CoreView Playbook Policy Overview
Modified on Thu, 30 Mar 2023 at 09:54 AM
Categories
-
What's New
-
Release Information
- CoreView Release Notes May 2023
- CoreView Release Notes April 2023
- CoreView Release Notes March 2023
- CoreView Release Notes February 2023
- CoreView Release Notes January 2023
- CoreView December 2022 Release Notes
- CoreView November 2022 Release Notes
- CoreView October 2022 Release Notes
- September 2022 Release Notes
- August 2022 Release Notes
- Release 22.06 Key Features
- Release 22.05 Key Features
- Release 22.04 Key Features
- Release 22.03 Key Features
- Release 22.01 Key Features
- Release 21.12 Key Features
- Release 21.11 Key Features
- Release 21.10 Key Features
- Release 21.09 Key Features
- Release 21.08 Key Features
- Release 21.07 Key Features
- Release 21.05 Key Features
- Release 21.04 Key Features
- Release 21.03 Key Features
- Release 21.02 Key Features
- Release 21.01 Key Features
- Release 20.12 Key Features
- Release 20.11 Key Features
- Release 20.10 Key Features
- Release 20.09 Key Features
-
Release Information
- Getting Started with Customer Care
-
Getting Started with CoreView
-
Configuring
- Configuration Overview (New UX)
- Configuration Overview
- Creating CoreView Tenant Administrators (New UX)
- Creating CoreView Tenant Administrators
- CoreView Operator Uses Cases & Dependencies
- Creating a License Pool
- Understanding Virtual Tenants
- Frequently Asked Configuration Questions
- "Send As" DNS Requirements for CoreAdoption Campaigns (Optional)
- How to enforce MFA on CoreView service accounts
- Creating a License Pool
-
A Quick Tour of CoreView
- A Quick Tour of the CoreView Interface
- Introducing the CoreView New User Experience
- CoreView New UX FAQ
- CoreView Dashboards
- Using CoreView Reports
- How to use CoreView Management Actions (New UX)
- How to use CoreView Management Actions
- Understanding CoreView Releases
- Creating your first Workflow - A Practical Exercise
- Introducing the new site for Partner customer management
-
Configuring
-
How to
-
Exchange Online
- How to check and analyze the Message Trace
- How To Configure Email Forwarding
- How to convert a Shared Mailbox to a User Mailbox
- How to convert a user mailbox to a shared mailbox in Exchange Online
- How to Create Microsoft 365 Groups for Improved Collaboration
- How To Create Shared Mailbox
- How To Create User Mailbox
- How To Grant Access To Mailbox
- How to List all the Mailboxes a User has access to in Microsoft 36
- How to remove delegates from Mailbox
- How to remove user access to Mailbox
- How to review and manage Exchange online mailbox permissions
- How to verify if a user has updated the Password
- Read Permission for Mailbox
- What are security groups and How to create it
- What is a Distribution Group and How to create it
-
Exchange Online
- Custom Actions Library
- Getting Started with CoreHybrid
-
Knowledge Resources
-
Understanding CoreView - Quick Start Guides.
- CoreView Quick Start Guide Overview and Index - Tenant Admins
- CoreView Quick Start Guide Overview and Index - Operators
- Understanding CoreView Tenant Configuration – Management
- Understanding the CoreView Operator Profile
- Understanding CoreView Operator Roles
- Understanding CoreView Operator Delegation
- Understanding CoreView - Report Column Filtering
- Understanding CoreView - The User Interface
- Understanding CoreView Tenant Configuration - V-Tenant User Filters
- Understanding CoreAdoption – Templates and Campaigns
- Understanding CoreLearning - Content Hierarchy
- Understanding CoreView Tenant Configuration - Portal Information
- Understanding CoreView Tenant Configuration - CoreLearning
- Understanding CoreView Tenant Configuration Options
-
Troubleshooting Common Issues
- Unable to see OneDrive, SharePoint and Exchange Data (New UX)
- Unable to see OneDrive, SharePoint and Exchange Data
- Remote Office 365 PowerShell session can Conflict CoreView Management Actions
- Why I cannot save the changes on existing License pool?
- Error when attempting to perform a Management Action (New UX)
- Error when attempting to perform a Management Action
- Unable to modify the Assigned Licenses in my License Pool Report
- Enabling Permission for Endpoint Manager Actions (New UX)
- Enabling Permission for Endpoint Manager Actions
- How to enable permission for BitLocker keys report (New UX)
- How to enable permission for BitLocker keys report
-
Tenant Administration
- How to recreate Admins Read-only (New UX)
- How to recreate Admins Read-only
- How to add an operator to the portal?
- How to enable and configure CoreView management session (New UX)
- How to enable and configure CoreView management session Current UX
- How to provide a consent to activate Azure AD Reports Feature and activate Partial Import?
- Tips & Tricks: Leverage Pivot Reports to Prototype License Pool Criteria Filter
- Tips & Tricks - How to manage email notifications for newly added Operators.
