by specifying filter
criteria (filtering can also help reduce your result set if you have more than 500 messages). After searching for
and locating a specific quarantined message, you can view details about the message. You can also:
Release the message to one or more recipients, and optionally report it as a false positive (not junk)
message to the Microsoft Spam Analysis Team, who will evaluate and analyze the message. Depending
on the results of the analysis, the service-wide spam content filter rules may be adjusted to allow the
message through.
Release the message and allow all future messages from that sender.

What do you need to know before you begin?


You need to be assigned permissions before you can perform this procedure or procedures. To see what
permissions you need, see the "Quarantine" entry in the Feature Permissions in Exchange Online topic.
You can release or report multiple messages at once on the quarantine page. Alternatively you can
create a remote Windows PowerShell script to accomplish this task. Use the Get-QuarantineMessage
cmdlet to search for messages, and the Release-QuarantineMessage cmdlet to release them.
For information about keyboard shortcuts that may apply to the procedures in this topic, see Keyboard
shortcuts in the Exchange admin center.

TIP
Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server,Exchange Online, or Exchange
Online Protection.

Use advanced search to filter and locate quarantined messages


In the Exchange admin center (EAC ), you can filter quarantined items based on several different conditions using
advanced search. You can use these conditions separately or in combination with one another. The search will
provide a list of messages that meet all your filter criteria.
1. In EAC, navigate to Protection > quarantine, and then click Advanced search.
2. In the Advanced search window, select any combination of the following conditions. Select the
associated check box to enable each condition. Wildcards aren't supported.
3. Message ID You can use this parameter to perform a targeted search for a specific message. For
example, if a specific message is sent by, or intended for, a user in your organization, but it never reaches
its destination, you can search for the message using the message trace feature. For details, see Run a
Message Trace and View Results. If you discover that the message was sent to the quarantine, perhaps
because it matched a rule or was identified as spam, you can then easily find this message in the
quarantine by specifying its Message ID. Be sure to include the full Message ID string. This might include
angle brackets (<>).
4. Sender email address Specify the email address of the person who sent the message.
5. Recipient email address Specify the email address of the intended recipient of the message.
6. Subject Specify the subject line text of the message.
7. Received You can select that the message was received by quarantine within the past 24 hours ( Today),
within the past 48 hours ( Last 2 days), within the past week ( Last 7 days), or you can select a custom
time interval during which the message was received by the quarantine.
8. Expires You can select that the message will be deleted from quarantine within the next 24 hours (
Today), within the next 48 hours ( Next 2 days), within the next week ( Next 7 days), or you can select a
custom time interval during which the message will be deleted from quarantine.

IMPORTANT
By default, spam-quarantined messages are kept in quarantine for 15 days, while quarantined messages that
matched a transport rule are kept in the quarantine for 7 days. After this period of time Office 365 deletes the
messages and they are not retrievable. The retention period for quarantined messages that matched a transport
rule is not configurable. However, the retention period for spam-quarantined messages can be lowered via the
Retain spam for (days) setting in your content filter policies. For more information, see Configure your spam
filter policies.

9. Type You can specify whether to search for quarantined messages that have been identified as Spam, or
whether to search for messages that matched a Transport rule.
10. Click OK to start running the advanced search.

NOTE
To clear your search criteria and view all messages in the quarantine, clear all the check boxes in the Advanced
search window, and then click OK.

After searching for messages, the results that match your specified criteria will display in the user interface. A
maximum of 500 messages can be displayed in the EAC.

View details about a specific quarantined message


After locating a specific quarantined message on the quarantine page, you can view details about it.
1. On the quarantine page, select a specific message and a summary of the properties of that message
appear in the details pane on the right side of the screen.
The Message status values are as follows:
Type Denotes whether the message has been identified as Spam or matched a Transport rule.
Expires The date when the message will be deleted from the quarantine.
The Message details values are as follows:
Sender The email address of the person who sent the message.
Subject The subject line text of the message.
Received The date on which the message was received by the quarantine.
Size The size of the message, in kilobytes (KB ), or, if the message size is greater than 999 KBs, in
megabytes (MB ).
View message header Click this link to open the message header dialog box, which lets you view the
message header text. You can also copy the message header text to your clipboard and paste it into the
Message Header Analyzer. Once in the Message Header Analyzer tool, click Analyze headers in order to
retrieve information about the header.

TIP
For information about specific anti-spam message header fields inserted by the service, see Anti-spam message
headers.

Preview email message Click this link to review the text of the message.
2. If you double-click a quarantined message, the Quarantined message window opens and displays the
following information:
Released to A list of all email addresses to whom the message has been released, if any.
Not yet released to A list of all email addresses to whom the message has not been released, if any. You
can click the Release to link in order to release the message; for more information about releasing a
message, see the next section.
Message ID The Internet Message ID (also known as the Client ID ) found in the header of the message.
Click Close to return to the main quarantine pane.

Release messages from quarantine


If you want to release messages to recipients, your options are:
Release a quarantined message and allow future messages from the sender
Release a quarantined message to specific recipients without reporting it as a false positive
Release one or more quarantined messages to all recipients
Release one or more quarantined messages to all recipients and report false positives
Release a quarantined message and allow future messages from the sender
1. In EAC, navigate to Protection > quarantine.
2. Click on a message to select it and then click the Release Message icon as shown in the following screen
shot.
Click Release selected message and allow sender from the drop-down list.
3. The release message and allow sender dialog box opens. Optionally, you can choose to report the
message to Microsoft, then click release and allow. The message will be released to all recipients it's
addressed to and all future messages from this sender will be allowed. However, if this message was
quarantined because of a transport rule or blocked sender, the sender will continue to be blocked for future
messages.
Release a quarantined message to specific recipients without reporting it as a false positive
1. In EAC, navigate to Protection > quarantine.
2. Select a message, click the Release Message icon, and then click Release message to specific
recipients from the drop-down list.
3. In the release message dialog box, select one of the following options:
Release message to all recipients When you select this option, be aware that a message cannot be
released more than once to the same recipient. If a recipient has previously received the message, it will
not be released again to that recipient.
Release message to specified recipients Select the recipient(s) to whom the message can be released.
Because a message can only be released once to each recipient, only recipients to whom it can be released
appear in this list. Multi-selection is supported. After making your recipient selections, click add.
4. Click release.
If you click the Refresh icon to refresh your data, and then double-click the message, you should see that it's
been released to the intended recipients.
Release one or more quarantined messages to all recipients
1. In EAC, navigate to Protection > quarantine.
2. Click on a message to select it, or use the shift key to select multiple messages. Then click the Release
Message icon.
3. Click Release selected message(s) to ALL recipients from the drop-down list.
4. The warning dialog box opens. Read the warning and select Yes if you want to proceed. When you select
this option, be aware that a message cannot be released more than once to the same recipient. If a
recipient has previously received the message, it will not be released again to that recipient.
Release one or more quarantined messages to all recipients and report false positives
1. In EAC, navigate to Protection > quarantine.
2. Click on a message to select it, or use the shift key to select multiple messages. Then click the Release
Message icon.
3. Click Release selected message(s) and report as false positive from the drop-down list.
4. The warning dialog box opens. Read the warning and select Yes if you want to proceed. When you select
this option, be aware that a message cannot be released more than once to the same recipient. If a
recipient has previously received the message, it will not be released again to that recipient.
When you choose this option, the message will be released to all recipients who have not yet received it. If
it's a spam-quarantined message, it will also be reported to the Microsoft Spam Analysis Team, who will
evaluate and analyze the message. Depending on the results of the analysis, the service-wide spam
content filter rules may be adjusted to allow the message through.

