<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-fasttrack/ct-p/FastTrack</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Wed, 15 Oct 2025 21:44:37 GMT</pubDate>
    <dc:creator>FastTrack</dc:creator>
    <dc:date>2025-10-15T21:44:37Z</dc:date>
    <item>
      <title>Intermittent Delay in Loading Files Tab in Microsoft Teams Channels</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/intermittent-delay-in-loading-files-tab-in-microsoft-teams/m-p/4460354#M420</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Within our municipality, we are experiencing an intermittent issue where the &lt;STRONG&gt;Files tab in Microsoft Teams channels takes &amp;gt;5 seconds to load&lt;/STRONG&gt;. This behavior appears to be random and is not tied to specific users, devices, or locations. We have conducted several internal checks and can confirm the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The issue occurs in both small and large Teams channels, regardless of the number of files or folders.&lt;/LI&gt;&lt;LI&gt;It affects various Surface laptops, so it does not appear to be device-specific.&lt;/LI&gt;&lt;LI&gt;It happens both inside and outside our municipal buildings, ruling out local network dependency.&lt;/LI&gt;&lt;LI&gt;We exclusively use Microsoft products, including Surface devices, Microsoft Defender, and Intune for device management.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;We would like to know:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is this a known issue within Microsoft Teams?&lt;/LI&gt;&lt;LI&gt;Are there specific &lt;STRONG&gt;tenant-level settings&lt;/STRONG&gt; or &lt;STRONG&gt;Intune configurations&lt;/STRONG&gt; that could influence the performance of the Files tab?&lt;/LI&gt;&lt;LI&gt;Are there any recommended diagnostics or optimizations we can apply to improve consistency?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We appreciate any guidance or insights you can provide.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;&lt;STRONG&gt;Dick Noort&lt;/STRONG&gt;&lt;BR /&gt;Advisor Information Services&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 13:20:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/intermittent-delay-in-loading-files-tab-in-microsoft-teams/m-p/4460354#M420</guid>
      <dc:creator>dicknoort715</dc:creator>
      <dc:date>2025-10-09T13:20:31Z</dc:date>
    </item>
    <item>
      <title>Ready to accelerate your Zero Trust journey? Discover what’s next</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/ready-to-accelerate-your-zero-trust-journey-discover-what-s-next/ba-p/4458866</link>
      <description>&lt;P&gt;&lt;STRONG&gt;For admins | &lt;/STRONG&gt;&lt;STRONG&gt;1-minute read&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Zero Trust isn’t just a security buzzword—it’s the new baseline for protecting your organization in a world where threats are always evolving.&lt;/P&gt;
&lt;P&gt;But what does it &lt;EM&gt;really&lt;/EM&gt; take to move from strategy to action?&lt;/P&gt;
&lt;P&gt;Find out by reading our recent blog, &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2337627" target="_blank" rel="noopener"&gt;Accelerate your Zero Trust journey: Using the Microsoft Zero Trust workshop for impact&lt;/A&gt; on the M365 Accelerator site. In it, we break down some of the real-world challenges IT admins face and show how this hands-on workshop can help you build a clear roadmap forward.&lt;/P&gt;
&lt;P&gt;For example, learn how you can use the workshop to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Assess and improve your security posture by &lt;/STRONG&gt;evaluating your organization’s current security maturity across six critical Zero Trust pillars (Identity, Devices, Data, Network, Infrastructure, Security Operations), identify gaps, and prioritize actions for improvement.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Drive cross-team alignment and executive buy-in&lt;/STRONG&gt; by bringing together stakeholders from security, infrastructure, networking, and compliance for communication, consensus building, and creating a data-driven roadmap that resonates with leadership.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Turn security strategy into actionable results with &lt;/STRONG&gt;practical steps for leveraging the Zero Trust Workshop to transform security from a reactive task into a proactive, strategic advantage for your organization.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;Next steps&lt;/H1&gt;
&lt;P&gt;Ready to move beyond theory and see how Microsoft’s approach can help you secure identities, apps, and data?&lt;/P&gt;
&lt;P&gt;Then &lt;STRONG&gt;Accelerate your Zero Trust journey&lt;/STRONG&gt; is your next must-read.&lt;/P&gt;
&lt;P&gt;Get the &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2337627" target="_blank" rel="noopener"&gt;full story and workshop details here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 16:40:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/ready-to-accelerate-your-zero-trust-journey-discover-what-s-next/ba-p/4458866</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-10-03T16:40:32Z</dc:date>
    </item>
    <item>
      <title>Governing Copilot agents: Your next step starts here</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/governing-copilot-agents-your-next-step-starts-here/ba-p/4446182</link>
      <description>&lt;P&gt;For those of you navigating this shift, Rob Howard, Microsoft’s VP of Product Management for Microsoft 365 Copilot Extensibility, offers a practical governance framework in his article, &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2333222" target="_blank" rel="noopener"&gt;&lt;EM&gt;What IT admins need to know about governing AI agents&lt;/EM&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The article introduces three key governance pillars:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Security controls&lt;/STRONG&gt; using Microsoft Purview.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Management controls&lt;/STRONG&gt; through admin centers and deployment planning.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agent reporting&lt;/STRONG&gt; to monitor usage and stay ahead of compliance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You’ll also get a first look at governance zones—a planning model to help segment Copilot deployment based on your organization’s risk tolerance and data sensitivity. Think sandbox, controlled, and trusted zones, with guidance on how to phase rollout.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What else you’ll find:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;A checklist &lt;/STRONG&gt;to assess your readiness.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Real-world examples &lt;/STRONG&gt;of phased deployment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Links to tools you already use&lt;/STRONG&gt;, like Purview, Power Platform admin center, and Microsoft 365 admin center.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;A preview&lt;/STRONG&gt; of the upcoming white paper and webinar.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Next Steps&lt;/H2&gt;
&lt;P&gt;Ready to securely and strategically lead your organization into the future of AI?&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2333222" target="_blank" rel="noopener" data-tabster="{&amp;quot;restorer&amp;quot;:{&amp;quot;type&amp;quot;:1}}"&gt;Read Rob’s blog&lt;/A&gt; today for reliable advice on governing Copilot agents. It’s part of a broader initiative by FastTrack for Microsoft 365 to support IT admins with actionable, admin-relevant content on governing Copilot AI agents—so stay tuned for future articles, webinars, and more on the topic!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2025 23:42:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/governing-copilot-agents-your-next-step-starts-here/ba-p/4446182</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-08-22T23:42:47Z</dc:date>
    </item>
    <item>
      <title>Bring AI out of the shadows with agents for Microsoft 365 Copilot Chat</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/bring-ai-out-of-the-shadows-with-agents-for-microsoft-365/ba-p/4426846</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For IT admins and Microsoft 365 admins&lt;/STRONG&gt;&lt;BR /&gt;7-minute read&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Overview&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Shadow AI is almost certainly happening across your organization—whether you can see it or not. Employees are using tools like ChatGPT and Notion AI to get work done, even without organizational knowledge or approval. This creates real risks like data leakage, compliance violations, and a lack of visibility into how employees are using artificial intelligence.&lt;/P&gt;
&lt;P&gt;Fortunately, IT admins are in a unique position to fix the problem at its core.&lt;/P&gt;
&lt;P&gt;Today's article is intended to be a practical playbook for helping IT admins lead the charge toward responsible AI use in their organizations by empowering secure, compliant, and easy-to-manage agents for Microsoft 365 Copilot Chat.&lt;/P&gt;
&lt;H2&gt;What is shadow AI?&lt;/H2&gt;
&lt;P&gt;Like shadow IT, the term ‘shadow AI’ exists for a reason: it refers to unsanctioned, often hidden, use of AI tools.&lt;/P&gt;
&lt;P&gt;In the shadows, artificial intelligence can be hard to detect and even harder to govern. Tools can be browser-based, embedded in SaaS apps, or used on personal devices. Controls that mitigate shadow IT—like app blocking or firewall rules—don’t necessarily translate to AI use.&lt;/P&gt;
&lt;P&gt;Both shadow IT and shadow AI involve technical and behavioral elements, however unauthorized use of AI presents deeper behavioral challenges beyond unauthorized tools. These challenges center around how users make decisions and potentially bypass governance in ways that are harder to detect and control.&lt;/P&gt;
&lt;P&gt;While employees may not &lt;EM&gt;want&lt;/EM&gt; to go rogue or bypass IT—and they generally don’t want to put the organization at risk—they do want to get their work done efficiently. They turn to public AI tools when &lt;EM&gt;they can’t find the capabilities they need inside the tools they have permission to use&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;Agents for Microsoft 365 Copilot Chat give you a way to lead AI use into the light and meet your users’ needs with &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2325458" target="_blank" rel="noopener"&gt;modern AI business tools&lt;/A&gt;. By building and deploying task-specific, data-grounded chat experiences that live inside Microsoft 365, users get fast, relevant answers they’re looking for&amp;nbsp;&lt;EM&gt;without having to step into the shadows and leave the secure environment you manage&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;These agents are part of the broader Microsoft 365 Copilot ecosystem and are designed to automate and execute business processes directly within Copilot Chat.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Should you ignore or even allow shadow AI?&lt;/H2&gt;
&lt;P&gt;When employees use public AI tools without oversight, they create risks that are harder to detect, harder to govern, and harder to reverse.&lt;/P&gt;
&lt;P&gt;For IT admins, the stakes are high for operational, security, and technical risks:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Loss of visibility and control: &lt;/STRONG&gt;You can’t protect what you can’t see.&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Shadow AI obscures oversight.&lt;/STRONG&gt; It’s harder to track usage or enforce policies for tools used outside your environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;No centralized monitoring = no control.&lt;/STRONG&gt;&amp;nbsp;Without a unified view, you can’t troubleshoot issues, optimize usage, or step in when something goes wrong.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Shadow data silos emerge.&lt;/STRONG&gt; Generative AI content created outside your tenant isn’t retained or governed, which complicates lifecycle management, legal holds, and compliance requests.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Security and compliance risks&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enterprise-grade protections are lacking.&lt;/STRONG&gt; Most public AI tools don’t support conditional access, audit logs, or data loss prevention (DLP) policies, leaving you with blind spots and increased risk of data leaks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Sensitive data exposure.&lt;/STRONG&gt; Employees may unknowingly input proprietary or regulated data into public models, risking violations of GDPR, HIPAA, or internal policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance gaps.&lt;/STRONG&gt; If tools aren’t tracked or documented, they increase the burden of proving compliance and can become major liabilities during audits or regulatory reviews.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; IT and governance challenges&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;IT is out of the loop.&lt;/STRONG&gt; Adoption of unauthorized AI tools sidelines IT, preventing teams from recommending secure, supported alternatives or aligning tools with organizational standards. When users go rogue with AI tools, they aren't using recommended secure, supported options that align with your environment and policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tool sprawl = more support tickets&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt; Unapproved tools often lack integration with existing systems, creating support burdens and increasing the risk of misconfigurations.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Bottom line&lt;/STRONG&gt;: Allowing or ignoring shadow AI will make it much harder to manage later. That’s why Copilot Chat agents, combined with strong governance and user education, are such a powerful response: they give you a way to meet end user demand without losing control.&lt;/P&gt;
&lt;H3&gt;What IT admins are up against&lt;/H3&gt;
