- O365 Compliance Center Url
- O365 Compliance Center Download Mac Os
- O365 Compliance Center
- O365 Compliance Admin
- O365 Compliance Center Download Mac High Sierra
Microsoft Office 365 is popular because of its mobility and collaboration features. However, in a cloud-hosted environment, security is the main concern because new threats are constantly introduced. Your organization, therefore, needs to use all the tools at your disposal to secure your customers’ data.
Mar 07, 2018. The Security & Compliance Center uses a role-based access control (RBAC) authorization model just like the other Office 365 services use. The roles and permissions you assign here grant users permissions only to the Security & Compliance Center.; The use case here is that you could, for example, grant select Legal team users membership to the built-in eDiscovery Manager role, and Compliance. Modern workplace training. Learn how to get more work done, from anywhere on any device with Microsoft 365 and Windows 10. Discover how industry professionals leverage Microsoft 365 to communicate, collaborate, and improve productivity across the team and organization. May 10, 2019. When you download search results (described in Step 2), you can increase the download speed by configuring a Windows Registry setting on the computer you use to export the search results. For more information, see Increase the download speed when exporting eDiscovery search results from Office 365.
This is why Office 365 offers built-in capabilities and customer controls to help customers meet compliance standards. Let’s look at the security and governance feature available in all major services.
Want to make your Office 365 instance more secure? Get more information on Office Protect here!
Office 365 Security and Compliance Features
1) Multi-Factor Authentication
Multi-factor authentication requires more than just a username and password. After users logged in with a username and password, they’ll receive a phone call or text message (depending on the configuration). Then they either answer the call or enter the access code received via text into the browser.
This can be set up on a user-by-user basis. For example, if you only want to set MFA on a particular group such as higher officials or company leads and not on the entire organization, it can be done with few clicks.
IP addresses can be whitelisted, meaning that, when users are at the office, they don’t need to use multi-factor authentication. This will only be required if they’re somewhere else.
Multi-factor authentication is a free feature available on all Office 365 plans. If your organization has an Azure AD premium plan or On-premises Identity Federation with Office 365 you can configure a more advanced level of MFA such as Biometric or Smartcard. The configuration of Multi-factor authentication is only a few steps that you must follow in Office 365 and can be enabled from an Office 365 Admin center.
Check out this blog: Is Offce 365 HIPAA Compliant?
2) App Passcode
An app password is a code that gives an app or device permission to access an Office 365 account of your users. If you’re using Multi-Factor Authentication and want to use applications that connect to your Office 365 account, you will need to create an Office 365 App Password. This is to enable the App to connect to Office 365.
For example, if you’re using Outlook 2016 or an earlier version, Apple Mail App, Skype for Business or any other third party client with Office 365, you’ll need to create an App Password. Creating an Office 365 App Password is really easy to do. One can say it’s another level of security added to the Office 365 user login process.
3) Office 365 Trust Center
Microsoft created a site called Office 365 Trust Center. It covers everything regarding security, including:
- Physical security: Can people walk in and out at data centers? How are the buildings physically secured?
- Logical security: How are servers configured? What kind of network security is applied? What kind of auditing is implemented?
- Data security: How is the actual data secured? If someone gains access to the database, are they able to read your data?
The site can be accessed via link Microsoft Trust Center.
4) Role-Based Access Control
Role-Based Access Control (RBAC role) is a feature designed to control the administrative access over different services across Office 365. It requires the ability to control these services by separate administrators.
The best example to have such role-based access on the services is the following: let’s say you hired a SharePoint Developer, who will be designing and customizing your SharePoint sites, for a short time period. In that case, he will need admin level access to the SharePoint admin center and this can be achieved by assigning SharePoint administrators rights. You don’t need to give control of the complete environment to an outsider.