TIP
Help ensure that a message isn't marked as spam by following the steps in How to help ensure that a message isn't
marked as spam.

If you click the Refresh icon to refresh your data, and then double-click the message, you should see that it's
been released to the intended recipients.

For more information


Quarantine FAQ
S/MIME for message signing and encryption
8/21/2018 • 4 minutes to read • Edit Online

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method, or more precisely a protocol,
for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.
When you use S/MIME with an email message, it helps the people who receive that message to be certain that
what they see in their inbox is the exact message that started with the sender. It will also help people who receive
messages to be certain that the message came from the specific sender and not from someone pretending to be
the sender. To do this, S/MIME provides for cryptographic security services such as authentication, message
integrity, and non-repudiation of origin (using digital signatures). It also helps enhance privacy and data security
(using encryption) for electronic messaging. For a more complete background about the history and architecture of
S/MIME in the context of email, see Understanding S/MIME.
As an administrator, you can enable S/MIME -based security for your organization if you have mailboxes in either
Exchange 2013 SP1 or Exchange Online, a part of Office 365. Use the guidance in the topics linked here along with
the Exchange Management Shell to set up S/MIME. To use S/MIME in supported versions of Outlook or
ActiveSync, with either Exchange 2013 SP1 or Exchange Online, the users in your organization must have
certificates issued for signing and encryption purposes and data published to your on-premises Active Directory
Domain Service (AD DS ). Your AD DS must be located on computers at a physical location that you control and not
at a remote facility or cloud-based service somewhere on the internet. For more information about AD DS, see
Active Directory Domain Services.

Supported scenarios and technical considerations


If your organization uses either Exchange 2013 SP1 or Exchange Online, you can set up S/MIME to work with any
of the following end points:
Outlook 2010
Outlook 2013
Outlook Web App
Exchange ActiveSync (EAS )
The steps that you follow to set up S/MIME with each of these end points is slightly different depending on which
you choose. Generally, you will need to accomplish the following:
Install a Windows-based Certification Authority and set up a public key infrastructure to issue S/MIME
certificates. Certificates issued by third-party certificate providers are also supported. For details, see Active
Directory Certificate Services Overview.
Publish the user certificate in an on-premises AD DS account in the UserSMIMECertificate and/or
UserCertificate attributes.
For Exchange Online organizations, synchronize the user certificates from AD DS to Azure Active Directory
by using an appropriate version of DirSync. These certificates will then get synchronized from Azure Active
Directory to Exchange Online directory and will be used when encrypting a message to a recipient.
Set up a virtual certificate collection in order to validate S/MIME. This information is used by OWA when
validating the signature of an email and ensuring that it was signed by a trusted certificate.
Set up the Outlook or EAS end point to use S/MIME.
Setup S/MIME with Outlook Web App
Setting up S/MIME for Exchange 2013 SP1 or Exchange Online with Outlook Web App involves the following key
steps:
1. Configure S/MIME settings for Outlook Web App
2. Set up virtual certificate collection to validate S/MIME
3. Sync user certificates to Office 365 for S/MIME This step applies to Exchange Online only.

Related message encryption technologies


As message security becomes more important, administrators need to understand the principles and concepts of
secure messaging. This understanding is especially important because of the growing variety of protection-related
technologies, such as S/MIME, that have become available. To understand more about S/MIME and how it works
in context of email, see Understanding S/MIME. A variety of encryption technologies work together to provide
protection for messages at rest and in-transit. S/MIME can work simultaneously with the following technologies
but is not dependent on them:

Transport Layer Security (TLS ) encrypts the tunnel or the route between email servers in order to help
prevent snooping and eavesdropping.

Secure Sockets Layer (SSL ) encrypts the connection between email clients and Office 365 servers.

BitLocker encrypts the data on a hard drive in a datacenter so that if someone gets unauthorized access, they
can't read it.

S/MIME compared with Office 365 Message Encryption


S/MIME requires a certificate and publishing infrastructure that is often used in business-to-business and
business-to-consumer situations. The user controls the cryptographic keys in S/MIME and can choose whether to
use them for each message they send. Email programs such as Outlook search a trusted root certificate authority
location to perform digital signing and verification of the signature. Office 365 Message Encryption is a policy-
based encryption service that can be configured by an administrator, and not an individual user, to encrypt mail
sent to anyone inside or outside of the organization. It's an online service that's built on Azure Rights Management
(RMS ) and does not rely on a public key infrastructure. Office 365 Message Encryption also provides additional
capabilities, such as the capability to customize the mail with organization's brand. For more information about
Office 365 Message Encryption, see Office 365 Message Encryption.

More information
Outlook Web App
Secure Mail (2000)
S/MIME for message signing and encryption
8/21/2018 • 4 minutes to read • Edit Online

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method, or more precisely a
protocol, for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally
sign them. When you use S/MIME with an email message, it helps the people who receive that message to be
certain that what they see in their inbox is the exact message that started with the sender. It will also help people
who receive messages to be certain that the message came from the specific sender and not from someone
pretending to be the sender. To do this, S/MIME provides for cryptographic security services such as
authentication, message integrity, and non-repudiation of origin (using digital signatures). It also helps enhance
privacy and data security (using encryption) for electronic messaging. For a more complete background about the
history and architecture of S/MIME in the context of email, see Understanding S/MIME.
As an administrator, you can enable S/MIME -based security for your organization if you have mailboxes in either
Exchange 2013 SP1 or Exchange Online, a part of Office 365. Use the guidance in the topics linked here along
with the Exchange Management Shell to set up S/MIME. To use S/MIME in supported versions of Outlook or
ActiveSync, with either Exchange 2013 SP1 or Exchange Online, the users in your organization must have
certificates issued for signing and encryption purposes and data published to your on-premises Active Directory
Domain Service (AD DS ). Your AD DS must be located on computers at a physical location that you control and
not at a remote facility or cloud-based service somewhere on the internet. For more information about AD DS,
see Active Directory Domain Services.