&lt;P&gt;When it comes to eradicating rogue AI, admins have their work cut out for them. Here’s a summary table of how activating Copilot Chat agents at your organization can help stem the tide:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-5 lia-border-color-10 lia-border-style-outset" border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Unsanctioned AI use contributes to:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;How to stem the problem:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Loss of visibility and control&lt;/STRONG&gt;&lt;BR /&gt;Employees use unsanctioned AI tools.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Reframe shadow AI as a signal&lt;/STRONG&gt;&lt;BR /&gt;Offer sanctioned tools that meet user needs and bring AI usage into the light.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Data governance gaps&lt;/STRONG&gt;&lt;BR /&gt;Unapproved tools bypass DLP and compliance policies.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Keep data in your tenant&lt;/STRONG&gt;&lt;BR /&gt;Copilot agents respect Microsoft 365 compliance, identity, and data boundaries.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Inconsistent AI use across teams&lt;/STRONG&gt;&lt;BR /&gt;Different tools create fragmented workflows.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Centralize AI access&lt;/STRONG&gt;&lt;BR /&gt;Deploy agents across Teams and Microsoft 365 to unify usage.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Security and compliance risks&lt;/STRONG&gt;&lt;BR /&gt;Shadow tools may not meet regulatory standards.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Use enterprise-grade protection&lt;/STRONG&gt;&lt;BR /&gt;Copilot agents are authenticated with Azure AD and governed by Microsoft Purview.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Lack of deployment clarity&lt;/STRONG&gt;&lt;BR /&gt;Admins may not know where to start.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Follow a clear blueprint&lt;/STRONG&gt;&lt;BR /&gt;This blog outlines steps for setup, governance, and scaling.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Missed innovation opportunities&lt;/STRONG&gt;&lt;BR /&gt;IT is seen as a blocker, not a partner.&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Support safe innovation&lt;/STRONG&gt;&lt;BR /&gt;Let business units build AI chat agents with IT guardrails in place.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Copilot Chat agents remove the roadblocks to getting value from AI&lt;/H3&gt;
&lt;P&gt;Microsoft's chat agents aren’t just another AI tool—they’re designed to work the way IT works.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure by design&lt;/STRONG&gt;: Agents run inside your Microsoft 365 tenant and authenticate through Azure AD.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliant by default&lt;/STRONG&gt;: They respect DLP and audit policies and retention through Microsoft Purview.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Customizable and governable&lt;/STRONG&gt;: You can define access, data sources, and usage policies.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Easy to deploy&lt;/STRONG&gt;: Agents live inside Teams and Microsoft apps, so users don’t need to install anything new.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Copilot Chat agents strengthen governance&lt;/H3&gt;
&lt;P&gt;While Copilot for Microsoft 365 helps users work more efficiently inside apps like Word, Excel, and Teams, Copilot's AI agents go a step further. They give IT the ability to create task-specific, role-based, and data-grounded AI experiences that directly replace the kinds of tools employees might otherwise seek out on their own.&lt;/P&gt;
&lt;H3&gt;Key deployment benefits for IT admins&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-background-color-5 lia-border-color-10 lia-border-style-inset" border="1" style="border-width: 1px;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Benefit&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Visibility&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;Know who’s using AI, how, and with what data.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Control&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;Define and enforce usage policies.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Compliance&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;Align AI use with regulatory standards.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Efficiency&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;Reduce support tickets with self-service agents.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;&lt;STRONG&gt;Innovation&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td class="lia-border-color-10"&gt;
&lt;P&gt;Empower business units without losing oversight.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H2&gt;Take the next step&lt;/H2&gt;
&lt;P&gt;Like shadow IT, you may not get rid of shadow AI completely or overnight. But you can meet it head-on with tools that work for your users and comply with your policies.&lt;/P&gt;
&lt;P&gt;Start by deploying a few AI Chat agents in high-impact areas. Use the resources in this article to guide your rollout.&lt;/P&gt;
&lt;P&gt;With Copilot Chat agents, you’re not just solving a technical problem. You’re leading your organization toward safer, smarter AI adoption.&lt;/P&gt;
&lt;H3&gt;Tools that make it easier&lt;/H3&gt;
&lt;P&gt;When it comes to Microsoft 365 deployments, you’re never alone. FastTrack for Microsoft 365 offers a full set of resources to help you learn about, build, manage, and instruct end users on Copilot Chat agents:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Credentialed access, sign in required:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2238685" target="_blank" rel="noopener"&gt;Microsoft 365 advanced deployment guides and assistance&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Microsoft 365 Copilot onboarding hub&lt;/LI&gt;
&lt;LI&gt;Microsoft 365 Copilot: Quickstart, Copilot Chat licensing&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Open access, no sign-in required:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Get started with &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2320131" target="_blank" rel="noopener"&gt;Microsoft 365 Copilot extensibility&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2297292" target="_blank" rel="noopener"&gt;Microsoft 365 Copilot ADG: Streamlining your Copilot journey&lt;/A&gt; (video)&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2325519" target="_blank" rel="noopener"&gt;Copilot Chat Success Kit &lt;/A&gt;– Microsoft Adoption&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://aka.ms/CopilotM365SetupDB" target="_blank" rel="noopener"&gt;Microsoft Copilot AI setup and usage guides&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2325458" target="_blank" rel="noopener"&gt;AI in business: Artificial intelligence tools &amp;amp; solutions&lt;/A&gt; (blog)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://setup.cloud.microsoft/microsoft-365-fasttrack-assistance" target="_blank" rel="noopener"&gt;Request assistance from FastTrack&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Deployment blueprint: Get started today&lt;/H2&gt;
&lt;P&gt;Remember: You don’t need to roll out everything at once. Start small, build momentum, and scale responsibly.&lt;/P&gt;
&lt;P&gt;Here’s a blueprint that will get you to the finish line:&lt;/P&gt;
&lt;H3&gt;Copilot Chat agent deployment checklist&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Prepare your environment&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;☐ Set up Copilot Studio and review licensing.&lt;/P&gt;
&lt;P&gt;☐ Create Power Platform environments that reflect your data boundaries and governance needs.&lt;/P&gt;
&lt;P&gt;☐ Identify early declarative agent use cases (e.g., HR FAQs, IT help desk).&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Note: Only declarative agents are currently supported in Copilot Chat. Agents that access tenant data (e.g., SharePoint, Graph) require pay-as-you-go billing.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Define governance policies&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;☐ Use role-based access control (RBAC) to manage who can create, publish, and use agents.&lt;/P&gt;
&lt;P&gt;☐ Apply naming conventions, approval workflows, and publishing guidelines.&lt;/P&gt;
&lt;P&gt;☐ Set up guardrails for data access, agent behavior, and knowledge sources.&lt;/P&gt;
&lt;P&gt;☐ Assign&amp;nbsp;maker permissions&amp;nbsp;via Microsoft Entra groups or Copilot Studio user licenses.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3: Deploy and monitor&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;☐ Use the &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2238685" target="_blank" rel="noopener"&gt;Microsoft admin center &lt;/A&gt;and Power Platform admin center to manage billing and access.&lt;/P&gt;
&lt;P&gt;☐ Monitor usage with audit logs, analytics, and the Copilot Control System.&lt;/P&gt;
&lt;P&gt;☐ Identify which teams are still using unauthorized AI tools and guide them toward approved Copilot agents.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4: Support and scale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;☐ Offer training, templates, and office hours to support agent creators and users.&lt;/P&gt;
&lt;P&gt;☐ Establish a Center of Excellence (CoE) to share best practices and governance.&lt;/P&gt;
&lt;P&gt;☐ Highlight successful use cases to drive adoption and build momentum.&lt;/P&gt;
&lt;P&gt;☐ Encourage feedback loops to refine agent behavior and expand scenarios.&lt;/P&gt;
&lt;H2&gt;Shadow AI prevention checklist&lt;/H2&gt;
&lt;P&gt;What else should you do to discourage shadow AI? Here's a handy checklist of actions to take:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Data protection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Apply &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2093022" target="_blank" rel="noopener"&gt;Microsoft Purview DLP policies&lt;/A&gt; to monitor and restrict sensitive data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Use sensitivity labels and encryption to protect data at rest and in transit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Set up conditional access policies to limit AI tool usage by role, device, or location.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Acceptable use&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Publish clear guidance on approved AI tools and data usage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Include AI-specific clauses in acceptable use and security policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Reinforce policies through onboarding, training, and regular reminders.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Monitoring and detection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Use Microsoft Defender for Cloud Apps (MCAS) to detect unsanctioned AI usage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Analyze browser traffic and app usage patterns for high-risk behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Set up alerts for uploads to known AI endpoints (e.g., ChatGPT, Claude).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Education and empowerment&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Run awareness campaigns about shadow AI risks and approved alternatives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Offer training on how to use Copilot and Copilot Chat agents effectively.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Create a feedback loop for users to request new AI capabilities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Internal partnerships&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Collaborate with HR, legal, and other teams to understand AI needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Support business units in building Copilot Chat agents with IT oversight.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Use shadow AI behavior as a signal for unmet needs and prioritize accordingly.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Governance alignment&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Align Copilot deployment with your organization’s responsible AI principles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Document how Copilot Chat agents support ethical and regulatory standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;☐ Use audit logs and analytics to support transparency and accountability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 22:17:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/bring-ai-out-of-the-shadows-with-agents-for-microsoft-365/ba-p/4426846</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-06-30T22:17:46Z</dc:date>
    </item>
    <item>
      <title>Driving adoption and measuring impact with the Microsoft 365 Copilot Dashboard</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/driving-adoption-and-measuring-impact-with-the-microsoft-365/ba-p/4414283</link>
      <description>&lt;P&gt;Since 2023, nearly &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2320471" target="_blank" rel="noopener"&gt;70%&lt;/A&gt; of Fortune 500 companies have &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2320471" target="_blank" rel="noopener"&gt;integrated Microsoft 365 Copilot’s advanced AI into their daily workflows&lt;/A&gt;, unlocking new efficiencies and streamlining collaboration—and they’re seeing measurable business impact.&lt;/P&gt;
&lt;P&gt;For example, Vodafone&amp;nbsp;discovered employees who use Copilot save an average of&amp;nbsp;3 hours per week, reclaiming 10% of their workweek. Lumen Technologies estimates that using Copilot will help their sales teams save $50 million per year.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are game-changing outcomes. But how do these companies know their numbers are accurate? And how did they achieve them? The key to maximizing the value of AI-driven productivity tools is more than simply licensing your end users and waiting for them to make the most of it. In fact, the key lies in &lt;STRONG&gt;measuring its impact&lt;/STRONG&gt;. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;To drive meaningful adoption and maximize ROI with Microsoft 365 Copilot, organizational leaders need clear visibility into how their workforces are using it. This means understanding:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Who’s adopting AI with Copilot.&lt;/LI&gt;
&lt;LI&gt;How effectively is Copilot supporting workflows.&lt;/LI&gt;
&lt;LI&gt;What measurable productivity gains are users achieving.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this article, business leaders and IT can learn more about the Microsoft 365 Copilot dashboard, including its key features and core metrics.&lt;/P&gt;
&lt;P&gt;We'll also go over IT's tasks for configuring the dashboard and granting access to business leaders so they can analyze Copilot usage patterns themselves, refine their Copilot engagement strategies, and help drive productivity gains in their teams and throughout the organization.&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;What is the Copilot Dashboard?&lt;/H2&gt;