- Disable MFA from Read Only Service Accounts
- How To: Report on "Consumed Portal Licenses" (New UX)
- How To: Report on "Consumed Portal Licenses"
- How to Configure Allowed IP Addresses for CoreView Service Accounts
- Tips & Tricks: How to merge License Pools
- How to Use CoreView's Global Report Filters
- How to use the What If tool to check Azure AD conditional access policies
- How to Configure Allowed IP Addresses for CoreView Service Accounts
- How to Archive a Teams Group
- How to Restore a Teams Group
- On-demand Import for a Single Device in Endpoint Manager (Intune)
- Custom Actions using the Microsoft Graph API
- How to set up your tenant for the switch to Microsoft Graph API
- GraphAPI configuration: How to get Client ID and Client Secret
-
Reporting and Analytics
- How do I Check and Manage Calendar Permissions for a User? (newUX)
- How CoreView can help you with your Microsoft 365 Chargeback Goals.
- New UX: Understanding the new License Centers
- Understanding the Savings Opportunities Dashboard
- Understanding the License Optimization center
- Understanding License Pool Snapshots report
- Understanding Call quality dashboard
- Understanding Call quality report
- Understanding User call quality report
- Understanding Teams groups activity report
- Understanding Teams Adoption Growth Report
- Understanding Endpoint Manager reports
- Understanding Teams dashboard
- Understanding Risky Users report
- Understanding KPI dashboard
- Understanding Storage Dashboard
- Troubleshoot Active Users (License Usage) data
- Legacy Protocol Management
- Report Columns: Is active 30/60/90
- Quarantined Messages Report - Understanding The Reports
-
Managing and Administration
- Teams Voice: Direct Routing Support
- How to enable management function?
- CoreView Playbooks Overview
- CoreView Playbook Policy Overview
- Forward SMTP Address vs Forward Address management actions
- How to add the users in bulk while executing Users management actions?
- How to Create & Manage Custom Actions (New UX)
- How to Create & Manage Custom Actions
- How to schedule a report to be sent automatically, and how to modify its scheduling options?
- How to schedule an alert report for the License Count
- Tips & Tricks – How to read and modify license pool report?
- Overview of CoreView Workflow
- How to delegate Workflow management using roles
- How to configure CoreView and ServiceNow integration
- How to Enable Multi Factor Authentication for Operators and Admins who Access the CoreView Portal (New UX)
- How to Enable Multi Factor Authentication for Operators and Admins who Access the CoreView Portal
- How Can I Migrate from Group-Based Licenses to Direct Licenses Managed by CoreView?
- Naming convention rules
- Custom Actions: Forbidden and Warning Values
- How to add users to Distribution Group in bulk using via CSV
- Not able to manage licenses error (New UX)
- Not able to manage licenses error
- Using custom action json output as an input in the workflow
- Setting the Sensitivity Label on SharePoint as a Mandatory Field
- DistinguishedName vs OnPremisesDistinguishedName
-
Customer Engineering Workshop
- Migrating from Azure Group Based Licensing to CoreView
- Customer Engineering Workshop - Teams Voice
- Customer Engineering Workshop - Playbooks – policy, perfected
- New UX Workshop - General Overview Session 2
- New UX Workshop - General Overview Session 1
- What’s new in License reporting – the new user interface and the License Center
- CoreView and ServiceNow – Integrating Workflows with ServiceNow
- Advanced Workflows & Custom Actions
- Customer Engineering Workshop: Reports, Dashboards, and Alerts
- Limiting M365 Admin Access with Permission Roles, V-tenants, and License Pools
- Customer Engineering Workshop Global - Group Licensing with CoreView
- Customer Engineering Workshop Global - Filters and Custom Actions
-
Understanding CoreView - Quick Start Guides.
- Internal Customer Care Resources
- Service Issues
-
CoreView Product Manual
-
Analyze
- Dashboards
- KPI Dashboard
- Operational Reports
- License Reports
- User Reports
- Mail Traffic Reports
- Exchange Reports
- Skype for Business Reports
- Teams Reports
- Group Reports
- Device Reports
- Endpoint Manager Reports
- Security reports
- SharePoint Reports
- Aggregation Reports
- OneDrive Reports
- Yammer Reports
- Report Actions
-
Analyze
- Getting Started with CoreLearning
- Getting Started with CoreScan
- Getting Started with CoreTag
- Getting Started with CoreSaaS
- Learning Platform
- Playbooks
This article describes the out-of-the-box policies that are shipped as part of CoreSuite.
Teams Policies
One of the big challenges of Microsoft Teams is how quickly and easily it can grow out of control. Users can easily create new teams and new channels, and there is very little incentive to clean up Teams after they are no longer used. This has both security and productivity implications. From a security standpoint, files and other data can be placed in Teams without anyone monitoring whether the appropriate users who can see those documents are members of the Team or Channel. Guest users can be added without putting any sort of “end of access” date. From a productivity standpoint, as files and data accumulate in Teams it can be difficult for employees to know if they are accessing the correct and most relevant information. Imagine searching Teams for a customer list and returning 10 different Excel spreadsheets, all named “Latest”.
