You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/enterprise-users/groups-naming-policy.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,9 +23,9 @@ To enforce consistent naming conventions for Microsoft 365 groups created or edi
23
23
> [!IMPORTANT]
24
24
> Using Microsoft Entra ID naming policy for Microsoft 365 groups requires that you possess but not necessarily assign a Microsoft Entra ID P1 license or Microsoft Entra Basic EDU license for each unique user that is a member of one or more Microsoft 365 groups.
25
25
26
-
The naming policy is applied to creating or editing groups created across workloads (for example, Outlook, Microsoft Teams, SharePoint, Exchange, or Planner), even if no editing changes are made. It is applied to both the group name and group alias. If you set up your naming policy in Microsoft Entra ID and you have an existing Exchange group naming policy, the Microsoft Entra ID naming policy is enforced in your organization.
26
+
The naming policy is applied to creating or editing groups created across workloads (for example, Outlook, Microsoft Teams, SharePoint, Exchange, or Planner), even if no editing changes are made. It's applied to both the group name and group alias. If you set up your naming policy in Microsoft Entra ID and you have an existing Exchange group naming policy, the Microsoft Entra ID naming policy is enforced in your organization.
27
27
28
-
When group naming policy is configured, the policy will be applied to new Microsoft 365 groups created by end users. Naming policy does not apply to certain directory roles, such as Global Administrator or User Administrator (please see below for the complete list of roles exempted from group naming policy). For existing Microsoft 365 groups, the policy will not immediately apply at the time of configuration. Once group owner edits the group name for these groups, naming policy will be enforced, even if no changes are made.
28
+
When group naming policy is configured, the policy will be applied to new Microsoft 365 groups created by end users. Naming policy doesn't apply to certain directory roles, such as Global Administrator or User Administrator (please see below for the complete list of roles exempted from group naming policy). For existing Microsoft 365 groups, the policy won't immediately apply at the time of configuration. Once group owner edits the group name for these groups, naming policy will be enforced, even if no changes are made.
29
29
30
30
## Naming policy features
31
31
@@ -39,7 +39,7 @@ You can enforce naming policy for groups in two different ways:
39
39
40
40
The general structure of the naming convention is ‘Prefix[GroupName]Suffix’. While you can define multiple prefixes and suffixes, you can only have one instance of the [GroupName] in the setting. The prefixes or suffixes can be either fixed strings or user attributes such as \[Department\] that are substituted based on the user who is creating the group. The total allowable number of characters for your prefix and suffix strings including group name is 63 characters.
41
41
42
-
Prefixes and suffixes can contain special characters that are supported in group name and group alias. Any characters in the prefix or suffix that are not supported in the group alias are still applied in the group name, but removed from the group alias. Because of this restriction, the prefixes and suffixes applied to the group name might be different from the ones applied to the group alias.
42
+
Prefixes and suffixes can contain special characters that are supported in group name and group alias. Any characters in the prefix or suffix that aren't supported in the group alias are still applied in the group name, but removed from the group alias. Because of this restriction, the prefixes and suffixes applied to the group name might be different from the ones applied to the group alias.
43
43
44
44
#### Fixed strings
45
45
@@ -57,10 +57,10 @@ A blocked word list is a comma-separated list of phrases to be blocked in group
57
57
58
58
Blocked word list rules:
59
59
60
-
- Blocked words are not case sensitive.
60
+
- Blocked words aren't case sensitive.
61
61
- When a user enters a blocked word as part of a group name, they see an error message with the blocked word.
62
62
- There are no character restrictions on blocked words.
63
-
- There is an upper limit of 5000 phrases that can be configured in the blocked words list.
63
+
- There's an upper limit of 5000 phrases that can be configured in the blocked words list.
64
64
65
65
### Roles and permissions
66
66
@@ -118,7 +118,7 @@ Be sure to uninstall any older version of the Azure Active Directory PowerShell
118
118
Install-Module AzureADPreview
119
119
```
120
120
121
-
If you are prompted about accessing an untrusted repository, enter **Y**. It might take few minutes for the new module to install.
121
+
If you're prompted about accessing an untrusted repository, enter **Y**. It might take few minutes for the new module to install.