Supported scenarios and technical considerations


If your organization uses either Exchange 2013 SP1 or Exchange Online, you can set up S/MIME to work with any
of the following end points:
Outlook 2010
Outlook 2013
Outlook Web App
Exchange ActiveSync (EAS )
The steps that you follow to set up S/MIME with each of these end points is slightly different depending on which
you choose. Generally, you will need to accomplish the following:
Install a Windows-based Certification Authority and set up a public key infrastructure to issue S/MIME
certificates. Certificates issued by third-party certificate providers are also supported. For details, see Active
Directory Certificate Services Overview.
Publish the user certificate in an on-premises AD DS account in the UserSMIMECertificate and/or
UserCertificate attributes.
For Exchange Online organizations, synchronize the user certificates from AD DS to Azure Active Directory
by using an appropriate version of DirSync. These certificates will then get synchronized from Azure Active
Directory to Exchange Online directory and will be used when encrypting a message to a recipient.
Set up a virtual certificate collection in order to validate S/MIME. This information is used by OWA when
validating the signature of an email and ensuring that it was signed by a trusted certificate.
Set up the Outlook or EAS end point to use S/MIME.
Setup S/MIME with Outlook Web App
Setting up S/MIME for Exchange 2013 SP1 or Exchange Online with Outlook Web App involves the following
key steps:
1. Configure S/MIME settings for Outlook Web App
2. Set up virtual certificate collection to validate S/MIME
3. Sync user certificates to Office 365 for S/MIME This step applies to Exchange Online only.

Related message encryption technologies


As message security becomes more important, administrators need to understand the principles and concepts of
secure messaging. This understanding is especially important because of the growing variety of protection-related
technologies, such as S/MIME, that have become available. To understand more about S/MIME and how it works
in context of email, see Understanding S/MIME. A variety of encryption technologies work together to provide
protection for messages at rest and in-transit. S/MIME can work simultaneously with the following technologies
but is not dependent on them:

Transport Layer Security (TLS ) encrypts the tunnel or the route between email servers in order to help
prevent snooping and eavesdropping.

Secure Sockets Layer (SSL ) encrypts the connection between email clients and Office 365 servers.

BitLocker encrypts the data on a hard drive in a datacenter so that if someone gets unauthorized access, they
can't read it.

S/MIME compared with Office 365 Message Encryption


S/MIME requires a certificate and publishing infrastructure that is often used in business-to-business and
business-to-consumer situations. The user controls the cryptographic keys in S/MIME and can choose whether to
use them for each message they send. Email programs such as Outlook search a trusted root certificate authority
location to perform digital signing and verification of the signature. Office 365 Message Encryption is a policy-
based encryption service that can be configured by an administrator, and not an individual user, to encrypt mail
sent to anyone inside or outside of the organization. It's an online service that's built on Azure Rights
Management (RMS ) and does not rely on a public key infrastructure. Office 365 Message Encryption also
provides additional capabilities, such as the capability to customize the mail with organization's brand. For more
information about Office 365 Message Encryption, see Office 365 Message Encryption.

More information
Outlook Web App
Secure Mail (2000)
Configure S/MIME settings for Outlook Web App
8/21/2018 • 2 minutes to read • Edit Online

As an organization administrator for both Exchange 2013 and Exchange Online, you can set up Outlook Web App
to allow sending and receiving S/MIME -protected messages. Use the SMIMEConfig cmdlet to manage this feature
through the Exchange Management Shell interface.
For more information such as a detailed description of parameters and examples for get-SMIMEConfig and
set-SMIMEConfig , see the Get-SmimeConfig and Set-SmimeConfig documentation.

You can only use the Shell to perform this procedure. To learn how to open the Exchange Management Shell in
your on-premises Exchange organization, see Open the Shell. To learn how to use Windows PowerShell to
connect to Exchange Online, see Connect to Exchange Online PowerShell.

For more information


S/MIME for message signing and encryption
Send and receive S/MIME signed and encrypted
email
8/21/2018 • 2 minutes to read • Edit Online

Sending or replying to an S/MIME -encrypted message in Microsoft Outlook is very similar to the experience with
a non-encrypted message. For more information about reading or sending S/MIME -encrypted messages from an
email program such as Outlook Web App, see Use Outlook to send and reply to S/MIME encrypted messages.

For more information


S/MIME for message signing and encryption
Sync user certificates to Office 365 for S/MIME
8/21/2018 • 2 minutes to read • Edit Online

Before anyone can send S/MIME -protected messages, the appropriate certificates must be set up. In order to send
encrypted messages through Exchange Online, the sender's email program uses the public certificate of the
recipient to encrypt the message. This public X.509 certificate has to be published to Office 365.

To Sync certificates that support S/MIME


Begin setting up S/MIME by issuing certificates and publishing them in your local Active Directory Domain
Service. For more information about managing certificates in Exchange 2013, see Digital Certificates and SSL.
After your certificates are published, use the Azure Active Directory Sync tool to synchronize user data from your
on-premises Exchange environment to Office 365. For more information on this process, see DirSync: Directory
Sync Tool Version Release History.
Along with synchronizing other directory data, for S/MIME purposes, the tool will synchronize the
userCertificate and userSMIMECertificate attributes for each user object so the data can be used to sign and
encrypt messages.

More Information
S/MIME for message signing and encryption
Azure Active Directory Sync tool
Set up virtual certificate collection to validate
S/MIME
8/21/2018 • 2 minutes to read • Edit Online

As a tenant administrator you will need to configure a virtual certificate collection that will be used to validate
S/MIME certificates. This virtual certificate collection is set up as a certificate store file type with an SST filename
extension. The SST file contains all the root and intermediate certificates that are used when validating an S/MIME
certificate.