&lt;P&gt;The Microsoft Copilot Dashboard is a tool in Viva Insights that helps IT, business leaders, change managers, and other non-technical stakeholders track usage of Microsoft 365 Copilot with practical insights they can use to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Prepare users to work effectively with AI&lt;/LI&gt;
&lt;LI&gt;Drive Copilot adoption across teams&lt;/LI&gt;
&lt;LI&gt;Measure impact on workplace behavior&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Key features and core metrics of the Copilot Dashboard&lt;/H3&gt;
&lt;P&gt;With a Viva Insights license, your unlock advanced dashboard features, including:&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Comprehensive Metrics &lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;A 28-day aggregated view of Copilot usage, adoption, readiness, and impact, to help you understand engagement and Copilot business value.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Readiness tracking&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Based on Microsoft 365 app usage patterns, these metrics can help you identify which teams are ready to adopt AI into their daily workflows and which may need additional support, training or upskilling.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;Adoption insights&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;With adoption insights, dashboard users can track active Copilot usage patterns within each Microsoft 365 app to measure how effectively teams are integrating Copilot into workflows. They can also pinpoint areas where Copilot users may need training or support to maximize productivity. By default, the dashboard’s Adoption trendline shows the prior six-month trend for all users in the organization. You can adjust filters at the top of the page for specific groups.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG style="color: rgb(30, 30, 30); font-size: 24px;"&gt;Impact analysis&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This insight allows you to analyze how often employees in your organization use Copilot during a specified time period. Leaders can also measure productivity gains through metrics like meeting efficiency, email usage, and document collaboration.&lt;/P&gt;
&lt;P&gt;Advanced tools, such as before-and-after behavioral data and employee surveys, can reveal early and even deeper insights into Copilot’s organizational impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;Learning opportunities&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Use qualitative feedback data from &lt;STRONG&gt;Copilot impact pulse surveys&lt;/STRONG&gt;&amp;nbsp;to identify Copilot satisfaction levels, challenges, and areas for improvement.&lt;/P&gt;
&lt;P&gt;For example, you can compare high-adoption teams with low-adoption ones to uncover training or awareness gaps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Managing the Copilot Dashboard: Key admin responsibilities&lt;/H2&gt;
&lt;P&gt;Global admins play a critical role in &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2267974" target="_blank" rel="noopener"&gt;configuring and managing the Copilot Dashboard&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Their roles include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Setting up and configuring the Copilot Dashboard.&lt;/LI&gt;
&lt;LI&gt;Granting access and supporting business stakeholders.&lt;/LI&gt;
&lt;LI&gt;Integrating data.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;1. Setting up and configuring the Microsoft 365 Copilot Dashboard&lt;/H3&gt;
&lt;P&gt;Global IT admins are responsible for setting up and configuring the Copilot Dashboard to align with organizational goals and requirements. This includes managing settings and turning features on and off as needed.&lt;/P&gt;
&lt;H3&gt;2. Granting access and supporting business stakeholders&lt;/H3&gt;
&lt;P&gt;Admins, you'll also need to assign permissions to specific leaders, stakeholders, or groups through the &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2070783" target="_blank" rel="noopener"&gt;Microsoft 365 admin center&lt;/A&gt; or PowerShell. Make sure stakeholders in different roles have the correct permissions.&lt;/P&gt;
&lt;P&gt;You'll also play a critical role in supporting and troubleshooting issues that users might encounter, such as technical problems and related assistance.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Who should have access to the Copilot Dashboard?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;STRONG&gt;Business leaders&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;You can view engagement and adoption metrics directly and make informed decisions about how best to guide users on adopting Copilot.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Department heads&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;You'll want to monitor how your teams are using Copilot and identify areas for improvement.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;IT managers&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;You'll need to oversee the technical aspects of Copilot deployment and ensure smooth operations.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;HR Managers&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Track employee sentiment and impact metrics for workforce planning and development.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;How do admins grant access to the Copilot Dashboard?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;You can delegate and manage access for individuals or groups to the dashboard in two different ways:&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;1. The Microsoft 365 admin center&lt;/STRONG&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;Access&lt;STRONG&gt; &lt;/STRONG&gt;the&lt;STRONG&gt; &lt;A href="https://go.microsoft.com/fwlink/?linkid=2267974" target="_blank" rel="noopener"&gt;Copilot Dashboard here&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;or&lt;/LI&gt;
&lt;LI&gt;Sign in to &lt;A href="https://go.microsoft.com/fwlink/?linkid=2070783" target="_blank" rel="noopener"&gt;Microsoft 365 admin center&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to the &lt;STRONG&gt;Settings&lt;/STRONG&gt; tab&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Setup&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Go to the &lt;STRONG&gt;Copilot Dashboard&lt;/STRONG&gt; to &lt;STRONG&gt;Manage access settings&lt;/STRONG&gt;. From there you can search for and select users to grant or revoke access.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Manage access for groups by selecting the &lt;STRONG&gt;Groups&lt;/STRONG&gt; option, searching for Entra ID groups, and adding or removing users as needed.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;2. PowerShell&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Viva Insights admins can delegate access to organizational insights and the Copilot Dashboard using PowerShell.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Set policies to enable or disable access to the dashboard at the tenant level using PowerShell cmdlets. This method gives you more granular control. Use it to manage access for larger groups or the entire organization.&lt;/P&gt;
&lt;P&gt;Note: You can only delegate access to users with a Viva Insights license. Viva Insights is available as part of the Microsoft Viva Suite or as a standalone add-on to Microsoft 365 enterprise plans.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;How&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;do business stakeholders access the Copilot Dashboard?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Business stakeholders, you can &lt;STRONG&gt;access the Microsoft 365 Copilot Dashboard through your Teams Viva Insights app&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H3&gt;3. Integrating organizational data into the dashboard&lt;/H3&gt;
&lt;P&gt;Admins will upload organizational data directly through the admin center and configure it for analysis. If both the Viva Insights admin and the Global admin upload data, the dashboard will merge these uploads and display insights based on the most recent data.&lt;/P&gt;
&lt;H2&gt;Empowering business stakeholders with insights they can act on&lt;/H2&gt;
&lt;P&gt;Microsoft 365 Copilot is transforming productivity, and metrics powered by Viva Insights are proving its impact to the world.&lt;/P&gt;
&lt;P&gt;Access the Copilot Dashboard today for yourself and unlock Copilot’s full potential for driving organizational success.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;P&gt;For more information on connecting to the Copilot Dashboard for Microsoft 365 customers, watch our recent video,&amp;nbsp;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2321702" target="_blank" rel="noopener"&gt;AI Transformation: Maximize the value of Copilot with Copilot Dashboard&lt;/A&gt; and check out our article: &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2321701" target="_blank" rel="noopener"&gt;Connect to the Microsoft Copilot Dashboard for Microsoft 365 customers | Microsoft Learn.&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;Need more assistance? FastTrack is here to help!&lt;/H2&gt;
&lt;P&gt;FastTrack is available to support customers with&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2267193" target="_blank" rel="noopener"&gt;eligible licenses&lt;/A&gt;. &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2267262" target="_blank" rel="noopener"&gt;Request assistance from FastTrack&lt;/A&gt; today or contact your assigned FastTrack Architect (FTA).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 18:35:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/driving-adoption-and-measuring-impact-with-the-microsoft-365/ba-p/4414283</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-05-29T18:35:37Z</dc:date>
    </item>
    <item>
      <title>Azure Firewall and Service Endpoints</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/azure-firewall-and-service-endpoints/ba-p/4404021</link>
      <description>&lt;P&gt;In my recent blog series &lt;A href="https://blog.cloudtrooper.net/category/privatelink/privatelinkrealitybites/" target="_blank"&gt;Private Link reality bites&lt;/A&gt; I briefly mentioned the possibility of inspecting Service Endpoints with Azure Firewall, and many have asked for more details on that configuration. Here we go!&lt;/P&gt;
&lt;P&gt;First things first: what the heck am I talking about? Most Azure services such as Azure Storage, Azure SQL and many others can be accessed directly over the public Internet. However, there are two alternatives to access those services over Microsoft's backbone: &lt;A href="https://learn.microsoft.com/azure/private-link/private-link-overview" target="_blank"&gt;Private Link&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/azure/virtual-network/virtual-network-service-endpoints-overview" target="_blank"&gt;VNet Service Endpoints&lt;/A&gt;. Microsoft's overall recommendation is using private link, but some organizations prefer leveraging service endpoints. Feel free to read &lt;A href="https://blog.cloudtrooper.net/2025/02/17/private-link-reality-bites-service-endpoints-vs-private-link/" target="_blank"&gt;this post &lt;/A&gt;on a comparison of the two.&lt;/P&gt;
&lt;P&gt;You might want to inspect traffic to Azure services with network firewalls, even if that traffic is leveraging service endpoints. Before doing so, please consider that sending high-bandwidth traffic through a firewall might have cost implications and impact on the overall application latency. If you still want to go ahead, this post is going to explain how to do it.&lt;/P&gt;
&lt;H1&gt;The Design&lt;/H1&gt;
&lt;P&gt;Service endpoints have two configuration parts:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Source subnet configuration to tunnel traffic to the destination service.&lt;/LI&gt;
&lt;LI&gt;Destination service configuration to accept traffic from the source subnet.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The key concept to understand is that if traffic from the client is going to be inspected by a firewall before going to the Azure service, then the source subnet is actually the Azure Firewall's subnet, not the original client's subnet:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;You can configure service endpoints for a specific Azure service on a subnet using the portal, Terraform, Bicep, PowerShell or the Azure CLI. In the portal this is what it looks like:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;For Azure CLI, enabling service endpoints for Azure Storage accounts in all regions would look like this:&lt;/P&gt;
&lt;PRE&gt;❯ subnet_name=AzureFirewallSubnet&lt;BR /&gt;❯ az network vnet subnet update -n $subnet_name --vnet-name $vnet_name -g $rg --service-endpoints Microsoft.Storage.Global -o none --only-show-errors&lt;/PRE&gt;
&lt;P&gt;You would then configure your Azure services to accept traffic coming from the Azure Firewall subnet. For example, for Azure Storage Accounts this is what you would see in the portal:&lt;/P&gt;
&lt;img /&gt;
&lt;H1&gt;Network Rules or Application Rules?&lt;/H1&gt;
&lt;P&gt;Ideally you should use Application Rules in your firewall to make sure that your workloads are accessing the right Azure services, and not exfiltrating data to rogue data services that might be owned by somebody else and still could have the same IP address.&lt;/P&gt;
&lt;P&gt;This is an example of a star rule granting access to all Azure Storage Accounts, but you should specify your own:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;I tested with two storage accounts, one in the same region and another one in a different region than the client (the client being in this case the Azure Firewall). Access to both storage accounts is working, and as you can see both accesses are logged in the Storage Account as well as in the Azure Firewall (I have removed some characters from the storage account names to obfuscate them):&lt;/P&gt;
&lt;PRE&gt;❯ ssh $vm_pip "curl -s4 $storage_blob_fqdn1"&lt;BR /&gt;Hello world! &lt;BR /&gt;❯ ssh $vm_pip "curl -s4 $storage_blob_fqdn2"&lt;BR /&gt;Hello world!&lt;BR /&gt;❯ query='StorageBlobLogs | where TimeGenerated &amp;gt; ago(15m) | project AccountName, StatusCode, CallerIpAddress'&lt;BR /&gt;❯ az monitor log-analytics query -w $logws_customerid --analytics-query $query -o table&lt;BR /&gt;AccountName              CallerIpAddress     StatusCode  &lt;BR /&gt;----------------------   -----------------   ----------&lt;BR /&gt;storagetest????eastus2   10.13.76.72:10066   200&lt;BR /&gt;storagetest????westus2   10.13.76.72:11880   200&lt;BR /&gt;❯ query='AzureDiagnostics | where TimeGenerated &amp;gt; ago(15m) | where Category == "AZFWApplicationRule" | project SourceIP, Fqdn_s, Protocol_s, Action_s' &lt;BR /&gt;❯ az monitor log-analytics query -w $logws_customerid --analytics-query $query -o table &lt;BR /&gt;Action_s  Fqdn_s                                       Protocol_s SourceIP&lt;BR /&gt;--------- -------------------------------------------- ---------- ----------&lt;BR /&gt;Allow     storagetest????eastus2.blob.core.windows.net HTTPS      10.13.76.4 &lt;BR /&gt;Allow     storagetest????westus2.blob.core.windows.net HTTPS      10.13.76.4&lt;/PRE&gt;
