Skip to content

Commit 9fd6eef

Browse files
authored
Merge branch 'main' into docs-editor/deployment-vdi-microsoft-defen-1724291600
2 parents ac7f11a + 528622c commit 9fd6eef

File tree

4 files changed

+127
-2
lines changed

4 files changed

+127
-2
lines changed

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -473,6 +473,8 @@
473473
href: app-guard-for-office-install.md
474474
- name: Data retention in Defender for Office 365
475475
href: mdo-data-retention.md
476+
- name: Privacy in Defender for Office 365
477+
href: mdo-privacy.md
476478
- name: External email senders - Microsoft 365 resources
477479
items:
478480
- name: Microsoft 365 services for external email senders

defender-office-365/mdo-privacy.md

Lines changed: 119 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,119 @@
1+
---
2+
title: Privacy in Microsoft Defender for Office 365
3+
f1.keywords:
4+
- NOCSH
5+
ms.author: chrisda
6+
author: chrisda
7+
manager: deniseb
8+
ms.date: 08/22/2024
9+
audience: ITPro
10+
ms.topic: conceptual
11+
ms.service: defender-office-365
12+
ms.localizationpriority: medium
13+
ms.collection:
14+
- m365-security
15+
- tier2
16+
ms.custom:
17+
description: Admins can learn about privacy in Defender for Office 365.
18+
search.appverid: met150
19+
appliesto:
20+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
21+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
22+
---
23+
24+
# Privacy in Microsoft Defender for Office 365
25+
26+
Microsoft Defender for Office 365 helps protect organizations against threats in email messages, links (URLs), file attachment, and collaboration tools. For more information about Defender for Office 365, see [Microsoft Defender for Office 365 overview](mdo-about.md).
27+
28+
## What do we collect?
29+
30+
We collect the following personal data as part of metadata when Microsoft 365 receives and processes email or Microsoft Teams messages:
31+
32+
- Display names
33+
- Email addresses
34+
- IP addresses
35+
- Domains
36+
37+
Microsoft gathers system execution metadata for offline machine learning, and IP address and sender reputation information to protect users from malicious email or to filter unwanted email. This protection includes proactive [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md) to remove messages that were already delivered.
38+
39+
All [reports in Defender for Office 365](reports-defender-for-office-365.md) are subject to End User Pseudonymous Identifiers (EUPI) and End User Identifiable Information (EUII):
40+
41+
- Data is shared within the organization only and is stored as plain text.
42+
- All related data is securely stored in the organization's region.
43+
- Only authorized users in the organization can access the data.
44+
45+
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using ODL and CDP encryption (no clear text). Defender for Office 365 uses this data for the following features:
46+
47+
- Threat protection policies to set the appropriate level of protection for your organization.
48+
- Real-time reports to monitor Defender for Office 365 performance in your organization.
49+
- Threat investigation and response capabilities that use leading-edge tools to investigate, understand, simulate, and prevent threats.
50+
- Automated investigation and response capabilities that save time and effort investigating and mitigating threats.
51+
- Advanced machine learning techniques and isolated detonation to detect the latest malware.
52+
53+
## Data location
54+
55+
Defender for Office 365 operates in the Microsoft Entra datacenters. For the following geo locations, data at rest for organizations that were provisioned in these geo locations is stored only in these geo locations:
56+
57+
- Australia
58+
- Brazil
59+
- Canada
60+
- The European Union
61+
- France
62+
- Germany
63+
- India
64+
- Israel
65+
- Italy
66+
- Japan
67+
- Norway
68+
- Poland
69+
- Qatar
70+
- Singapore
71+
- South Africa
72+
- South Korea
73+
- Sweden
74+
- Switzerland
75+
- United Arab Emirates
76+
- United Kingdom
77+
- United States
78+
79+
In Exchange Online Protection (EOP), the following data is stored at rest in the local region geo:
80+
81+
- Alerts
82+
- Attachments
83+
- Block lists (URLs, block entries in the Tenant Allow/Block List, user Blocked Senders lists)
84+
- Email metadata
85+
- Grading analysis
86+
- Junk email
87+
- Quarantined email and quarantined attachments
88+
- Reports
89+
- Service configuration data and policies
90+
- Spam domains
91+
- URLs
92+
93+
In Defender for Office 365, the following customer data is stored at rest in the local region geo:
94+
95+
- Alerts
96+
- Attachments
97+
- Block lists (URLs, block entries in the Tenant Allow/Block List, user Blocked Senders lists)
98+
- Email metadata
99+
- Grading analysis
100+
- Junk email
101+
- Quarantined email and quarantined attachments
102+
- Reports
103+
- Service configuration data and policies
104+
- Spam domains
105+
- URLs
106+
107+
## Data Retention
108+
109+
Data from Defender for Office is retained for 180 days in reporting and logs. When email and Microsoft Teams messages are sent to Microsoft 365, sender and recipient personal data is extracted. Data is stored and processed securely: personal information is encrypted and automatically deleted 30 days after the retention period.
110+
111+
Your data is available to you while the license is within the grace period or suspended. At the end of this period, the data is erased from Microsoft systems in an unrecoverable manner no later than 190 days from the end of the subscription or after user account deletion.
112+
113+
## Data sharing for Defender for Office 365
114+
115+
Defender for Office 365 shares data, including customer data, among the following Microsoft products, if they're also licensed by a customer:
116+
117+
- Microsoft 365 Defender XDR
118+
- Microsoft Sentinel
119+
- Audit logs

defender-xdr/security-copilot-m365d-guided-response.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: conceptual
1717
search.appverid:
1818
- MOE150
1919
- MET150
20-
ms.date: 04/01/2024
20+
ms.date: 08/22/2024
2121
---
2222

2323
# Triage and investigate incidents with guided responses from Microsoft Copilot in Microsoft Defender
@@ -73,7 +73,11 @@ To use guided responses, perform the following steps:
7373
> [!NOTE]
7474
> Grayed out action buttons mean these actions are limited by your permission. [Refer to the unified role-based access (RBAC) permissions](manage-rbac.md) page for more information.
7575
76-
Copilot in Defender supports incident response teams by enabling analysts to gain more context about response actions with additional insights. For remediation responses, incident response teams can view additional information with options like **View similar incidents** or **View similar emails**.
76+
Copilot helps speed up analysts' investigation tasks. When an incident requires further investigation on a user activity, Copilot suggests text that analysts can use to communicate with a user. The guided response card includes a **Contact user in Teams** or **Copy to clipboard** action that copies the suggested text to the clipboard. Analysts can then paste the text into an email or another communication tool. The analyst can also gain more context about the user through the **View user** action.
77+
78+
:::image type="content" source="/defender/media/copilot-in-defender/guided-response/guided-response-teams-message-main.png" alt-text="Screenshot that shows the suggested text for communication in a guided response card.":::
79+
80+
Copilot also supports incident response teams by enabling analysts to gain more context about response actions with additional insights. For remediation responses, incident response teams can view additional information with options like **View similar incidents** or **View similar emails**.
7781

7882
The **View similar incidents** action becomes available when there are other incidents within the organization that are similar to the current incident. The Similar incidents tab lists similar incidents that you can review. Microsoft Defender automatically identifies similar incidents within the organization through machine learning. Incident response teams can use the information from these similar incidents to classify incidents and further review the actions done in those similar incidents.
7983

51.7 KB
Loading

0 commit comments

Comments
 (0)