Create and save an SST


You can only use the Shell to perform this procedure. To learn how to open the Exchange Management Shell in
your on-premises Exchange organization, see Open the Shell. To learn how to use Windows PowerShell to
connect to Exchange Online, see Connect to Exchange Online PowerShell.
As an administrator, you can create this SST file by exporting the certificates from a trusted machine using the
Export-Certificate cmdlet and specifying the type as SST. For more information the Export-Certificate cmdlet,
see the Export-Certificate reference topic.
Once the SST file is generated, use the Set-Smimeconfig cmdlet to save it in the virtual certificate store by using
the -SMIMECertificateIssuingCA parameter. For example:
Set-SmimeConfig -SMIMECertificateIssuingCA (Get-Content filename.sst -Encoding Byte)

Ensuring a certificate is valid


Exchange 2013 SP1 first checks for the SST file and validates the certificate. If the validation fails, it will look at the
local machine certificate store to validate the certificate. This behavior is new for Exchange 2013 SP1 and different
from prior versions of Exchange. In Exchange Online only the SST will be used for validation.

More Information
S/MIME for message signing and encryption
Get-SmimeConfig
Troubleshooting and support information
8/21/2018 • 2 minutes to read • Edit Online

This topic describes troubleshooting steps for end users and administrators, and provides information about how
to contact technical support for assistance.

Troubleshooting for Users


Occasionally, you may experience trouble with Microsoft Office Outlook after adding the Junk Email Reporting
Add-In. Following are problems that you may encounter, along with tips for resolving these issues.
Nothing happens when you click Report Junk
Outlook stops responding after you select an email message
Reported junk mail cannot be delivered due to an "undeliverable" reply
Troubleshooting tip
1. Close and restart Microsoft Office Outlook.
2. Verify that you are able to create and send a test message. To do this, you can send a test message to
another email account that you are responsible for, and then verify that the email message is received.
If the problem persists, contact your IT administrator.

TIP
You can also submit spam messages directly to Microsoft by using the junk@office365.microsoft.com email address, and false
positive messages by using the [not_junk@office365.microsoft.com](mailto: not_junk@office365.microsoft.com) email
address. For more information, see Submit spam, non-spam, and phishing scam messages to Microsoft for analysis.

Troubleshooting for Administrators


As an administrator, you might experience issues with users using the Junk Email Reporting Add-in for Microsoft
Office Outlook. Following are some tips for resolving problems that you might encounter.
Problem: An error message asking users to contact their system administrator continually appears.
Troubleshooting tip
1. Set the following registry key value to "Verbose":
32 bit Outlook installed on a 32 bit operating system:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Junk Email Reporting\Addins\LoggingLevel
32 bit Outlook installed on a 64 bit operating system:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Junk Email
Reporting\Addins\LoggingLevel
64 bit Outlook (always installed on a 64 bit operating system ):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Junk Email Reporting\Addins\LoggingLevel
2. Restart Microsoft Office Outlook and ask users to report back when they see the error message.
3. Collect the log information found at the following location:
%LOCALAPPDATA%\Microsoft\Junk Email Reporting Add-in\SpamReporterAddinLog.txt
4. Contact Exchange Online Protection Technical Support and provide them with the log information.
Problem: Users choose not to receive a confirmation when they submit an email as junk and now they want the
option back.
Troubleshooting tip
1. Set the following registry key value to "True": HKEY_CURRENT_USER\Software\Microsoft\Junk E -mail
Reporting\Preferences\ConfirmReportJunk
2. Restart Microsoft Office Outlook.

Support Information
If you need help with the installation, configuration, or uninstallation of the add-in, please contact technical support
using the new service request link on the support page in the Office 365 admin center. For additional options
including submitting a service request via the telephone and self-support options, see Help and support for EOP.

For more information


Enable the Report Message add-in
Report junk email messages to Microsoft
Troubleshooting mail sent to Office 365
8/21/2018 • 7 minutes to read • Edit Online

This article provides troubleshooting information for senders who are experiencing issues when trying to send
email to inboxes in Office 365 and best practices for bulk mailing to Office 365 customers.

Troubleshooting common problems with mail delivery to Office 365


Choose from one of these commonly encountered issues.
Are you managing your IP and domain's sending reputation?
Are you sending email from new IP addresses?
Confirm that your DNS is set up correctly
Ensure that you do not advertise yourself as a non-routable IP
You received a non-delivery report (NDR ) when sending email to a user in Office 365
My email landed in the recipient's junk folder in EOP
Traffic from my IP address is throttled by EOP
Are you managing your IP and domain's sending reputation?
EOP filtering technologies are designed to provide anti-spam protections for Microsoft Office 365 as well as other
Microsoft products like Exchange Server, Microsoft Office Outlook, and Windows Live Mail. We also leverage SPF,
DKIM, and DMARC; email authentication technologies that help address the problem of spoofing and phishing by
verifying that the domain sending the email is authorized to do so. EOP filtering is influenced by a number of
factors related to the sending IP, domain, authentication, list accuracy, complaint rates, content and more. Of these,
one of the principal factors in driving down a sender's reputation and their ability to deliver email is their junk
email complaint rate.
Are you sending email from new IP addresses?
IP addresses not previously used to send email typically don't have any reputation built up in our systems. As a
result, emails from new IPs are more likely to experience delivery issues. Once the IP has built a reputation for not
sending spam, EOP will typically allow for a better email delivery experience.
New IPs that are added for domains that are authenticated under existing SPF records typically experience the
added benefit of inheriting some of the domain's sending reputation. If your domain has a good sending
reputation new IPs may experience a faster ramp up time. A new IP can expect to be fully ramped within a couple
of weeks or sooner depending on volume, list accuracy, and junk email complaint rates.
Confirm that your DNS is set up correctly
For instructions about how to create and maintain DNS records, including the MX record required for mail routing,
you will need to contact your DNS hosting provider.
Ensure that you do not advertise yourself as a non-routable IP
We may not accept email from senders who fail a reverse-DNS lookup. In some cases, legitimate senders advertise
themselves incorrectly as a non-internet routable IP when attempting to open a connection to EOP. IP addresses
that are reserved for private (non-routable) networking include:
192.168.0.0/16 (or 192.168.0.0 - 192.168.255.255)
10.0.0.0/8 (or 10.0.0.0 - 10.255.255.255)
172.16.0.0/11 (or 172.16.0.0 - 172.31.255.255)
You received a non-delivery report (NDR ) when sending email to a user in Office 365
Some delivery issues are the result of the sender's IP address being blocked by Microsoft or because the user
account is identified as banned sender due to previous spam activity. If you believe that you have received the
NDR in error, first follow any instructions in the NDR message to resolve the issue.
For more information about the error you received, see the complete list of SMTP error codes in DSNs and NDRs
in On-Premises Exchange 2013 and Office 365.
For example, if you receive the following NDR, it indicates that the sending IP address was blocked by Microsoft.
550 5.7.606-649 Access denied, banned sending IP [x.x.x.x]; To request removal from this list please visit
https://sender.office.com/ and follow the directions.