122
122
123
123
## Configure naming policy in PowerShell
124
124
@@ -175,14 +175,14 @@ That's it. You've set your naming policy and added your blocked words.
175
175
176
176
For more information, see the article [Microsoft Entra cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md).
177
177
178
-
Here is an example of a PowerShell script to export multiple blocked words:
178
+
Here's an example of a PowerShell script to export multiple blocked words:
179
179
180
180
```PowerShell
181
181
$Words = (Get-AzureADDirectorySetting).Values | Where-Object -Property Name -Value CustomBlockedWordsList -EQ
@@ -240,14 +240,15 @@ Microsoft Teams | Microsoft Teams shows the group naming policy enforced name wh
240
240
SharePoint | SharePoint shows the naming policy enforced name when the user types a site name or group email address. When a user enters a custom blocked word, an error message is shown, along with the blocked word so that the user can remove it.
241
241
Microsoft Stream | Microsoft Stream shows the group naming policy enforced name when the user types a group name or group email alias. When a user enters a custom blocked word, an error message is shown with the blocked word so the user can remove it.
242
242
Outlook iOS and Android App | Groups created in Outlook apps are compliant with the configured naming policy. Outlook mobile app doesn't yet show the preview of the naming policy enforced name, and doesn't return custom blocked word errors when the user enters the group name. However, the naming policy is automatically applied on clicking create/edit and users see error messages if there are custom blocked words in the group name or alias.
243
-
Groups mobile app | Groups created in the Groups mobile app are compliant with the naming policy. Groups mobile app does not show the preview of the naming policy and does not return custom blocked word errors when the user enters the group name. But the naming policy is automatically applied when creating or editing a group and users is presented with appropriate errors if there are custom blocked words in the group name or alias.
243
+
Groups mobile app | Groups created in the Groups mobile app are compliant with the naming policy. Groups mobile app doesn't show the preview of the naming policy and doesn't return custom blocked word errors when the user enters the group name. But the naming policy is automatically applied when creating or editing a group and users is presented with appropriate errors if there are custom blocked words in the group name or alias.
244
244
Planner | Planner is compliant with the naming policy. Planner shows the naming policy preview when entering the plan name. When a user enters a custom blocked word, an error message is shown when creating the plan.
245
+
Project for the web | Project for the web is compliant with the naming policy.
245
246
Dynamics 365 for Customer Engagement | Dynamics 365 for Customer Engagement is compliant with the naming policy. Dynamics 365 shows the naming policy enforced name when the user types a group name or group email alias. When the user enters a custom blocked word, an error message is shown with the blocked word so the user can remove it.
246
247
School Data Sync (SDS) | Groups created through SDS comply with naming policy, but the naming policy isn't applied automatically. SDS administrators have to append the prefixes and suffixes to class names for which groups need to be created and then uploaded to SDS. Group create or edit would fail otherwise.
247
248
Classroom app | Groups created in Classroom app comply with the naming policy, but the naming policy isn't applied automatically, and the naming policy preview isn't shown to the users while entering a classroom group name. Users must enter the enforced classroom group name with prefixes and suffixes. If not, the classroom group create or edit operation fails with errors.
248
249
Power BI | Power BI workspaces are compliant with the naming policy.
249
-
Yammer | When a user signed in to Yammer with their Microsoft Entra account creates a group or edits a group name, the group name will comply with naming policy. This applies both to Microsoft 365 connected groups and all other Yammer groups.<br>If a Microsoft 365 connected group was created before the naming policy is in place, the group name will not automatically follow the naming policies. When a user edits the group name, they will be prompted to add the prefix and suffix.
250
-
StaffHub | StaffHub teams do not follow the naming policy, but the underlying Microsoft 365 group does. StaffHub team name does not apply the prefixes and suffixes and does not check for custom blocked words. But StaffHub does apply the prefixes and suffixes and removes blocked words from the underlying Microsoft 365 group.
250
+
Yammer | When a user signed in to Yammer with their Microsoft Entra account creates a group or edits a group name, the group name will comply with naming policy. This applies both to Microsoft 365 connected groups and all other Yammer groups.<br>If a Microsoft 365 connected group was created before the naming policy is in place, the group name won't automatically follow the naming policies. When a user edits the group name, they'll be prompted to add the prefix and suffix.