&lt;P&gt;The storage account sees as client IP the Azure Firewall's IP (in the subnet 10.13.76.64/26), and the Azure Firewall logs show the actual client IP (in the workload subnet 10.13.76.0/26).&lt;/P&gt;
&lt;P&gt;If you use network rules you would lose a lot of the flexibility of the Azure Firewall, even if using FQDN-based rules. The reason is that if there were 2 storage accounts with different FQDNs sharing the same IP address, and the same client resolves both FQDNs, when Azure Firewall looks at the packet it will not be able to guess to which storage account each specific packet belongs to. From a routing perspective it would still work though, as long as you have the default SNAT settings of Azure Firewall, which involves translating the IP address when public IP addresses are involved:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Conclusion&lt;/H1&gt;
&lt;P&gt;There are some reasons why you might want to pick VNet service endpoints over private link (cost would probably be one of them). If so, there are advantages and disadvantages of sending traffic to Azure services via a firewall. If you decide to inspect traffic to VNet service endpoints with Azure Firewall, hopefully this post has shown you how to do that.&lt;/P&gt;
&lt;P&gt;What are your thoughts about this?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2025 11:48:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/azure-firewall-and-service-endpoints/ba-p/4404021</guid>
      <dc:creator>cloudtrooper</dc:creator>
      <dc:date>2025-04-14T11:48:33Z</dc:date>
    </item>
    <item>
      <title>Google Workspace migration to Microsoft 365 with multiple domains</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/google-workspace-migration-to-microsoft-365-with-multiple/m-p/4400559#M415</link>
      <description>&lt;P&gt;I'm managing a project to migrate mail from Google Workspace to Microsoft 365 via (Google Workspace Migration).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My scenario is composed as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Primary domain in GWS: domain1.com&lt;/P&gt;&lt;P&gt;Secondary domain in GWS: domain2.com&lt;/P&gt;&lt;P&gt;Routing domain (alias domain) in GWS: m365.domain1.com and gws.domain1.com&lt;/P&gt;&lt;P&gt;Microsoft side: accepted domain: domain1.com,domain2.com, m365.domain1.com and gws.domain1.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Users domain1.com have aliases routing domain m365.domain1.com and external forwarding gws.domain2.com.&lt;/P&gt;&lt;P&gt;Users domain2.com have aliases routing domain m365.domain1.com and external forwarding gws.domain1.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For users domain1.com the hybrid coexistence scenario, mailflow and batch work perfectly.&lt;/P&gt;&lt;P&gt;For domain2.com users, the batch works, but at the time of completion, it returns an error that Google asks for verification of the forwarding address, as it is different from domain2.com.&lt;/P&gt;&lt;P&gt;“GmailForwardingAddressRequiresVerificationException”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which configuration am I doing wrong?&lt;/P&gt;&lt;P&gt;And above all, is the scenario in question supported?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 12:29:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/google-workspace-migration-to-microsoft-365-with-multiple/m-p/4400559#M415</guid>
      <dc:creator>ep_green</dc:creator>
      <dc:date>2025-04-03T12:29:44Z</dc:date>
    </item>
    <item>
      <title>Deploy Microsoft Defender XDR today and start protecting your entire digital estate</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/deploy-microsoft-defender-xdr-today-and-start-protecting-your/ba-p/4399254</link>
      <description>&lt;P&gt;The average organization now hosts 351 exploitable attack pathways, says Microsoft’s 2024 State of Multicloud Security Risk Report&lt;SUP class="footnote-ref"&gt;&lt;A href="#community--1-footnote1" target="_blank"&gt;1&lt;/A&gt;&lt;/SUP&gt;, so it’s no wonder leaders across sectors are calling for enhanced protection of high-value assets within applications, email, endpoints, identity, and more.&lt;/P&gt;
&lt;P&gt;But deploying a comprehensive security solution like Microsoft Defender XDR can be a big lift, especially in organizations using legacy systems or a mix of third-party tools. Complex integrations and configurations combined with common issues like limited staffing resources can further delay or even prevent full product implementation.&lt;/P&gt;
&lt;P&gt;Fortunately, FastTrack for Microsoft 365 is ready to help streamline your security product deployment and today we’ll explain how.&lt;/P&gt;
&lt;P&gt;In this blog, you’ll learn:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Why Microsoft Defender platform adds value beyond security.&lt;/LI&gt;
&lt;LI&gt;How to deploy Microsoft Defender efficiently and securely using Microsoft admin center advanced deployment guides.&lt;/LI&gt;
&lt;LI&gt;Answers to FAQs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Microsoft Defender: The industry leading&lt;SUP class="footnote-ref"&gt;&lt;A href="#community--1-footnote2" target="_blank"&gt;2&lt;/A&gt;&lt;/SUP&gt;, XDR solution with added value&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Microsoft Defender protects your entire organization with a unified security platform that consolidates multiple security functions (e.g., endpoint, identity, cloud security) under a single tool.&lt;/P&gt;
&lt;P&gt;This comprehensive coverage creates &lt;EM&gt;overlapping&lt;/EM&gt; security, which strengthens overall security and helps reduce workloads for security and IT teams.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And while in some cases, transitioning security systems can create vulnerabilities in the short term, FastTrack engineers at Microsoft have solved for this by providing&lt;STRONG&gt; incremental security coverage &lt;/STRONG&gt;as you wind down third-party point solutions. We’ll describe this in more detail later on but first let’s go over the Microsoft Defender platform.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;The Microsoft Defender platform&lt;/STRONG&gt;:&amp;nbsp;&lt;/H3&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Helps prevent, detect, investigate, and respond to advanced threats with next-gen antivirus, endpoint detection response (EDR), automated investigation, and prioritized remediation capabilities. &lt;A href="https://go.microsoft.com/fwlink/?linkid=2281448" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint setup guide&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Office 365&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Protects email and collaboration tools like SharePoint, OneDrive, and Microsoft Teams against advanced threats, i.e., phishing, business email compromise, and malware attacks. &lt;A href="https://go.microsoft.com/fwlink/?linkid=2281529" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender for Office 365 setup guide&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Identity&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Protects on-premises Active Directory from targeted attacks with signals that identify, detect, and investigate compromised identities and malicious insider actions.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281530" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender for Identity&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;U&gt; setup guide&lt;/U&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Defender for Cloud Apps&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;A Cloud Access Security Broker (CASB) that uses rich visibility, control over data travel, and sophisticated analytics to identify and combat cyber threats across cloud services. Gain visibility into Shadow IT, discover cloud apps in use, control and protect data within apps, and detect and respond to threats across all potential threat vectors.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281449" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender for Cloud Apps setup guide&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Microsoft Defender XDR, powered by AI, integrates seamlessly with other Microsoft 365 products and security tools&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Seamless integration provides for stronger, more consistent, automated security across the entire software ecosystem. For example:&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Microsoft Defender is embedded with Microsoft Sentinel&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Microsoft Sentinel is a new FastTrack offering. It’s a very powerful cloud-native, AI-powered security information and event management (SIEM) solution that helps teams address top cyberthreats, including ransomware attacks, by: &amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enriching data with machine learning:&lt;/STRONG&gt; Sentinel employs machine learning to enrich data with Microsoft's threat intelligence, the secret ingredient that fuels capabilities, including threat hunting, detecting, investigating, and responding to threats across an ecosystem.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reducing “alert fatigue”:&lt;/STRONG&gt; Sentinel filters through billions of signals, correlates them into alerts and incidents, and even prioritizes incidents. This allows for more efficient and cost-effective remediation strategies and reduced alert fatigue for SOC teams.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&lt;STRONG&gt;Microsoft Defender integrates with Azure’s Microsoft Defender for Cloud&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) that secures full-stack workloads, end to end, across Amazon Web Services, Google Cloud Platform, and Azure Cloud Services with constant cyberthreat monitoring at the code level.&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How to deploy Microsoft Defender security products efficiently and securely &lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Because each organization’s deployment scenario will be as unique as the organization itself, Microsoft engineers designed Defender to be highly customizable and able to accommodate a variety of different scenarios. However, no one should let complexities surrounding custom configurations delay deployment.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;FastTrack for Microsoft 365 is here to help&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;With a variety of self-serve resources, detailed documentation, automated, step-by-step deployment guides, and even one-on-one assistance (with an eligible license), FastTrack can help you reduce complexity and get your Microsoft Defender products up-and-running quickly.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here’s how to start&lt;/STRONG&gt;:&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;Visit the Microsoft 365 Setup site&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Regardless of license status or credentials, start your journey at the Microsoft 365 Setup site for open, self-service access to detailed setup guides, on-demand videos, and helpful blogs to plan secure and efficient Microsoft Defender deployment workloads.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;Sign in to the Microsoft admin center &lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Once your organization owns a license and you’re ready to deploy, sign in to the Microsoft admin center and access Microsoft Defender advanced deployment and setup guides.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;Deploy using Microsoft Defender advance deployment guides&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Start with zero trust&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281448" target="_blank"&gt;Microsoft Defender for Endpoint setup guide&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281529" target="_blank"&gt;Microsoft Defender for Office 365 setup guide&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281530" target="_blank"&gt;Microsoft Defender for Identity setup guide&lt;/A&gt;&lt;U&gt; &lt;/U&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281449" target="_blank"&gt;Microsoft Defender for Cloud Apps setup guide&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These streamlined, automated guides combine detailed documentation with stateful personalization, so you know you’re following the right instructions for your organization’s scenario. The step-by-step instructions also lead you through the correct order of operations so you can be confident you’re setting up each Microsoft Defender solution correctly, from beginning to end.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Microsoft Defender setup guides: What to expect once you get there&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Each Microsoft Defender setup guide follows a similar pattern.&lt;/P&gt;
&lt;P&gt;They begin with an &lt;STRONG&gt;Overview&lt;/STRONG&gt;, describing foundational prerequisites and &lt;STRONG&gt;Requirements&lt;/STRONG&gt;, then have you identify your organization’s particular &lt;STRONG&gt;Scenario&lt;/STRONG&gt; and goals, before walking you through your recommended &lt;STRONG&gt;Deployment&lt;/STRONG&gt; and &lt;STRONG&gt;Configuration&lt;/STRONG&gt; steps based on your scenario and Microsoft’s best practices.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Let’s walk through the &lt;STRONG&gt;Microsoft Defender for Endpoint guide&lt;/STRONG&gt; as an example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2281448" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint setup guide&lt;/STRONG&gt;&lt;/A&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Arrive at &lt;STRONG&gt;Overview&lt;/STRONG&gt; (see above) to learn more about the Defender setup guide and watch a short video.&lt;/LI&gt;
&lt;LI&gt;Follow the subway navigation&lt;STRONG&gt; &lt;/STRONG&gt;and&amp;nbsp;review &lt;A href="https://learn.microsoft.com/microsoft-365/security/defender-endpoint/minimum-requirements" target="_blank"&gt;Microsoft Defender for Endpoint’s minimum setup requirements&lt;STRONG&gt;‎&lt;/STRONG&gt;&lt;/A&gt; to make sure you’re ready for a secure setup experience before you begin.&lt;/LI&gt;
