A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://learn.microsoft.com/en-us/microsoft-365-apps/admin-center/overview-cloud-policy below:

Overview of Cloud Policy service for Microsoft 365 - Microsoft 365 Apps

Cloud Policy service for Microsoft 365 lets you enforce policy settings for Microsoft 365 Apps for enterprise on a user's device, even if the device isn't domain joined or otherwise managed. When a user signs into Microsoft 365 Apps for enterprise on a device, the policy settings roam to that device. Policy settings are available for devices running Windows, macOS, iOS, and Android, although not all policy settings are available for all operating systems. You can also enforce some policy settings for Office for the web and Loop, both for guests who are signed in and for users who access documents anonymously.

Requirements Supported built-in admin roles

You can use the following built-in Microsoft Entra roles for accessing and managing the feature:

Important

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.

Role Description Office Apps Administrator (Recommended) This role can manage Office apps cloud services, including policy and settings management, and manage the ability to select, unselect, and publish 'what's new' feature content to end-user's devices. Security Administrator This role can read security information and reports and manage configuration in Microsoft Entra ID and Office 365. Global Administrator This role can manage all aspects of Microsoft Entra ID and Microsoft services that use Microsoft Entra identities.

Note

Global Reader is another built-in role supported by the Microsoft 365 Apps admin center, but it does not support some features like cloud update or the Modern App Settings page.

Licensing requirements

Cloud Policy supports most Microsoft 365 subscription plans that include Microsoft 365 Apps. Check your licensing documentation for specific requirements.

Important

The following plans are not supported:

Note

Product version requirements

You can manage Microsoft 365 Apps on Windows with the following version requirements:

Note

For government customers (GCC, GCC High, and DoD), the minimum supported Office client version for policies to be delivered to Microsoft 365 Apps running on Windows is Version 2402 or later.

Network requirements

Devices running Microsoft 365 Apps require access to the following endpoints:

Environment Microsoft service URLs required on allowlist Commercial and GCC Microsoft 365 Apps admin center
  • login.live.com
  • *.office.com
  • *.office.net
  • *.config.office.com
  • *.config.office.net
  • GCC High Microsoft 365 Apps admin center
  • *.office365.us
  • DoD Microsoft 365 Apps admin center
  • *.apps.mil
  • *.office365.us
  • Source: Microsoft 365 URLs and IP address ranges

    Microsoft Entra groups requirements

    Cloud Policy Service supports the use of Microsoft Entra groups with the following requirements:

    Steps for creating a policy configuration

    To create or edit policy configurations you must sign into the Microsoft 365 Apps admin center. If you're using the admin center for the first time, review the terms. Then, select Accept.

    1. Under Customization, select Policy Management.
    2. On the Policy configurations page, select Create.
    3. On the Start with the basics page, enter a name (required) and a description (optional), then select Next.
    4. On the Choose the scope page, determine whether the policy configuration applies to all users, specific groups, or to users who anonymously access documents using Office for the web.
    5. If the policy configuration applies to specific groups, you can now add multiple groups to a single policy configuration for more flexible targeting. To add groups, select Add Groups and choose the relevant groups. Adding multiple groups to a single policy configuration allows for the same group to be included in multiple policy configurations, facilitating a more streamlined and efficient policy management process.
    6. After making your selection, choose Next.
    7. On the Configure Settings page, select the policies that you want to include in the policy configuration. You can search for the policy by name, or you can create a custom filter. You can filter on platform, by application, on whether the policy is configured, and on whether the policy is a recommended security baseline.
    8. After making your selections, select Next to review your selections. Then select Create to create the policy configuration.
    Managing policy configurations

    To change a policy configuration:

    1. Under Customization, select Policy Management.
    2. Open the configuration details of the policy configuration you want to change by selecting it.
    3. Make the appropriate changes to the policy configuration.
    4. Navigate to the Review and publish page.
    5. Select Update to save and apply your changes.

    If you want to create a new policy configuration that is similar to an existing policy configuration, select the existing policy configuration on the Policy configurations page, and then select Copy. Make the appropriate changes and then select Create.

    To see which policies are configured when you're editing a policy configuration, navigate to the Policies section and filter by the Status column or select the Configured slicer at the top of the policy table. You can also filter by application and platform.

    To change the priority order for the policy configurations, select Reorder priority on the Policy configurations page.

    If you want to export a policy configuration, select the existing policy configuration on the Policy configurations page, and then select Export. This action generates a CSV file for download.

    How the policy configuration is applied

    The Click-to-Run service used by Microsoft 365 Apps for enterprise checks in with the Cloud Policy service regularly to see if there are any policies that pertain to the signed in user. If there are, then the appropriate policies are applied and take effect the next time the user opens an Office app, such as Word or Excel.

    Note

    If the user is a member of multiple Microsoft Entra groups with conflicting policy settings, priority is used to determine which policy setting is applied. The highest priority is applied, with "0" being the highest priority that you can assign. You can set the priority by choosing Reorder priority on the Policy configurations page.

    Also, policy settings implemented by using Cloud Policy take precedence over policy settings implemented by using Group Policy on Windows Server, and taking precedence over preference settings or locally applied policy settings.

    Baselines

    At Microsoft, we strive to innovate and reduce the IT admins burden with the creation of modern management tools. With that said, the baselines in Cloud Policy are another way you can save time while deploying policy for your organization. The security and accessibility baselines offer a unique filter on the Group Policy needed to protect your organization and empower your end users to create accessible content.

    Security baseline

    To easily identify security baseline policies, a new column called Recommendation was added to the policy table. Policies recommended for security baseline are triggered in this column. You can also use the column filter to limit the view to only policies that are tagged as security baseline.

    For more information, see Security baseline for Microsoft 365 Apps for enterprise.

    Accessibility baseline

    Most of our customers are making strides to become more accessible as an organization. The accessibility baseline enables IT Pros to configure accessibility policies to empower their end users to create accessible content and limit the ability to remove accessibility checker settings from being disabled.

    Microsoft Purview support

    Cloud Policy service supports the Microsoft Purview auditing solutions. When auditing is enabled, events such as the creation, deletion, modification of policy configurations, changes to configured policy settings, and adjustments to priority order are tracked. You can use the portal or PowerShell to search the audit log for such changes. For more information on captured operations and data format, refer to the activity documentation and schema reference.

    Additional information about Cloud Policy Troubleshooting tips

    If the expected policies aren't correctly applied to a user's device, try the following actions:


    RetroSearch is an open source project built by @garambo | Open a GitHub Issue

    Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

    HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4