To request removal from this list, you can Use the delist portal to remove yourself from the Office 365 blocked
senders list.
My email landed in the recipient's junk folder in EOP
If a message was incorrectly identified as spam by EOP, you can work with the recipient to submit this false
positive message to the Microsoft Spam Analysis Team, who will evaluate and analyze the message. Depending on
the results of the analysis, the service-wide spam content filter rules may be adjusted to allow the message
through. You use email to submit messages to Microsoft that should not be classified as spam. When doing so, be
sure to use the steps in the following procedure.
To use email to submit false positive messages to the Microsoft Spam Analysis Team
1. Save the message you want to submit as non-spam.
2. Create a new, blank message and attach the non-spam message to it.
You can attach multiple non-spam messages if needed.
3. Copy and paste the original message subject line into the new message subject line.

IMPORTANT
Leave the body of the new message empty.

4. Send your new message to not_junk@office365.microsoft.com.


Traffic from my IP address is throttled by EOP
If you receive an NDR from EOP that indicates that your IP address is being throttled by EOP, for example:
host xxxx.outlook.com [x.x.x.x]: 451 4.7.550 Access denied, please try again later

You received the NDR because suspicious activity has been detected from the IP address and it has been
temporarily restricted while it is being further evaluated. If the suspicion is cleared through evaluation, this
restriction will be lifted shortly.
I can't receive email from senders in Office 365
In order to receive messages from our users, make sure your network allows connections from the IP addresses
that EOP uses in our datacenters. For more information, see Exchange Online Protection IP addresses. For a
record of all IP addresses that have been added, changed, or deprecated in the past year, see Change notification
for EOP IP addresses.
Best practices for bulk emailing to Office 365 users
If you often conduct bulk email campaigns to Office 365 users and want to ensure that your emails arrive in a safe
and timely manner, follow the tips in this section.
Ensure that the From: name reflects who is sending the message
The Subject should be a brief summary of what the message is about, and the message body should clearly and
succinctly indicate what the offering, service, or product is about. For example:
Correct
From: marketing@shoppershandbag.com

Subject: Updated catalog for the Christmas season!

Incorrect
From: someone@outlook.com

Subject: Catalogs

The easier you make it for people to know who you are and what you are doing, the less difficulty you will have
delivering through most spam filters.
Always include an unsubscribe option in campaign emails
Marketing emails, especially newsletters, should always include a way of unsubscribing from future emails. For
example:
This email was sent to example@contoso.com by sender@fabrikam.com.

Update Profile/Email Address | Instant removal with SafeUnsubscribe™ | Privacy Policy

Some senders include this option by requiring recipients to send an email to a certain alias with "Unsubscribe" in
the subject. This is not preferable to the one-click example above. If you do choose to require recipients to send a
mail, ensure that when they click the link, all the required fields are pre-populated.
Use the double opt-in option for marketing email or newsletter registration
This industry best practice is recommended if your company requires or encourages users to register their contact
information in order to access your product or services. Some companies make it a practice to automatically sign
up their users for marketing emails or e-newsletters during the registration process, but this is considered a
questionable marketing practice in the world of email filtering.
During the registration process, if the "Yes, please send me your newsletter" or "Yes, please send me special offers"
checkbox is selected by default, users who do not pay close attention may unintentionally sign up for marketing
email or newsletters that they do not want to receive.
We recommend the double opt-in option instead, which means that the checkbox for marketing emails or
newsletters is unchecked by default. Additionally, once the registration form has been submitted, a verification
email is sent to the user with a URL that allows them to confirm their decision to receive marketing emails.
This helps ensure that only those users who want to receive marketing email are signed up for the emails,
subsequently clearing the sending company of any questionable email marketing practices.
Ensure that email message content is transparent and traceable
Just as important as the way the emails are sent is the content they contain. When creating email content, use the
following best practices to ensure that your emails will not be flagged by email filtering services:
When the email message requests that recipients add the sender to the address book, it should clearly state
that such action is not a guarantee of delivery.
Redirects included in the body of the message should be similar and consistent, and not multiple and varied.
A redirect in this context is anything that points away from the message, such as links and documents. If you
have a lot of advertising or Unsubscribe links or Update the Profile links, they should all point to the same
domain. For example:
Correct
unsubscribe.bulkmailer.com

profile.bulkmailer.com

options.bulkmailer.com

Incorrect
unsubscribe.bulkmailer.com

profiles.excite.com

options.yahoo.com

Avoid content with large images and attachments, or messages that are solely composed of an image.
Your public privacy or P3P settings should clearly state the presence of tracking pixels (web bugs or
beacons).
Remove incorrect email aliases from your databases
Any email alias in your database that creates a bounce-back is unnecessary and puts your outbound emails at risk
for further scrutiny by email filtering services. Ensure that your email database is up-to-date.
Help and support for EOP
6/26/2018 • 3 minutes to read • Edit Online

The technical support resources listed here will help you find answers if you are having difficulty with Microsoft
Exchange Online Protection (EOP ). Microsoft provides help for EOP in a variety of places and methods including
self-support and assisted-support.

Self-support options
Upon logging in, the Office 365 portal provides information about the status of your organization's services. Also,
the service health section of Office 365 shows the current status of your services, details about disruptions and
outages, and lists planned maintenance times. The Office 365 portal also provides information about known
issues and expected resolutions. If you're affected by a service-wide event, then you should see a communication
alert (typically accompanied by a bell icon). We recommend that you read and act on any items as appropriate. For
more information about the service health area of Office 365, see Service Health. You might be able to find more
help on your own by using the tools, forums and community sites listed here.
Product Overview for Exchange Online Protection
Office 365 and Exchange Online support
Office 365 community
Office 365 Do It Yourself (DIY ) Troubleshooter
Office 365 Mail Flow Guided Walkthrough

Assisted support from Microsoft


You can get help from Microsoft by starting a new service request within the Office 365 admin center or by calling
on the phone. Premier support subscribers have extra support options.
Support for Microsoft Premier Support Subscribers
If you are an EOP customer and also have a Microsoft Premier Support contract, you can get support through the
normal Microsoft Premier Support channels. This allows you to receive access to all processes and resources
available to Premier Support customers, such as a Premier Technical Account Manager (TAM ) and case
submission. Premier Support for Microsoft Online Services extends the Premier Support framework beyond on-
premises products to online services, providing you with a unified support experience across all products and
services. This service helps ensure that customers can resolve issues quickly and simplifies the task of managing
support for different components of an IT infrastructure.
For more information about how Premier Support can help your organization maximize value from your IT
investments, see Microsoft Premier Support.
Ask for help on the web
1. Login to the Office 365 admin center.
2. Go to Support > Ask for Customer Support > New Service Request
3. Use the form to add information about your issue, search for solutions to previous issues, or attach logs or
related files.
Ask for help on the telephone
1. Login to the Office 365 admin center.
2. For general product issues go to Support > Ask for Customer Support > Call technical support.
For questions before you buy EOP, or questions about billing and subscriptions, go to Support > Ask for
Customer Support > Call billing and subscription support.
3. Use the Virtual Agent for Microsoft Office 365 to search for the most current appropriate telephone
number.