&lt;LI&gt;At &lt;STRONG&gt;Scenario&lt;/STRONG&gt;, identify your organization’s current security situation and your goals, for example:&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Do you already have an endpoint security solution in place?&lt;/LI&gt;
&lt;LI&gt;Would you like to see how Defender for Endpoint works before rolling it out?&lt;/LI&gt;
&lt;LI&gt;Do you want help designing configurations?&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;At &lt;STRONG&gt;Deployment&lt;/STRONG&gt;, find Microsoft’s recommended next steps based on your &lt;STRONG&gt;Scenario&lt;/STRONG&gt;. These steps include:&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Preparation&lt;/STRONG&gt;: Key points to consider as you prepare for migration.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Setup&lt;/STRONG&gt;: Guidance on which specific steps you should carry out next.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Onboarding to your tenant&lt;/STRONG&gt;: Advice on how to onboard while protecting other platforms in your environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;5. Lastly,&lt;STRONG&gt; Configuration&lt;/STRONG&gt; is where you’ll configure various settings and learn more about:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Attack surface reduction&lt;/LI&gt;
&lt;LI&gt;Mobile threat defense&lt;/LI&gt;
&lt;LI&gt;Next-generation protection&lt;/LI&gt;
&lt;LI&gt;Auto remediation and investigation&lt;/LI&gt;
&lt;LI&gt;Microsoft Secure Score&lt;/LI&gt;
&lt;LI&gt;Endpoint detection and response&lt;/LI&gt;
&lt;LI&gt;Threat and vulnerability management&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;Frequently asked questions&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;Transitioning to or implementing a new security suite can be tricky. However, Microsoft Defender setup guides have been designed to eliminate as much risk and friction as possible from the deployment process. They also do a great job of anticipating and addressing questions admins frequently ask. Here are a few frequently asked questions and answers:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;How do I securely migrate to Microsoft Defender for Office 365?&amp;nbsp;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN class="lia-text-color-21"&gt;Read&amp;nbsp;&lt;SPAN class="lia-text-color-10"&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2313419" target="_blank"&gt;this Learn article&lt;/A&gt;&lt;/SPAN&gt; to understand &lt;SPAN class="lia-text-color-10"&gt;securely &lt;/SPAN&gt;&lt;SPAN class="lia-text-color-10"&gt;migrating from a third-party protection service or device &lt;/SPAN&gt;to ‎Microsoft Defender for Office 365‎.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;How should I deal with urgent security incident response issues?&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Get a better understanding of the&lt;STRONG style="font-style: var(--lia-blog-font-style); font-family: var(--lia-blog-font-family); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); background-color: var(--lia-rte-bg-color);"&gt; &lt;/STRONG&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); background-color: var(--lia-rte-bg-color);"&gt;complex threats affecting your organization. Subscribers to &lt;/SPAN&gt;&lt;A class="lia-external-url" style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); font-size: var(--lia-bs-font-size-base);" href="https://go.microsoft.com/fwlink/?linkid=2313334" target="_blank"&gt;Defender Experts for Hunting&lt;/A&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base); background-color: var(--lia-rte-bg-color);"&gt; can engage with their own security incident response teams to address urgent security incident response issues.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-style: var(--lia-blog-font-style); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);"&gt;Where can I go to learn how to fix onboarding issues myself?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2313504" target="_blank"&gt;Microsoft Defender for Endpoint&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2313420" target="_blank"&gt;Microsoft Defender for Identity&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2313421" target="_blank"&gt;Microsoft Defender for Office 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2313422" target="_blank"&gt;Microsoft Defender for Cloud Apps&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);"&gt;&amp;nbsp; &amp;nbsp; 4. &lt;STRONG&gt;Does &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG style="font-style: var(--lia-blog-font-style); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);"&gt;Microsoft offer training for Microsoft Defender?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Yes! To get started with Microsoft Defender training, browse the &lt;A href="https://learn.microsoft.com/en-us/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&amp;amp;expanded=m365%2Coffice-365" target="_blank"&gt;list of learning paths&lt;/A&gt;, and filter by product, role, level, and subject.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Need additional assistance?&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Whether you have a few questions or want assistance with deployment of your entire Microsoft Defender suite, FastTrack Engineers and Partners are ready to help.&amp;nbsp;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2311906" target="_blank"&gt;Eligible customers&lt;/A&gt;&amp;nbsp;can &lt;A class="lia-external-url" href="https://aka.ms/FastTrackRFA" target="_blank"&gt;request direct, remote assistance from FastTrack for Microsoft 365&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="#community--1-_ftnref1" name="_ftn1" target="_blank"&gt;[1]&lt;/A&gt; &lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-product-and-services/security/pdf/2024-State-of-Multicloud-Security-Risk-Report.pdf" target="_blank"&gt;Microsoft’s 2024 State of Multicloud Security Report&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="#community--1-_ftnref2" name="_ftn2" target="_blank"&gt;[2]&lt;/A&gt; Microsoft Defender was named an XDR leader in &lt;A href="https://www.microsoft.com/en-us/security/blog/2024/06/03/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr/#:~:text=Get%20end-to-end%20protection%20with%20Microsoft%E2%80%99s%20unified%20security%20operations%20platform.?msockid=11c237fa8d2766be11f723698c9d67ca" target="_blank"&gt;The Forrester Wave: XDR platforms&lt;/A&gt;, Q2 2024, receiving top scores in 15 of 22 criteria, including Endpoint Detection, Threat Hunting, and Innovation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 18:22:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/deploy-microsoft-defender-xdr-today-and-start-protecting-your/ba-p/4399254</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-03-31T18:22:33Z</dc:date>
    </item>
    <item>
      <title>EFZ4 BAD Request is throttled</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/efz4-bad-request-is-throttled/m-p/4392695#M412</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We recently migrated to Microsoft 365, and we have an application called KEO, which downloads emails for its internal functionality. However, the application is now displaying an error:&lt;/P&gt;&lt;P&gt;"EFZ4 BAD Request is throttled. Wait XXXXX ms"&lt;/P&gt;&lt;P&gt;Is there a way to fix this issue, or what steps should we take to resolve it?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 06:56:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/efz4-bad-request-is-throttled/m-p/4392695#M412</guid>
      <dc:creator>AdminOK</dc:creator>
      <dc:date>2025-03-13T06:56:24Z</dc:date>
    </item>
    <item>
      <title>Litigation Hold Mailbox Migration</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/litigation-hold-mailbox-migration/m-p/4391425#M411</link>
      <description>&lt;P&gt;My company is currently moving from Exchange 2016 to 365. We are currently setup in a hybrid environment. The question arose of how do we migrate mailboxes that are on litigation hold.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found that you can do a migration of the lit hold mailboxes from on-prem to 365 without any issues per this document -&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/exchange/policy-and-compliance/holds/holds?view=exchserver-2016#migrating-mailboxes-on-hold-from-exchange-server-to-microsoft-365-or-office-365." target="_blank"&gt;https://learn.microsoft.com/en-us/exchange/policy-and-compliance/holds/holds?view=exchserver-2016#migrating-mailboxes-on-hold-from-exchange-server-to-microsoft-365-or-office-365.&lt;/A&gt;&amp;nbsp;However, what I can't seem to find is the best way to test a migration for a lit hold mailbox. I also have found that some of our lit hold mailboxes have been on hold so long that their mailboxes are on Exchange version 0.10.&lt;BR /&gt;&lt;BR /&gt;So, I really have 2 questions.&lt;BR /&gt;&lt;BR /&gt;1) How can I test migrating a lit hold mailbox from on prem to 365 without using an active person's mailbox?&lt;/P&gt;&lt;P&gt;2) Does the Exchange Version for the mailbox matter when I migrate them?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be much appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 13:01:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/litigation-hold-mailbox-migration/m-p/4391425#M411</guid>
      <dc:creator>rschlager</dc:creator>
      <dc:date>2025-03-10T13:01:14Z</dc:date>
    </item>
    <item>
      <title>The future of Microsoft 365 deployment: Microsoft 365 Setup Expert</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/the-future-of-microsoft-365-deployment-microsoft-365-setup/ba-p/4390838</link>
      <description>&lt;P&gt;Are you an IT professional, a business or technical decision-maker, or stakeholder involved with managing Microsoft 365 environments? If so, you need quick and reliable access to setup and deployment information. Now you have that access at your fingertips with&amp;nbsp;&lt;STRONG&gt;Microsoft 365 Setup Expert&lt;/STRONG&gt;. Read below for more details or &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2309800" target="_blank"&gt;check out the full blog post here&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;What is Microsoft 365 Setup Expert?&lt;/H2&gt;
&lt;P&gt;Microsoft 365 Setup Expert is an innovative, AI-powered solution that helps IT, BDMS, TDMs, and related stakeholders streamline their Microsoft 365 setup and deployment workloads.&lt;/P&gt;
&lt;P&gt;Developed by FastTrack engineers, this tool responds to queries with the information you need to make informed decisions about product purchases, licensing, deployment, and troubleshooting.&lt;/P&gt;
&lt;H2&gt;Advantages of Using Setup Expert&lt;/H2&gt;
&lt;P&gt;Setup Expert delivers essential insights for navigating Microsoft 365 setup workflows with confidence, regardless of your job role or credentials.&lt;/P&gt;
&lt;H4&gt;Key Features&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Prepurchase guidance&lt;/STRONG&gt;: Evaluate different Microsoft 365 solutions, compare licensing options, and get recommendations for compliance, remote work, and security scenarios.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Post-purchase support&lt;/STRONG&gt;: Plan product rollouts, deploy advanced features, troubleshoot issues, and scale deployments based on organizational needs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reliable information&lt;/STRONG&gt;: Sourced from official Microsoft channels, ensuring accuracy and relevance.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Role-based responses&lt;/STRONG&gt;: Tailored insights for both technical and non-technical users.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Real-World Applications&lt;/H4&gt;
&lt;P&gt;Whether you're planning a new deployment or managing an existing environment, Microsoft 365 Setup Expert can help you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Simplify and expedite deployments&lt;/LI&gt;
&lt;LI&gt;Reduce reliance on credentialed admins&lt;/LI&gt;
&lt;LI&gt;Foster collaboration across roles&lt;/LI&gt;
&lt;LI&gt;Streamline procurement decisions&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Learn more about Microsoft 365 Setup Expert&lt;/H2&gt;
&lt;P&gt;Dive deeper into how Setup Expert can transform your setup processes in the&lt;A href="https://go.microsoft.com/fwlink/?linkid=2309800" target="_blank"&gt;&amp;nbsp;full blog post&lt;/A&gt; at the Setup site.&lt;/P&gt;
&lt;P&gt;Find Setup Expert at &lt;A href="https://go.microsoft.com/fwlink/?linkid=2309800" target="_blank"&gt;setup.cloud.microsoft&lt;/A&gt; and start leading your organization through smarter, faster, and more collaborative deployments today!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 20:45:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/the-future-of-microsoft-365-deployment-microsoft-365-setup/ba-p/4390838</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-03-07T20:45:21Z</dc:date>
    </item>
    <item>
      <title>GoDaddy to Microsoft 365 Migration Issues</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/godaddy-to-microsoft-365-migration-issues/m-p/4383045#M410</link>
      <description>&lt;P&gt;Hi there, I wonder if I could get some help with an issue I've got. Currently I am attempting to migrate one user mailbox from the current GoDaddy tenant to our new Microsoft tenant, to initially test out the migration. I've followed the Migration tool in the Exchange admin center but am receiving the following error:&lt;/P&gt;&lt;P&gt;Error: MigrationRecipientNotFoundException: A recipient wasn't found for "***@***.onmicrosoft.com". Create a recipient of the appropriate type for this migration and try again.&lt;/P&gt;&lt;P&gt;I've got the user created in the Microsoft 365 admin center and a mailbox is set up for them. Both on GoDaddy and Microsoft it is UserMailbox recipient type.&lt;/P&gt;&lt;P&gt;I'm using the IMAP Migration settings as outlined from the GoDaddy IMAP settings, and have since checked with GoDaddy and they give these settings:&amp;nbsp;&lt;BR /&gt;IMAP Server: imap.secureserver.net&lt;/P&gt;&lt;P&gt;Authentication: Basic&lt;/P&gt;&lt;P&gt;Encryption: SSL&lt;/P&gt;&lt;P&gt;Accept untrusted certificates: Yes&lt;/P&gt;&lt;P&gt;Port: 993&lt;/P&gt;&lt;P&gt;GoDaddy have also said that Basic authentication is supported by them and I have checked the Entra configuration to ensure that Basic is not blocked. I have even had the user I'm attempting to migrate log in to the temporary onmicrosoft account to make sure there are no log in issues there.&lt;/P&gt;&lt;P&gt;I have posted this on the Answers forum as well and was pointed in this direction for further help.&lt;/P&gt;&lt;P&gt;Any thoughts or help on this would be amazing.&lt;/P&gt;&lt;P&gt;Thanks in advance, Oli&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2025 14:12:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/godaddy-to-microsoft-365-migration-issues/m-p/4383045#M410</guid>