Below is the list of User Roles is available in Office 365:
- Global Administrator
- Billing Administrator
- Exchange Administrator
- SharePoint Administrator
- Password Administrator
- Skype for Business Administrator
- Compliance Administrator
- Service Administrator
- User management Administrator
- Dynamics 365 (online)
- Dynamics 365 service Administrator
- Power BI Administrator
5) Alerts
In the Security and Compliance Center, you can track a new activity and monitor user’s actions on the portal. You can configure policies to get alerts when updates take place. If a user performs any new update activity, an alert is triggered as per the conditions applied by the administrator.
6) Office 365 Security Reports
Security Reports are available in the Security and Compliance Center. These reports are available in the Report Dashboard and give you a graphical representation of the policies. You can see or download the reports such as DLP policy matches, Malware detection, Spoof and Spam Detection and many others.
There is another category of reports available called as Usage and Activity Report, which gives you data as per each service. It is available in the Office 365 Admin center.
7) Content Search
The ability to search across data is increasingly important, and Microsoft is now offering a lighter, quicker way to search across Office 365. Content Search can be used to find data in individual or all Exchange mailboxes, SharePoint sites, OneDrive for Business locations, and Skype for Business.
This feature is helpful in terms of searching a specific type of information stored or shared across the organization. For example, if a user lost some important file that was sent to someone via email in the past, can be recovered by searching all mailboxes where admin only needs to query the name of the attachment.
There are no limits on the number of content locations that you can search. There are also no limits on the number of searches that can run at the same time. After you run a content search, the number of content locations and an estimated number of search results are displayed in the details pane on the Content search page. After running a search you can preview the results, get keyword statistics for one or more searches, bulk-edit content searches, and export the results to a local computer. This feature is available under the Security and Compliance Center.
O365 Compliance Center Url
8) Audit Log Search
In large organizations, it is a very common requirement to track the user and administrator’s actions on the services. Whether it is an administrator going rogue or a regular user deleting an important business document, it is equally harmful to an organization. While there are many ways to restrict and control access to Office 365, it is still important that there’s an audit log available with this required information. This is where Audit log search in Office 365 Security & Compliance Center comes to the picture.
Auditing can be performed on almost all major services and actions in Office 365 such as editing, uploading and deletion of a document in SharePoint, OneDrive, and Group sites. Mailbox permission and personal inbox email activity to user creation to deletion. Auditing can be easily done in the Security and Compliance Center and you can also perform a more granular level of auditing via PowerShell.
9) Azure AD Connect and Single Sign On
Azure Active Directory provides access control and identity management capabilities for Office 365 cloud services. Azure AD Connect allows you to synchronize on-premises active directory objects with Microsoft Office 365 cloud services. This allows you to provide a common identity for your users for Office 365, Azure, and SaaS applications integrated with Azure AD.
O365 Compliance Center Download Mac Os
Azure AD Connect is made up of three main components, namely Sync Services, AD FS and Health Monitoring. The Sync services component is the old DirSync and is responsible for replicating on-premises Active Directory users and groups to the Office 365 cloud. AD FS is an optional component and can be used to set up a Hybrid environment with Office 365. Features like SSO, sign-on policy, smart cards, etc. are available after Hybrid setup. The health monitoring component of Azure AD Connect allows you to monitor On-Premises active directory and synchronized objects using Azure AD Connect Health Portal.
10) Mobile Device Management via Intune
O365 Compliance Center
Intune is Microsoft’s mobile device and mobile application management solution. It’s typically available as part of Microsoft’s Enterprise Mobility + Security licensing bundle. Intune allows you to manage employee mobile devices and apps from a single dashboard. Manage across Android, iOS and Window devices. It also allows you to centrally manage the deployment of updates and applications to keep your workers at peak productivity. Key features of Intune are:
- Protect your company information by helping to control the way your workforce accesses and shares it.
- Manage the mobile devices your workforce uses to access company data.
- Manage the mobile apps your workforce uses.
- Ensure devices and apps are compliant with company security requirements.
- Apply conditional access policies so users can follow organization-based access policies even when they are not on the office premises.