Support telephone numbers


Microsoft provides local or toll-free telephone numbers for product support around the world. Many of these
support centers provide help in your local language during business hours or in English 24 hours a day, every day.
If you don't see your location listed below, use the Virtual Agent for Microsoft Office 365 as described above to
find your local support telephone number.

COUNTRY OR REGION PRE-PURCHASE AND BILLING QUESTIONS TECHNICAL SUPPORT QUESTIONS

Brazil Toll-free: 08007621146 Local: Same


1147001999

France Toll-free: 0805 540 594 Local: 01 57 32 Same


42 97

Germany Toll-free: 0800 589 2332 Local: 069 Same


380 789 508

Japan Toll-free: 0120-628860 Local: Toll-free: 0120-996680 Local:


343326257 357679793

Korea Toll-free: 080-495-0880 Local: Same


234831937

Spain Toll-free: 900 814 197 Local: 912 718 Same


160

United Kingdom Toll-free: 0800 032 6417 Local: 0203 Same


450 6455

United States Toll-free: 1-877-913-2707 Toll-free: 1-800-865-9408

For more information about EOP documentation


Third-party copyright notices
Accessibility for people with disabilities
EOP general FAQ
6/26/2018 • 3 minutes to read • Edit Online

Here we answer the most common general questions about the Microsoft Exchange Online Protection (EOP )
cloud-hosted email filtering service. For additional frequently asked questions (FAQ ) topics, go to the following
links:
EOP queued, deferred, and bounced messages FAQ
Delegated administration FAQ
Anti-spam protection FAQ
Safe sender and blocked sender lists in Exchange Online
Quarantine FAQ
Anti-malware protection FAQ
Message Trace FAQ
FOPE to EOP Transition FAQ
Q. What is EOP?
A. EOP is a cloud-hosted email filtering service built to protect customers from spam and malware, and to
implement custom policy rules.
Q. How do I sign up for an EOP trial or purchase EOP?
A. Sign up for an EOP trial or purchase EOP via the web at the Exchange Online Protection home page. Note that
the functionality for a trial purchase is the same as for a paid subscription, but also includes the additional features
provided with the Exchange Enterprise CAL with Services subscription plan.
Q. How is EOP priced?
A. EOP is licensed by user. For the latest pricing information, see the Exchange Online Protection home page.
Q. How long does it take to put EOP into production?
A. When you change your MX record, as per the steps outlined in Set up your EOP service, and your mail flows
through EOP, filtering begins immediately. The MX record may take as long as 24-48 hours to propagate via DNS.
You can fine tune your protection settings in the Exchange admin center (EAC ) at any time during this process.
Q. Do I have to use all features of Microsoft Office 365 to use EOP? What if I just want EOP protection
and that's all?
A. You can use EOP to protect your on-premises mailboxes without using any other features of Office 365. This is
known as a standalone subscription. A list of EOP features can be found in the Exchange Online Protection Service
Description.
Q. Why do I need an Office 365 tenant when signing up for email filtering through EOP?
A. Office 365 is the name given to a collection of products and services that may be accessed through an Office
365 tenant. Think of the Office 365 tenant as the starting point to which you may add licenses for email filtering.
Q. Does EOP have a communication portal where I can find out about known issues and expected
resolutions? What about new features?
A. The Office 365 admin center will have some of this information. If you are impacted by a Service Level Event
then you should see a communication alert (typically accompanied by a bell icon) after signing in to the Office 365
admin center. We recommend that you read and act on any items as appropriate.
Regarding new EOP features, the Office 365 for business roadmap is a good resource for finding out information
about upcoming new features. We'll also be posting blog articles about new features to the Office Blogs website.
Q. Does the service work with legacy Exchange versions (such as Exchange Server 2010) and non-
Exchange environments?
A. Yes, the service is server agnostic and can be used with any SMTP mail transfer agent.
Q. What size organization can use the service?
A. Any size. The EOP network has sufficient capacity to accommodate your growth, no matter how fast your
organization grows.
What permissions do I need to set up EOP?
In order to configure EOP, you must be an Office 365 Global Admin, or an Exchange Company Administrator (the
Organization Management role group).
Q. How do I know my data and private information are safe?
A. To learn more about the steps we've taken to ensure the safety of your data and private information, including
information about Service Level Agreements (SLAs), go to the Office 365 Trust Center.
Q. Are there any limits I should be aware of, such as message size limitations?
A. Yes. For more information about limits in EOP, see Exchange Online Protection Limits.
Q. Does EOP support remote Windows PowerShell?
A. Yes, full EOP functionality is available via remote Windows PowerShell. For more information, see PowerShell
in Exchange Online Protection.
EOP queued, deferred, and bounced messages FAQ
6/26/2018 • 2 minutes to read • Edit Online

This topic provides answers to frequently asked questions about messages that have been queued, deferred, or
bounced during the Microsoft Exchange Online Protection (EOP ) filtering process.
Q. Why is mail queuing?
A. Messages are queued or deferred if the service is unable to make a connection to the recipient server for
delivery. It will not defer messages if a 500-series error is returned from the recipient network.
Q. How does a message become deferred?
A. Messages will be held when a connection to the recipient server cannot be made and the recipient's server is
returning a "temporary failure" such as a connection time-out, connection refused, or a 400-series error. If there is
a permanent failure, such as a 500-series error, then the message will be returned to the sender.
Q. How long does a message remain in deferral and what is the retry interval?
A. Messages in deferral will remain in our queues for 2 days. Message retry attempts are based on the error we
get back from the recipient's mail system. On average, messages are retried every 5 minutes.
Q. After your email server is restored, how are queued messages distributed?
A. After your email server is restored, all queued messages are automatically processed in the order in which they
were received and queued when the server became unavailable.
Delegated administration FAQ
6/26/2018 • 2 minutes to read • Edit Online