      <dc:creator>OliP1</dc:creator>
      <dc:date>2025-02-19T14:12:43Z</dc:date>
    </item>
    <item>
      <title>Migration Email to 365</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/migration-email-to-365/m-p/4374990#M409</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to transfer my email account from our host Siteground to Microsoft's business account. This is because the conventional hoster only has limited email storage and is almost full. The provider Siteground supports IMAP. I have several questions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;How do I proceed now? Do I have to transfer the domain first and then can I also transfer the email account in the second step?&lt;/LI&gt;&lt;LI&gt;Once the transfer has been completed, can I create additional email addresses via Siteground or do I now have to create all emails via 365 (which will probably incur costs)?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 13:32:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/migration-email-to-365/m-p/4374990#M409</guid>
      <dc:creator>Kanzleilul</dc:creator>
      <dc:date>2025-02-07T13:32:08Z</dc:date>
    </item>
    <item>
      <title>Migrating from Google Workspace to Microsoft 365 with to have two separate Mailboxes per User + SSO</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/migrating-from-google-workspace-to-microsoft-365-with-to-have/m-p/4371710#M408</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Context and Requirements:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;My company (abc.com) is being acquired by another org (xyz.com). We’re currently on Google Workspace (G Suite) for abc.com email and want to migrate everything (email, calendar, contacts) into Microsoft 365 — specifically into the xyz.com tenant. After migration, each user must have two fully separate mailboxes: Mailbox A: email address removed for privacy reasons (data migrated from G Suite)&lt;/P&gt;&lt;P&gt;Mailbox B: email address removed for privacy reasons (new mailbox in the xyz.com tenant)&lt;/P&gt;&lt;P&gt;We need true single sign-on (SSO) so users can log in once and access both mailboxes (not just alias addresses) within the same tenant. We want to minimize complexity. FYI we will set up abc.com as an Accepted Domain in xyz.com Microsoft Exchange tenant.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What I’ve Investigated So Far&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Migration Tools:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Exchange Admin Center has a built-in G Suite migration wizard, but it mainly migrates mail to one mailbox.&lt;/P&gt;&lt;P&gt;Third-party tools like BitTitan MigrationWiz can also handle G Suite → M365 migrations.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Two-Mailbox Setup Approaches: One licensed mailbox + one shared mailbox&lt;/STRONG&gt;: For example, the user’s main mailbox would be email address removed for privacy reasons (fully licensed with migrated data), while email address removed for privacy reasons is a shared mailbox to keep it separate. The email address removed for privacy reasons account gets Full Access and Send As permissions on the xyz.com mailbox.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Pros&lt;/STRONG&gt;: Single sign-on, one set of creds, minimal extra licensing. The data stays separate (two distinct mail stores).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cons&lt;/STRONG&gt;: Shared mailboxes are limited to 50GB if unlicensed, and some compliance features may require a license.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Two fully licensed user mailboxes (two Azure AD user accounts, e.g. email address removed for privacy reasons and email address removed for privacy reasons)&lt;/STRONG&gt;: Each mailbox is completely independent, but typically requires two sign-ins unless there’s advanced identity federation to unify credentials. Also doubles the licensing.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Pros&lt;/STRONG&gt;: Full feature set in both mailboxes, no shared mailbox constraints.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cons&lt;/STRONG&gt;: Additional license costs, and not a straightforward “one-click” SSO for both.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Questions&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which approach is best for maintaining two discrete mailboxes per user without forcing them to manage multiple logins?&lt;/P&gt;&lt;P&gt;Are there any best practices for migrating from Google Workspace into Exchange 365(specific tenaant) maintaining the same email address?&lt;/P&gt;&lt;P&gt;Have you run into compliance or eDiscovery issues with a shared mailbox approach?&lt;/P&gt;&lt;P&gt;Any caveats or special steps needed to ensure calendars and contacts migrate correctly from Google Workspace into the new environment?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 13:14:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/migrating-from-google-workspace-to-microsoft-365-with-to-have/m-p/4371710#M408</guid>
      <dc:creator>sz456789</dc:creator>
      <dc:date>2025-01-29T13:14:10Z</dc:date>
    </item>
    <item>
      <title>3 internal obstacles to overcome for comprehensive security</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-blog/3-internal-obstacles-to-overcome-for-comprehensive-security/ba-p/4366840</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Organizations today face relentless security challenges, fending off an average of 59 data security incidents each year.&lt;/SPAN&gt;&lt;SUP&gt;&lt;A href="#community--1-footnote1" target="_self"&gt;1&lt;/A&gt;&lt;/SUP&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;At&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;an average cost of $15 million,&lt;SUP&gt;&lt;A href="#community--1-footnote2" target="_blank"&gt;2&lt;/A&gt;&lt;/SUP&gt;&amp;nbsp;successful exploits&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;can be devasting.&lt;/SPAN&gt; To a&lt;SPAN data-contrast="auto"&gt;ddress these risks, organizations need a comprehensive defense, including committed leadership and cutting-edge tools. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;At Microsoft, safeguarding data, technology, and &lt;/SPAN&gt;&lt;A href="https://clouddamcdnprodep.azureedge.net/gdc/gdckHueRY/original" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;secure AI adoption&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN data-contrast="auto"&gt;is a year-round priority.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In fact, Charlie Bell, executive vice president of Microsoft Security, recently underscored &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/09/23/securing-our-future-september-2024-progress-update-on-microsofts-secure-future-initiative-sfi/?msockid=11c237fa8d2766be11f723698c9d67ca" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft’s “unique responsibility&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; in safeguarding the future for our customers and community.”&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As part of meeting this responsibility, Microsoft’s advanced security solutions include Microsoft Defender XDR, a platform designed to provide holistic security against today’s complex threats. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;While solutions like Microsoft Defender XDR are invaluable, getting them deployed can sometimes be challenging. Organizations may face internal hurdles—conflicting priorities, resource limitations, even resistance to change—that can slow or stall implementation of essential security tools. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this article, we’ll explore three common hurdles and discuss how, by deploying Microsoft security products, you can help ensure a more secure future at your organization.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;3 common internal obstacles to achieving comprehensive security&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;1. Reluctance to replace individual, legacy solutions&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In the past, organizations commonly implemented individual security tools for different, siloed areas of the organization. Today, we know this fragmented approach&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;weakens&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; data security.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;In fact, according to Microsoft’s &lt;/SPAN&gt;&lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-product-and-services/security/pdf/2024-State-of-Multicloud-Security-Risk-Report.pdf" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;2024 State of Multicloud Security Risk Report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; organizations using multiple individual point solutions experience 2.8 times as many data security incidents as those using fewer, integrated tools. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here's a table comparing the performance of individual point solutions vs. Microsoft Defender XDR, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;industry-leading unified security platform.&lt;SUP&gt;&lt;A href="#community--1-footnote3" target="_self"&gt;3&lt;/A&gt;&lt;/SUP&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Is sunk cost fallacy to blame?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;“&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security is an area significantly impacted by behavioral economics."&lt;SUP&gt;&lt;A href="#community--1-footnote4" target="_self"&gt;4&lt;/A&gt;&lt;/SUP&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;Sunk cost fallacy can lead cybersecurity professionals to resist replacing existing systems, even when evidence suggests it's necessary. &lt;SPAN data-contrast="auto"&gt;According to Forbes: “The biggest risk in viewing cybersecurity as a sunk cost is inaction. In other words, thinking that you are safe because you haven’t yet suffered a major breach. Remember this maxim: Everyone is vulnerable."&lt;SUP&gt;&lt;A href="#community--1-footnote5" target="_self"&gt;5&lt;/A&gt;&lt;/SUP&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To move past sunk-cost fallacy, Forbes says decision-makers need to understand that “the implementation of robust security measures can deliver substantial value beyond just mitigating risks.”  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By examining ROI and a products’ impact on improving security, reducing complexity, and streamlining operations “...businesses can start recognizing cybersecurity as a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;driver&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; of competitive advantage, innovation and operational efficiency,” instead of as simply a cost center&lt;SUP&gt;&lt;A href="#community--1-footnote6" target="_self"&gt;6 &lt;/A&gt;&lt;/SUP&gt;&lt;SPAN data-contrast="auto"&gt;[Emphasis added]. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As an example of the potential for ROI, a &lt;/SPAN&gt;&lt;A href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE567qf#:~:text=The%20decision-maker%20interviews%20and%20financial%20analysis%20found%20that%20a%20composite" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;2022 Forrester TEI study&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; found that a &lt;/SPAN&gt;&lt;A href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE567qf#:~:text=The%20decision-maker%20interviews%20and%20financial%20analysis%20found%20that%20a%20composite" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;composite company&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; achieved &lt;STRONG&gt;an ROI of 242% over three years and a net present value (NPV) of $17 million from switching to Microsoft Defender.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;It's easy to overestimate the value of individual or legacy security solutions but the clear security advantages and proven ROI of Microsoft Defender XDR demonstrate that replacing legacy systems can be well worth the effort. &lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;2. Concerns about ensuring secure integration&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[0]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If not managed carefully, integrations involving newly opened communication, authentication, or data transfer channels can introduce vulnerabilities that become attack vectors. Microsoft’s &lt;/SPAN&gt;&lt;A href="https://microsoft-my.sharepoint.com/personal/v-jhersum_microsoft_com/Documents/2024-State-of-Multicloud-Security-Risk-Report.pdf%20(microsoft.com)" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;2024 State of Multicloud Security Risk Report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; notes that “...misconfigured APIs were one of the leading causes of cloud data breaches in 2023.”&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As a unified security platform, Microsoft Defender XDR mitigates such risks through a multilayered approach, through a multilayered approach, offering centralized management (including identity access), comprehensive visibility, and stronger security controls to help prevent human error. This approach “help[s] security teams proactively detect and monitor misconfigurations so they can remediate as needed."&lt;SUP&gt;&lt;A href="#community--1-footnote7" target="_self"&gt;7&lt;/A&gt;&lt;/SUP&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Consistent, automated security with Microsoft Defender XDR&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender XDR integrates seamlessly with other Microsoft security tools, Microsoft 365 products, and AI, delivering consistent, automated security across the entire stack. For example:  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="25" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender XDR is &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-a-unified-security-operations-platform-with/ba-p/3983341" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;embedded with Microsoft Sentinel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, a cloud-native, AI-powered SIEM solution that aids Microsoft Defender XDR in addressing top cyberthreats like ransomware through: &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Improved visibility across domains:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; By ingesting data from an organization's infrastructure, devices, users, applications, and cloud environments, Microsoft Sentinel gives security teams a broad view of security threats.