11) Conditional Access via Azure AD
Azure Active Directory (Azure AD) enforces conditional access policies to help secure access to Office 365 services. You can create a conditional access policy that blocks a user who is using a noncompliant device from accessing an Office 365 service. The control capabilities in Azure Active Directory (Azure AD) conditional access offer simple ways to help secure resources in the cloud. Conditional access policies like multi-factor authentication can help protect against the risk of stolen and phished credentials. Other conditional access policies can help keep your organization’s data safe. For example, in addition to requiring credentials, you might have a policy that only devices that are enrolled in a mobile device management system, like Microsoft Intune, can access your organization’s sensitive services. With conditional access control in place, Azure AD checks for the specific conditions you set for a user to access an application. After access requirements are met, the user is authenticated and able to access the application. Conditions can be Group Membership, Location, Device platform, etc.
Policies are applied on the Mobile Platforms, Applications, and Browsers below:
- Windows domain-joined & Windows 10 Mobile work or personal devices
- Windows 7
- Windows 8 / 8.1
- Windows 10
- Windows Server 2008 R2
- Windows Server 2012 R2
- Windows Server 2016
- Windows Phone
- IOS and Android devices
- Mac OS
- Internet Explorer
- Chrome Browser
- Safari Browser
- Edge Browser
Conditional access features can be leveraged by having Azure AD Premium Subscription.
12) Office 365 Advance Reporting via Azure AD
To look for unusual or suspicious sign-in activities in your Office 365 organization, you can use sign-in and activity reports in Microsoft Azure. You can gain insights into how your environment is doing. The most exciting thing with these reports is that it collects data as your per Geolocation and irregular sign-in behavior. In situations where you try to sign in to Office 365 from 1000 miles away from your regular sign in location (IP-based tracking), it notifies the administrator via email and logs this detail in the report with the current IP address, device type, and other details.
The provided data enables you to:
- Determine how your apps and services are utilized by your users
- Detect potential risks affecting the health of your environment
- Troubleshoot issues preventing your users from getting their work done
There are two types of activity reports in Azure Active Directory:
Audit logs: The audit logs activity report provides you with access to the history of every task performed in your tenant.
Sign-ins: With the sign-ins activity report you can determine who has performed the tasks reported by the audit logs report.
13) Microsoft Advanced threat Analytics
Advanced Threat Analytics is meant to help businesses block targeted attacks by automatically analyzing, learning and identifying all normal and abnormal behavior.
Microsoft ATA can identify advanced persistent threats, as well as other malicious activity, better than traditional defenses because it is continuously learning about how users, devices, and network resources interact. It is also able to detect when these patterns change.
This is a built-in security feature by Microsoft in the backend as a Machine learning or AI technique, which majorly protects the environment from malicious links and attachments in emails.

14) Password Policy
Every user account that needs to sign in to Office 365 must have a unique user principal name (UPN) or LOGIN ID attribute value associated with their account. Password restrictions are mentioned below:
- 8 characters minimum and 16 characters maximum
- Strong passwords only: Requires 3 out of 4 of the following:
- Lowercase characters
- Uppercase characters
- Numbers (0-9)
- Symbols (see password restrictions above)
You can set password expiration as per your company policy. This configuration can be done via PowerShell or from the Office 365 Admin Center Security settings.
After 10 unsuccessful sign-in attempts (wrong password), the user will be locked out for one minute. Further incorrect sign-in attempts will lock out the user for longer.
These are just some of the security and governance features that we find useful in Office 365. Do you have any features to add? Let us know in the comments below.
Sherweb makes Office 365 easy so you can focus on your business!
Download Our Free PowerPoint Deck!
7 Free Things You Can Do to Improve Your Office 365 Security Posture
Find out what you can be doing to better protect your clients, why you should be taking these precautions and a step by step guide of how to implement these procedures.
Microsoft 365 Roadmap: May 2018
The May 2018 Microsoft 365 Roadmap is a great way to obtain visibility into new features that are in the process of being rolled out within the Office 365 application. In other words, the Microsoft 365 Roadmap tracks updates as new features make there way through the development life-cycle. As a result, administrators have the ability to influence the architecture of their solutions, stay ahead of new features that can be leveraged by their organization, and address changes that might impact users in a negative way.