This topic provides frequently asked questions and answers for Microsoft partners and resellers who want to
perform delegated Office 365 administration tasks, including the ability to manage Exchange Online Protection
(EOP ) for other tenants (companies).
Q. I'm a reseller and I need to manage my customer's tenants; how does this work?
A. If you are a Microsoft partner or reseller, and you've signed up to be a Microsoft advisor, you can request
permission to administer their tenant within the Office 365 admin center. This is known as delegated
administration, and it allows you to manage their Office 365 tenant (including EOP settings) as if you were an
administrator within their organization. The steps for performing delegated administration are as follows:
1. Sign up to be a Microsoft Office 365 Advisor.
2. Sign up for Office 365 delegated administration. Before you can start administering a customer's account,
they must authorize you as a delegated administrator. To obtain their approval, you first send them an offer
for delegated administration. (You can also offer delegated administration to your customer at a later time.)
3. Create the delegated admin account using the steps documented in Add or delete a delegated admin.
Visit Partners: Build your business and administer your Office 365 partner account for more information about
how to set up Office 365 delegated administration.
Q. I'm a customer, not a reseller, how can set up delegated administrator for my sub-tenants?
A. Delegated administration is only available for resellers and partners at this time. However, we've provided a
sample Windows PowerShell script that will help you apply policies to your sub-tenants (companies). For more
information, see Sample script for applying EOP settings to multiple tenants.
Q. Can I prevent my sub-tenant admin from modifying my policy?
A. Office 365 does not currently have this capability.
Q. Can I get consolidated reporting across all of my sub-tenants?
A. Consolidated reporting across the companies you manage is not available for the Office 365 admin center
reports at this time. However, this can be done via remote Windows PowerShell or the reporting web service.
Reference: Policies, practices, and guidelines
8/21/2018 • 3 minutes to read • Edit Online

Microsoft is dedicated to helping provide the most trusted user experience on the web. Therefore, Microsoft has
developed various policies, procedures, and adopted several industry best practices to help protect our users from
abusive, unwanted, or malicious email. Senders attempting to send email to Office 365 users should ensure they
fully understand and are following the guidance in this article to help in this effort and to help avoid potential
delivery issues.
If you are not in compliance with these policies and guidelines, it may not be possible for our support team to
assist you. If you are adhering to the guidelines, practices, and policies presented in this article and are still
experiencing delivery issues based on your sending IP address, please follow the steps to submit a delisting
request. For instructions, see Use the delist portal to remove yourself from the Office 365 blocked senders list.

General Microsoft policies


Email sent to Office 365 users must comply with all Microsoft policies governing email transmission and use of
Office 365.
Terms of Services applicable to Office 365; in particular, the prohibition against using the service to spam or
distribute malware
Microsoft Services Agreement

Governmental regulations
Email sent to Office 365 users must adhere to all applicable laws and regulations governing email communications
in the applicable jurisdiction.
CAN -SPAM Act: A Compliance Guide for Business
"Remove Me" Responses and Responsibilities: Email Marketers Must Honor "Unsubscribe" Claims

Technical guidelines
Email sent to Office 365 should comply with the applicable recommendations listed in the documents below (some
links are only available in English).
RFC 2505: Anti-Spam Recommendations for SMTP MTAs
RFC 2920: SMTP Service Extension for Command Pipelining
In addition, email servers connecting to Office 365 must adhere to the following requirements:
Sender is expected to comply with all technical standards for the transmission of Internet email, as
published by The Internet Society's Internet Engineering Task Force (IETF ), including RFC 5321, RFC 5322,
and others.
After given a numeric SMTP error response code between 500 and 599 (also known as a permanent non-
delivery response or NDR ), the sender must not attempt to retransmit that message to that recipient.
After multiple non-delivery responses, the sender must cease further attempts to send email to that
recipient.
Messages must not be transmitted through insecure email relay or proxy servers.
The mechanism for unsubscribing, either from individual lists or all lists hosted by the sender, must be
clearly documented and easy for recipients to find and use.
Connections from dynamic IP space may not be accepted.
Email servers must have valid reverse DNS records.

Reputation management
Senders, ISP's, and other service providers should actively manage the reputation of your outbound IP addresses.

Office 365 limits


Senders must adhere to Office 365 limits listed in Exchange Online Protection Limits.

Email delivery resources and organizations


Microsoft actively works with industry bodies and service providers in order to improve the internet and email
ecosystem. These organizations have published best practice documents that we support and recommend senders
adhere to. This improves your ability to deliver email among several email service providers around the world.
Messaging Malware Mobile Anti-Abuse Working Group
Online Trust Alliance
Email Sender & Provider Coalition

Abuse and spam reporting


To report unlawful, abusive, unwanted or malicious email, please Report junk email and phishing scams in Outlook
on the web . Sending these types of communications is a violation of Microsoft policy and appropriate action will
be taken on confirmed reports.

Law enforcement
If you are a member of law enforcement and wish to serve Microsoft Corporation with legal documentation
regarding Office 365, or if you have questions regarding legal documentation you have submitted to Microsoft,
please call (1) (425) 722-1299.
Accessibility for people with disabilities
6/26/2018 • 3 minutes to read • Edit Online

Accessibility features of Exchange


The following features help make Microsoft Exchange more accessible for people with disabilities:
Keyboard shortcuts in Exchange 2013 Preview
Keyboard Shortcuts in Outlook Web App
In addition, some accessibility features and utilities of Windows may benefit Exchange users with disabilities. Also,
Windows PowerShell size and color changes provide accessibility options when using the Exchange Management
Shell. For more information about Windows PowerShell accessibility options, see Accessibility in Windows
PowerShell 2.0 ISE.

Accessibility features of Exchange Help


Every figure in Help for Microsoft Exchange, including screenshots, diagrams, flow charts, and other figures, has
associated alternate text. Users who have difficulty viewing figures can pause the cursor on the figure to read the
alternate text. The alternate text describes what is illustrated in the figure.

Accessibility products and services from Microsoft


The following sections provide information about the features, products, and services that make Microsoft
Windows more accessible for people with disabilities.