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="46" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Enriched data with machine learning: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Sentinel employs machine learning to enrich data with Microsoft threat intelligence, powering threat hunting, detection, investigation, and response across an ecosystem. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="46" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reduced alert fatigue:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Filtering billions of signals, correlating them into alerts, and prioritizing incidents helps SOC teams handle alerts more efficiently, minimizing fatigue and enabling focused remediation. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender integrates with Azure’s Microsoft Defender for Cloud&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, a cloud-native application protection platform (CNAPP) that secures workloads across Amazon Web Services, Google Cloud Platform, and Azure Cloud Services with constant cyberthreat monitoring at the code level. This capability allows: &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="47" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Broad attack investigation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: Security teams can investigate threats across cloud resources, devices, and identities. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="47" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Workload-specific protections&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: Dedicated protections extend to servers, containers, storage, databases, and more. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="47" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Actionable security recommendations&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: Defender for Cloud provides insights to improve overall security posture and prevent breaches. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;3. Resource, staff, and time constraints&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Resource constraints, staff shortages, and time limitations are intensifying today’s already challenging cybersecurity landscape and can, understandably, impede deployments of new security products. For example:  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Resource constraints:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;Many organizations face limited budgets for security tools, technology, and personnel, leading them to continue with patchwork solutions or delay implementing critical security measures, potentially leaving gaps in security. &lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Staff shortages:&lt;/SPAN&gt; &lt;/STRONG&gt;As cyber threats become more sophisticated, global demand for skilled IT and security professionals continues to grow while supply hasn’t been able to keep up.&lt;SUP style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color);"&gt;&lt;A href="#community--1-footnote8" target="_self"&gt;8&lt;/A&gt;&lt;/SUP&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-contrast="auto"&gt;&amp;nbsp;When insufficient staff results in missed security tasks, reduced monitoring, and slower incident responses, organizations can be left vulnerable to risk. &lt;/SPAN&gt;&lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Limited time: &lt;/SPAN&gt;&lt;/STRONG&gt;Time constraints are a problem as old as time itself, but for IT teams with already heavy workloads, one more thing to do is more than stressful, it can leave systems vulnerable and increase windows of opportunity for bad actors. &lt;SPAN style="font-style: var(--lia-blog-font-style); font-weight: var(--lia-blog-font-weight); font-family: var(--lia-blog-font-family); background-color: var(--lia-rte-bg-color); color: var(--lia-bs-body-color); font-size: var(--lia-bs-font-size-base);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P aria-level="2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;FastTrack resources to help you get Microsoft Defender up and running&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For Microsoft 365 customers experiencing any of the issues mentioned above, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;FastTrack for Microsoft 365&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; is here to help with accessible resources, automated, prescriptive setup guides, and even one-on-one assistance.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here’s how to start: &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;1. Visit the Microsoft 365 Setup site&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Review &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296734" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;openly accessible setup resources&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; at the Microsoft 365 Setup site. Both business and IT leaders will find value in perusing detailed &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296734" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender setup guides&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;A href="https://setup.cloud.microsoft/videos" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;on-demand videos&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, and helpful blogs to plan for safe, efficient Microsoft Defender deployment workloads. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;2. Sign in to the Microsoft Admin Center (MAC) and start deploying Mic&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;r&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;osoft Defender using FastTrack’s automated setup guides&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When you &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296159" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;deploy Microsoft Defender XDR from the MAC&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; using &lt;/SPAN&gt;&lt;A href="https://admin.microsoft.com/#/setupguidance" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;advanced deployment guides&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, you’re taking the most accurate, efficient, and secure deployment path possible.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These automated guides combine detailed documentation with step-by-step instructions tailored specifically for your environment to give you streamlined guidance from beginning to end. Start by &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296159" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;setting up&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; Microsoft Defender Zero Trust &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;security &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;model for &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;your organization&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;3. Request&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;assistance&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt; from FastTrack for Microsoft 365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Customers with &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/microsoft-365/fasttrack/eligibility" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;eligible licenses&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; can &lt;/SPAN&gt;&lt;A href="https://aka.ms/ftcrfa" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;request remote, one-on-one assistance from FastTrack&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; before, during, or even post-deployment of Microsoft Defender.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Take the next step&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; to implement unified protection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security is too crucial—and the cost of breaches are too high—to let any impediments, real or potential, delay or dissuade you from fully implementing your security investments. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When you &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296159" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;deploy Microsoft Defender&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, you’re protecting your organization with a unified security platform that combines multiple security functions—including endpoint, identity, and cloud security—under a single tool.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Start protecting your entire digital estate today:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;Keep your organization, data, and users safe by &lt;/SPAN&gt;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2296159" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;implementing the comprehensive power of Microsoft Defender&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, the industry-leading XDR solution that reduces costs and overhead while helping you keep your organization secure across all domains from costly cybercrime. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about improving your security posture with Microsoft Defender, check out our recent webinar: &lt;/SPAN&gt;&lt;A href="https://setup.cloud.microsoft/videos/supercharging-your-soc-unlock-the-power-of-endpoint-security-in-microsoft-defender-xdr" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Supercharging your SOC: Unlock the power of endpoint security in Microsoft Defender XDR.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="footnotes" style="line-height: 1; margin: 0;"&gt;
&lt;H3&gt;Footnotes&lt;/H3&gt;
&lt;H4 id="footnote1" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;1 &lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/2024-State-of-Multicloud-Security-Risk-Report.pdf#:~:text=In%20February%202022%2C%20we%20became%20the%20first%20cloud,by%20more%20than%2078%20trillion%20daily%20security%20signals." target="_blank" rel="noopener"&gt;Microsoft’s 2024 State of Multicloud Security Risk Report&lt;/A&gt;&lt;/SUP&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 id="footnote2" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;2 &lt;A href="https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf" target="_blank" rel="noopener"&gt;Microsoft’s Global Cybersecurity Outlook Insight Report, 2022&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote3" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;3 Microsoft Defender was named&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/06/03/microsoft-is-named-a-leader-in-the-forrester-wave-for-xdr/#:~:text=Get%20end-to-end%20protection%20with%20Microsoft%E2%80%99s%20unified%20security%20operations%20platform.?msockid=11c237fa8d2766be11f723698c9d67ca an XDR leader in The Forrester Wave: XDR platforms, Q2 2024&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;, receiving top scores  in 15 of 22 criteria, including Endpoint Detection, Threat Hunting, and Innovation.&amp;lt;a href=" target="_blank" rel="noopener" is=""&gt;&amp;nbsp;an XDR leader in The Forrester Wave: XDR platforms, Q2 2024&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote4" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;4 &lt;A href="https://www.darkreading.com/vulnerabilities-threats/3-ways-behavioral-economics-obstructs-cybersecurity" target="_blank" rel="noopener"&gt;3 Ways Behavioral Economics Obstructs Cybersecurity&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote5" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;5 &lt;A href="https://blogs.microsoft.com/blog/2022/03/23/closing-the-cybersecurity-skills-gap-microsoft-expands-efforts-to-23-countries/" target="_blank" rel="noopener"&gt;Closing the cybersecurity skills gap&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote6" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;6 &lt;A href="https://www.forbes.com/councils/forbestechcouncil/2023/08/16/cybersecurity-as-a-strategic-investment-how-roi-optimization-can-lead-to-a-more-secure-future/" target="_blank" rel="noopener"&gt;Cybersecurity As a Strategic Investment (forbes.com)&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote7" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;7 &lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-product-and-services/security/pdf/2024-State-of-Multicloud-Security-Risk-Report.pdf" target="_blank" rel="noopener"&gt;2024-State-of-Multicloud-Security-Risk-Report.pdf (microsoft.com)&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;H4 id="footnote8" style="font-size: 1em; margin: 0;"&gt;&lt;SUP&gt;8 &lt;A href=" https://blogs.microsoft.com/blog/2022/03/23/closing-the-cybersecurity-skills-gap-microsoft-expands-efforts-to-23-countries/" target="_blank" rel="noopener"&gt;Closing the cybersecurity skills gap (microsoft.com)&lt;/A&gt;&lt;/SUP&gt;&lt;/H4&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 28 Jan 2025 12:45:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-blog/3-internal-obstacles-to-overcome-for-comprehensive-security/ba-p/4366840</guid>
      <dc:creator>JulieHersum</dc:creator>
      <dc:date>2025-01-28T12:45:00Z</dc:date>
    </item>
    <item>
      <title>Azure Private Endpoint vs. Service Endpoint: A Comprehensive Guide</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/azure-private-endpoint-vs-service-endpoint-a-comprehensive-guide/ba-p/4363095</link>