251
+
StaffHub | StaffHub teams do not follow the naming policy, but the underlying Microsoft 365 group does. StaffHub team name doesn't apply the prefixes and suffixes and doesn't check for custom blocked words. But StaffHub does apply the prefixes and suffixes and removes blocked words from the underlying Microsoft 365 group.
251
252
Exchange PowerShell | Exchange PowerShell cmdlets are compliant with the naming policy. Users receive appropriate error messages with suggested prefixes and suffixes and for custom blocked words if they don't follow the naming policy in the group name and group alias (mailNickname).
252
253
Azure Active Directory PowerShell cmdlets | Azure Active Directory PowerShell cmdlets are compliant with naming policy. Users receive appropriate error messages with suggested prefixes and suffixes and for custom blocked words if they don't follow the naming convention in group names and group alias.
253
254
Exchange admin center | Exchange admin center is compliant with naming policy. Users receive appropriate error messages with suggested prefixes and suffixes and for custom blocked words if they don't follow the naming convention in the group name and group alias.
Once your user(s) has been successfully created in Microsoft Entra ID, you may proceed to follow the Lifecycle workflow tutorials for your workflow creation.
Copy file name to clipboardExpand all lines: articles/active-directory/multi-tenant-organizations/multi-tenant-organization-configure-graph.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: multi-tenant-organizations
10
10
ms.topic: how-to
11
-
ms.date: 08/22/2023
11
+
ms.date: 09/22/2023
12
12
ms.author: rolyon
13
13
ms.custom: it-pro
14
14
@@ -29,13 +29,13 @@ If you instead want to use the Microsoft 365 admin center to configure a multi-t
29
29
30
30
<br/>**Owner tenant**
31
31
32
-
-Microsoft Entra ID P1 or P2 license. For more information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
32
+
- For license information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
33
33
-[Security Administrator](../roles/permissions-reference.md#security-administrator) role to configure cross-tenant access settings and templates for the multi-tenant organization.
34
34
-[Global Administrator](../roles/permissions-reference.md#global-administrator) role to consent to required permissions.
35
35
36
36
<br/>**Member tenant**
37
37
38
-
-Microsoft Entra ID P1 or P2 license. For more information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
38
+
- For license information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
39
39
-[Security Administrator](../roles/permissions-reference.md#security-administrator) role to configure cross-tenant access settings and templates for the multi-tenant organization.
40
40
-[Global Administrator](../roles/permissions-reference.md#global-administrator) role to consent to required permissions.
Copy file name to clipboardExpand all lines: articles/active-directory/multi-tenant-organizations/multi-tenant-organization-configure-templates.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: multi-tenant-organizations
10
10
ms.topic: how-to
11
-
ms.date: 08/22/2023
11
+
ms.date: 09/22/2023
12
12
ms.author: rolyon
13
13
ms.custom: it-pro
14
14
@@ -25,7 +25,7 @@ This article describes how to configure a policy template for your multi-tenant
25
25
26
26
## Prerequisites
27
27
28
-
-Microsoft Entra ID P1 or P2 license. For more information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
28
+
- For license information, see [License requirements](./multi-tenant-organization-overview.md#license-requirements).
29
29
-[Security Administrator](../roles/permissions-reference.md#security-administrator) role to configure cross-tenant access settings and templates for the multi-tenant organization.
30
30
-[Global Administrator](../roles/permissions-reference.md#global-administrator) role to consent to required permissions.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-use-recommendations.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 08/24/2023
11
+
ms.date: 09/21/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: hafowler
14
14
---
@@ -41,10 +41,10 @@ Some recommendations may require a P2 or other license. For more information, se
41
41
42
42
## How to read a recommendation
43
43
44
-
To view the details of a recommendation:
44
+
Most recommendations follow the same pattern. You're provided information about how the recommendation work, its value, and some action steps to address the recommendation. This section provides an overview of the details provided in a recommendation, but aren't specific to one recommendation.
45
45
46
46
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Reports Reader](../roles/permissions-reference.md#reports-reader).
47
-
1. Browse to **Identity** > **Overview** > **Recommendations tab**
47
+
1. Browse to **Identity** > **Overview** > **Recommendations tab**.
48
48
1. Select a recommendation from the list.
49
49
50
50

0 commit comments