NOTE
The information in this section applies only to users who license Microsoft products in the United States. If you obtained this
product outside of the United States, visit the Microsoft Accessibility website for a list of telephone numbers and addresses
for Microsoft support services. You can contact your subsidiary to find out whether the type of products and services
described in this section are available in your area. You can learn more about the accessibility features included in Microsoft
products on the Accessibility in Microsoft Products web site.

Accessibility features of Windows


The Windows operating system has many built-in accessibility features that are useful for individuals who have
difficulty typing or using a mouse, are blind or have low vision, or who are deaf or hard-of-hearing. The features
are installed during Setup. For more information about these features, see Help in Windows and Microsoft
Accessibility.
Free step-by-step tutorials Microsoft offers a series of step-by-step tutorials that provide detailed
procedures for adjusting the accessibility options and settings on your computer. This information is
presented in a side-by-side format so that you can learn how to use the mouse, the keyboard, or a
combination of both.
To find step-by-step tutorials for Microsoft products, see Microsoft Accessibility.
Assistive technology products for Windows A wide variety of assistive technology products are
available to make computers easier to use for people with disabilities. You can search a catalog of assistive
technology products that run on Windows at Microsoft Accessibility.
If you use assistive technology, be sure to contact your assistive technology vendor before you upgrade
your software or hardware to check for possible compatibility issues.
Documentation in alternative formats
If you have difficulty reading or handling printed materials, you can obtain the documentation for many Microsoft
products in more accessible formats. You can obtain an index of accessible product documentation at Microsoft
Accessibility.
In addition, you can obtain additional Microsoft publications from Learning Ally. Learning Ally distributes these
documents to registered, eligible members of their distribution service. For information about the availability of
Microsoft product documentation and books from Microsoft Press, contact Learning Ally.

Learning Ally
20 Roszel Road
Princeton, NJ 08540
Telephone number from within the United States: (800) 221-4792
Web site: Learning Ally

Customer service for people with hearing impairments


If you're deaf or hard-of-hearing, complete access to Microsoft product and customer services is available through
a text telephone (TTY/TDD ) service:
For customer service, contact Microsoft Sales Information Center at (800) 892-5234 between 6:30 A.M. and
5:30 P.M. Pacific Time, Monday through Friday, excluding holidays.
For technical assistance in the United States, contact Microsoft Product Support Services at (800) 892-5234
between 6:00 A.M. and 6:00 P.M. Pacific Time, Monday through Friday, excluding holidays. In Canada, dial
(905) 568-9641 between 8:00 A.M. and 8:00 P.M. Eastern Time, Monday through Friday, excluding holidays.

Microsoft Support Services are subject to the prices, terms, and conditions in place at the time the service is used.
For more information, see Microsoft Support.

For more information


For more information about how accessible technology for computers helps to improve the lives of people with
disabilities, see Microsoft Accessibility.
Sending mail to Office 365
8/21/2018 • 2 minutes to read • Edit Online

These articles help external senders improve their reputation and increase their ability to deliver email to users in
Office 365. They also provide some information about how you can report junk email and phishing attempts even
if you aren't an Office 365 user yourself.
If you are not an Office 365 customer, but are trying to send mail to someone in who is, you are in the right place. If
you are an Office 365 administrator and you need help fighting spam, this is not the right section for you. Instead,
go to Anti-spam and anti-malware protection.

FOR INFORMATION ABOUT... SEE...

Services we provide to administrators of email systems that Services for non-customers sending mail to Office 365
are sending individual and bulk email to Office 365 customers.

How to fix problems reaching customers in Office 365 through Troubleshooting mail sent to Office 365
email. Best practices for sending bulk mail to Office 365
recipients.

How Office 365 prevent junk email, including phishing and Fighting junk email sent to Office 365
spoofing email, from being sent to our customers.

How you, an administrator sending email to Office 365 Reference: Policies, practices, and guidelines
customers, can avoid having email blocked by adhering to our
anti-spam policies. This is the legal stuff you need to know.
Services for non-customers sending mail to Office
365
8/21/2018 • 2 minutes to read • Edit Online

Email abuse, junk email, and fraudulent emails (phishing) continue to burden the entire email ecosystem. To help
maintain user trust in the use of email, Microsoft has put in place various policies and technologies to help protect
our users. However, Microsoft understands that legitimate email should not be negatively affected. Therefore, we
have established a suite of services to help senders improve their ability to deliver email to Office 365 users by
proactively managing their sending reputation.
This overview provides information about benefits we provide to your organization even if you aren't an Office
365 customer.

Sender solutions
SERVICE BENEFITS

This online help content Provides:


A starting point for any questions related to delivering
communications to EOP users
Includes a simple online guide with our policies and
requirements
An overview of the junk email filters and authentication
technologies employed by Microsoft

Microsoft support Provides self-help and escalation support for delivery issues.

Office 365 Anti-Spam IP Delist Portal A tool to submit IP delist request. Before submitting this
request it is the sender's responsibility to ensure that any
further mail originating from the IP in question is not abusive
or malicious.

Abuse and spam reporting for junk email originating from Keeps spam and other unwanted mail from being sent from
Exchange Online Exchange Online and cluttering up the Internet and your mail
system.

Microsoft support
Microsoft offers several support options for people having trouble sending mail to Office 365 inboxes. We
recommend that you:
Follow the instructions in any non-delivery report you receive.
Check out the most common problems that non-customers encounter in Troubleshooting mail sent to
Office 365.
Use the Office 365 delist portal to submit a request to have your IP removed from the blocked sender's list.
Read the Microsoft community forums.
Contact the Office 365 customer you're trying to email using another method and ask them to contact
Microsoft Support and open a support ticket on your behalf. In some cases, for legal reasons, Microsoft
Support must communicate directly with the sender who owns the IP space that is being blocked. However,
non-customers typically can't open support tickets.
For more information about Microsoft Technical support for Office 365, see Support.

Office 365 Anti-Spam IP Delist Portal


This is a self-service portal you can use to remove yourself from the Office 365 blocked senders list. Use this
portal if you are you getting an error message when you try to send an email to a recipient whose email address is
in Office 365 and you don't think you should be. For more information, see Use the delist portal to remove
yourself from the Office 365 blocked senders list.

Abuse and spam reporting for junk email originating from Exchange
Online
Sometimes Office 365 is used by third parties to send junk email, in violation of our terms of use and policy. If you
receive any junk email from Office 365, you can report these messages to junk@office365.microsoft.com. Please
attach the offending messages, including the full message header, in RFC 5322 or ARF format. Outlook on the web
users can use built-in tools to report junk email. For information, see Report junk email and phishing scams in
Outlook on the web .

Das könnte Ihnen auch gefallen