      <description>&lt;P&gt;When building secure and scalable applications on Microsoft Azure, network connectivity becomes a critical factor. Azure provides two primary methods for enhancing security and connectivity: &lt;STRONG&gt;Private Endpoints&lt;/STRONG&gt; and &lt;STRONG&gt;Service Endpoints&lt;/STRONG&gt;. While both serve to establish secure connections to Azure resources, they function in distinct ways and cater to different networking needs. This blog will explain the differences between the two, their use cases, and when you should use each.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Understanding Service Endpoints&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Azure &lt;STRONG&gt;Service Endpoints&lt;/STRONG&gt; allow you to securely connect to Azure services over an optimized route through the Azure backbone network. When you enable service endpoints on a virtual network, they extend the private IP address space of that virtual network to the service. Essentially, they provide a direct, secure connection to Azure services like &lt;STRONG&gt;Azure Storage&lt;/STRONG&gt;, &lt;STRONG&gt;Azure SQL Database&lt;/STRONG&gt;, and &lt;STRONG&gt;Azure Key Vault&lt;/STRONG&gt; without requiring the traffic to traverse the public internet.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Characteristics of Service Endpoints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Public Services, Private IP&lt;/STRONG&gt;: Service endpoints allow traffic to go through the Azure backbone but still access services using their public IP addresses. However, the traffic is not exposed to the internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Security Group (NSG) Integration&lt;/STRONG&gt;: Service endpoints can be secured using NSGs, which control access based on source IP addresses and subnet configurations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;No DNS Resolution&lt;/STRONG&gt;: Service endpoints use public DNS names to route traffic. Thus, the service endpoint enables network traffic to be routed privately but relies on public DNS resolution.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Use Cases for Service Endpoints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Simplified Security&lt;/STRONG&gt;: Service endpoints are ideal for connecting to Azure services in a straightforward manner without needing complex configurations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Lower Latency&lt;/STRONG&gt;: Since traffic is routed through the Azure backbone network, there’s less congestion compared to public internet traffic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integration with NSG&lt;/STRONG&gt;: Service endpoints allow for tighter security control with Network Security Groups, ensuring only approved subnets and virtual networks can access specific services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;STRONG&gt; Understanding Private Endpoints&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Private Endpoints&lt;/STRONG&gt;, on the other hand, provide a direct, private connection to Azure resources by assigning a private IP address from your virtual network (VNet) to the service. Unlike service endpoints, which rely on public IPs, private endpoints fully encapsulate the service in a private address space. When a service is accessed via a private endpoint, the connection stays within the Azure network, preventing exposure to the public internet.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Characteristics of Private Endpoints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Private IP Connectivity&lt;/STRONG&gt;: Private endpoints map Azure resources to a private IP in your VNet, ensuring all traffic remains private and not exposed to the internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS Resolution&lt;/STRONG&gt;: Private endpoints also require DNS configuration so that the private IP address can be resolved for the associated Azure service. Azure offers automatic DNS resolution for private endpoints, but custom DNS configurations can also be set.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;End-to-End Security&lt;/STRONG&gt;: Since the connection is over a private IP, it adds an additional layer of security by preventing any egress or ingress to public networks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Use Cases for Private Endpoints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Critical Security&lt;/STRONG&gt;: Private endpoints are perfect for applications requiring high security, such as those handling sensitive data, financial transactions, or proprietary business logic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Strict Regulatory Compliance&lt;/STRONG&gt;: If you are dealing with highly regulated industries (e.g., healthcare or finance), private endpoints provide a way to ensure your data is not exposed to the public internet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Isolation&lt;/STRONG&gt;: Private endpoints are suited for scenarios where you want to fully isolate your Azure resources from the internet and only allow access from within your VNet.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;STRONG&gt; Key Differences: Private Endpoint vs. Service Endpoint&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Feature&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Private Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Service Endpoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Connection Type&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Uses a private IP address from your VNet&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Uses a public IP address but routed through Azure's backbone network&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Security Level&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Higher security, no exposure to the public internet&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Lower security as it still uses public DNS and IP&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;DNS Resolution&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Requires DNS configuration to resolve private IPs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Relies on public DNS for resolution&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Ideal for critical security and isolated traffic&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best for connecting to Azure services with basic security requirements&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Supported Services&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Limited to resources that support private endpoints&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Supports a broader range of Azure services like Storage, SQL, etc.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;STRONG&gt; When to Use Each Option&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Choose Service Endpoints if&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;You want to connect to Azure services like Storage, SQL, or Key Vault using the Azure backbone network.&lt;/LI&gt;
&lt;LI&gt;Your security requirements do not mandate complete isolation from the public internet.&lt;/LI&gt;
&lt;LI&gt;You need to leverage Network Security Groups (NSGs) to limit access from specific subnets or VNets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Choose Private Endpoints if&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Your application requires full isolation from the public internet, such as for sensitive workloads or highly regulated data.&lt;/LI&gt;
&lt;LI&gt;You want traffic to flow entirely within the private network, ensuring complete confidentiality.&lt;/LI&gt;
&lt;LI&gt;You need to maintain strict security standards for applications that interact with services like databases, storage accounts, or other critical infrastructure.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;&lt;STRONG&gt; Conclusion&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Both &lt;STRONG&gt;Private Endpoints&lt;/STRONG&gt; and &lt;STRONG&gt;Service Endpoints&lt;/STRONG&gt; play vital roles in securing connectivity to Azure services, but they cater to different security needs. &lt;STRONG&gt;Service Endpoints&lt;/STRONG&gt; offer an easier, simpler way to secure access over the Azure backbone, while &lt;STRONG&gt;Private Endpoints&lt;/STRONG&gt; provide complete isolation and enhanced security by assigning a private IP address.&lt;/P&gt;
&lt;P&gt;By carefully assessing your application's security needs and performance requirements, you can choose the appropriate method to ensure optimal connectivity and compliance with Azure services.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 13:15:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/azure-private-endpoint-vs-service-endpoint-a-comprehensive-guide/ba-p/4363095</guid>
      <dc:creator>SriniThumala</dc:creator>
      <dc:date>2025-01-06T13:15:57Z</dc:date>
    </item>
    <item>
      <title>Help with 365 migration please</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/help-with-365-migration-please/m-p/4357922#M407</link>
      <description>&lt;P&gt;Can anyone help me with this Migration please.&lt;/P&gt;&lt;P&gt;The tenancy has existed for some time and all users have had a business standard license to enable them to use Teams and Office 365 for some time. This means that mailboxes were created automatically but these have never been used.&lt;/P&gt;&lt;P&gt;AD Sync was in place.&lt;/P&gt;&lt;P&gt;I am trying to migrate from Exchange 2016 to 365. I have:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Checked each user has an e-mail alias in Exchange @leonardgray.onmicrosoft.com.&lt;BR /&gt;Configured Outlook Anywhere on my on-premises Exchange Server.&lt;BR /&gt;Enabled MRS Proxy on your on-premises Exchange Server.&lt;BR /&gt;Use the Microsoft Exchange Remote Connectivity Analyzer to test your connection settings.&lt;BR /&gt;Used the Outlook Anywhere (RPC over HTTP) or Outlook Autodiscover tests - it is showing no issues.&lt;BR /&gt;Checked the permissions on the account I'm using to migrate (domain admin and has FullAccess and assigned WriteProperty permissions).&lt;BR /&gt;We're not on Exchange server 2007 so no need to worry about unified messaging.&lt;BR /&gt;The domains are verified.&lt;BR /&gt;The users are created licensed.&lt;BR /&gt;I have the CSV with the list of users.&lt;BR /&gt;I've created a variety of migration endpoints and it verified as it saved and saved successfully.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I initially tried to use a cutover migration as it is what I have used successfully in the past. This failed, when I researched the error the articles suggested that it was because AD sync was in place. So I turned off AD sync. The cutover migration continued to fail.&lt;/P&gt;&lt;P&gt;The articles suggested that a Staged migration was a better option for this scenario. This failed with this error:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Error: MigrationTransientException: Failed to update the on-premises mailbox with the target address (SMTP:email address removed for privacy reasons). The mail sent to the user will not reach user's hosted mailbox. The error might be due to account credentials used for migration not having enough permission to write data back into the on-premise AD. Please ensure that the account credential has Domain Admin privilege. --] We weren't able to connect to the remote server. Please verify that the migration endpoint settings are correct and your certificate is valid, and then try again. Consider using the Exchange Remote Connectivity Analyzer (https://testexchangeconnectivity.com) to diagnose the connectivity issues.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I did some more reading and found an article that suggested that Staged migrations can only be used from Server 2003 and 2007. So I decided to try a Remote Migration. This one failed with the error: &lt;EM&gt;Error: TargetUserAlreadyHasPrimaryMailboxException: Target user '902b455c-5986-47c7-9988-bb7282df52b5' already has a primary mailbox.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The articles about this suggest I need to delete the data in homeMDB and homeMTA. The data in homeMDB looks like a pretty important link between Exchange on prem and Active Directory. I'm not particularly comfortable with just deleting this.&lt;/P&gt;&lt;P&gt;Can anyone tell me what I'm missing?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 16:29:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/help-with-365-migration-please/m-p/4357922#M407</guid>
      <dc:creator>Lilly1982</dc:creator>
      <dc:date>2024-12-16T16:29:46Z</dc:date>
    </item>
    <item>
      <title>Cuales son los pasos para migrar mi correo que tengo en Godaddy a Microsoft 365</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/cuales-son-los-pasos-para-migrar-mi-correo-que-tengo-en-godaddy/m-p/4357535#M406</link>
      <description>&lt;P&gt;Tengo una cuenta de correo en Godaddy con mi dominio personal, quiero comprar una licencia de Microsoft 365 y migrar mi correo hacia Microsoft 365 así poder aprovechas todos los servicios que ofrece Microsoft&lt;/P&gt;&lt;P&gt;Mi licencia actual vence el 1 de enero del 2025&lt;/P&gt;&lt;P&gt;He tratado de comprar una licencia con la cuenta de correo, pero me da error porque me indica que está asociado a un proveedor externo que Godaddy.&lt;/P&gt;&lt;P&gt;Intente migrarlo con la gente de Godaddy, me dice que debo tener un plan de licencia y el correo creado en Microsoft para que hagan la migración.&lt;/P&gt;&lt;P&gt;Todo me indica que en Godaddy están haciendo lo imposible para entorpecer la migración.&lt;/P&gt;&lt;P&gt;Quedo atento a su respuesta&lt;/P&gt;</description>
      <pubDate>Sat, 14 Dec 2024 20:07:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-microsoft-365/cuales-son-los-pasos-para-migrar-mi-correo-que-tengo-en-godaddy/m-p/4357535#M406</guid>
      <dc:creator>RobertoMartinez</dc:creator>
      <dc:date>2024-12-14T20:07:31Z</dc:date>
    </item>
    <item>
      <title>ICYMI: FastTrack for Azure (FTA) program retiring December 2024</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/icymi-fasttrack-for-azure-fta-program-retiring-december-2024/m-p/4357386#M60</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="lia-align-center"&gt;&lt;STRONG&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/fasttrackforazureblog/fasttrack-for-azure-fta-program-retiring-december-2024/4357383" data-lia-auto-title="Read more here" data-lia-auto-title-active="0" target="_blank"&gt;Read more here&lt;/A&gt;&lt;/STRONG&gt;&lt;/H3&gt;</description>
      <pubDate>Fri, 13 Dec 2024 20:36:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/icymi-fasttrack-for-azure-fta-program-retiring-december-2024/m-p/4357386#M60</guid>
      <dc:creator>JillArmourMicrosoft</dc:creator>
      <dc:date>2024-12-13T20:36:40Z</dc:date>
    </item>
    <item>
      <title>FastTrack for Azure (FTA) program retiring December 2024</title>
      <link>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/fasttrack-for-azure-fta-program-retiring-december-2024/ba-p/4357383</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ATTENTION: &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;As of December 31st, 2024, the FastTrack for Azure (FTA) program will be retired.&amp;nbsp; FTA will support any projects currently in motion to ensure successful completion by December 31st, 2024, but will no longer accept new nominations.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-teams="true"&gt;For more information on available programs and resources, visit: &lt;A href="https://azure.microsoft.com/en-us/solutions/migration/migrate-modernize-innovate/" aria-label="Link Azure Migrate, Modernize, and Innovate | Microsoft Azure" target="_blank"&gt;Azure Migrate, Modernize, and Innovate | Microsoft Azure&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 20:21:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/fasttrack-for-azure/fasttrack-for-azure-fta-program-retiring-december-2024/ba-p/4357383</guid>
      <dc:creator>JillArmourMicrosoft</dc:creator>
      <dc:date>2024-12-13T20:21:12Z</dc:date>
    </item>
  </channel>
</rss>