Definitions
The definitions of each phase of the development life cycle are:
- Launched: Fully released updates that are now generally available to users.
- Rolled Out: Updates that are available to a target group of users
- In Development: Updates that are in the early stages of development and testing
- Cancelled: Previously announced features that are no longer being developed
Other key definitions include:
Microsoft 365 Roadmap

O365 Compliance Admin
O365 Compliance Center Download Mac High Sierra
| Enhanced EOP/ATP Email Quarantine Capabilities |
| Microsoft To-Do steps |
| SharePoint: new Planner integration |
| Office 365 security and compliance center available in DoD cloud |
| SharePoint web part: Image (update) |
| Planner: SharePoint team site integration updates |
| Flow trigger for item deletion |
| Password protected links (consumer) |
| Updates to terminology used for Office 365 Groups, Distribution Lists, and Security Groups |
| Planner: Task commenting updates |
| Outlook for Windows: Lift 500 folder limit for shared mailboxes |
| Microsoft To-Do List Sharing |
| Customized Sharing Defaults per SharePoint Site Collection |
| Request sign-off via Flow |
| Versioning settings in OneDrive for Business, Groups and team sites in SharePoint Online |
| Outlook for Android: Add Office Lens images |
| SharePoint web parts: Document library and lists updates |
| Mail Flow Insights in Security & Compliance Center |
| Outlook for Mac: Create an Office 365 Group in Outlook |
| Transfer ownership for deleted users |
| Security & Compliance Center Message Trace |
| Enhanced list-library view web part |
| Data Privacy tab in the Security & Compliance Center |
| Page management |
| Index large lists and complex field types |
| Known Folder Move for ODB |
| Outlook Calendar: Option to block forwarding of meeting invites |
| Outlook for Mac: Teams Integration |
| Camera Upload for ODB |
| External Sharing Reports |
| Admin tool :TeamSite auto-mount |
| Files On-Demand for SharePoint Server 2019 |
| Block Download in OneDrive |
| Exchange online PowerShell cmdlet to edit an Office 365 Group’s email addresses |
| Microsoft Secure Score support for new controls |
| Advanced eDiscovery: Search & Tagging |
| Advanced Data Governance: API for Event Based Retention |
| Privileged access management in Office 365 |
| Microsoft Cloud App Security – Conditional Access App Control |
| Full Microsoft AutoPilot/Intune support |
| Malware Detect |
| Outlook calendar – automatic processing of small changes in meeting details |
| Outlook for Windows: Option to change the default end time for meetings and appointments |
| Microsoft Bookings – online payments for E3, E5, A3, and A5 subscriptions |
| Tenant branding of sharing emails |
| Password protected links (ODB) |
| New Scan Experience(ODB+ODC) |
| Better manage permissions UI |
| Smart people picker(Web only) |
| Desktop Notifications for sharing |
| SharePoint and Teams: pick news articles and lists as tabs in teams |
| SharePoint and Teams: folder in site visibly connected to channel |
| SharePoint and Teams: connect site to a Team in one click |
| SharePoint hub sites: site scripting during site association |
| SharePoint hub sites: approvals for site association |
| SharePoint hub sites: add rich color to header |
| SharePoint news: save for later (Web) |
| SharePoint organizational news: hub site news web part update |
| SharePoint mobile: notifications on page likes |
| Office 365 Data Governance: Deletion Report |
| Office 365 Data Governance: File Plan Builder |
| Microsoft Secure Score localization |
| Microsoft Secure Score support for new controls |
| Microsoft Secure Score support for delegated administrators |
| Microsoft Secure Score API Update |
| Intelligent Discovery for Windows Phone |
| Microsoft Invoicing |
| Exchange Online Protection phishing protection |
| Microsoft Connections |
| Microsoft Listings |