Inactive Teams
Problem to be solved: Inactive Teams groups can represent a problem for companies by leading to a loss of collaboration, wasted resources, data security risks, lack of accountability, and decreased employee engagement,
Policy definition: Inactive Teams identifies teams where there is no user activity occurring. Operators can configure how long a Team must be inactive before it is a policy violation (I.e., 90 days).
Remediation action: This remediation will email a named user to attest within 3 days whether to archive or delete the team. You can decide whether to archive or delete the team.
Empty Teams
Problem to be solved: Empty MTeams groups can be a problem for companies by leading to wasted resources, missed opportunities for collaboration, lack of engagement, confusion, fragmentation of communication, and potential security risks.
Policy definition: Empty teams are those teams that have no members.
Remediation action: With Empty Teams, you can choose to archive or remove the Team.
Teams without owners
Problem to be solved: Teams without owners cause difficulties if no one is monitoring the usage of the team, which can result in inappropriate members being added to the team, sensitive content being shared, and no one there to curate or manage. Microsoft recommends a minimum of two group owners per Team.
Policy definition: Find all the Teams groups with total owners equal to zero.
Remediation action: This workflow allows you to email a specified user or all members of the Team requesting that they identify and add a Team owner.
Teams without multiple owners
Problem to be solved: Teams without multiple owners can cause difficulties when the single owner has been removed.
Policy definition: Similar to above, Teams without multiple owners identifies groups with only a single owner.
Remediation action: This workflow allows you to email the owner or a specified user requesting that they identify and add additional Team owners.
Public Teams
Problem to be solved: For organizations that want to limit the number of Teams employees can join, Public Teams are something to be actively monitored. Many organizations have chosen a periodic attestation process to require Public Teams owners to attest that the Team is still necessary.
Policy definition: Finds all the Teams groups with access type equal to Public.
Remediation action: This workflow will email a group owner or specific user asking them to attest that the Team is still needed within 3 days. Otherwise, the Team will be archived or removed.
Teams with guest users
Problem to be solved: Teams groups with guest users can be a security risk as they may have access to files and content intended for employees only. identifies those teams who have guest users as members of the team.
Policy definition: Identifies those teams groups that have guest users as members of the team.
Remediation action: This workflow emails the group owner or a specified user requesting that they attest that the guest users still need access to the Team within 3 days. Otherwise, the guest owners are removed from the Team.
Teams with guest users with a certain sensitivity label
Problem to be solved: Sensitivity labels allow organizations to define different levels of sensitive information being shared.
Policy definition: The Teams with guest users with a certain sensitivity label policy allow you to identify those teams that should not have guest users based on the sensitivity of the information being shared. With this policy, you can identify the sensitivity label.
Remediation action: This workflow emails the group owner or a specified user requesting that they attest that the guest users still need access to the Team within 3 days. Otherwise, the guest owners are removed from the Team.
Security and Identity Playbook
23.02 introduces a new Security and Identity Management Playbook. Based on our experience with hundreds of companies managing their Microsoft 365 tenants, these are recommended practices for identifying and resolving common issues with security and identity management.
Inactive last 60 days but not blocked users
Problem to be solved: Security best practices suggest disabling the accounts of inactive users to reduce potential breaches.
Policy description: Finds users inactive for the last 60 days with active credentials. This list excludes guests.
Remediation action: This policy will email the inactive account’s manager or a named account to attest that the account should remain active. Otherwise, it will disable all those accounts that have been inactive in the last 60 days.
Admin without MFA
Problem to be solved: MFA is a must-have for all privileged users to reduce security risk due to compromised identity. MFA provides additional assurance that the individual attempting to gain access is who they claim to be. With MFA, an attacker would need to compromise at least two different authentication mechanisms, increasing the difficulty of compromise, thus reducing the risk.
Policy definition: Find all users with admin roles and without MFA
Remediation action: This policy will email the inactive account’s manager or a named account to attest that the account does not require MFA. Otherwise, it will re-enable MFA for targeted users.
Admin with password not changed in the last 90 days
Problem to be solved: Microsoft suggests ensuring the passwords of admin accounts and shared accounts change on a regular basis. Ensure all admin and shared accounts have signed in and changed their passwords at least once in the last 90 days.
Policy definition: Find all admin accounts that have not changed their password in the last 90 days
Remediation action: This policy will email the inactive account’s manager or a named account to attest that the account password does not need to change. Otherwise, it will force a password change for the user upon their next login.
Microsoft 365 Groups without Owners
Problem to be solved: Having M365 groups without owners cause difficulties if no one is monitoring usage of the group, which can result in inappropriate members being added, sensitive content being shared, and no one there to curate or manage.
Policy definition: Find all M365 groups that have total owners equal to zero.
Remediation action: This policy will trigger an email to a named user asking that a group owner be identified.
Inactive Guests in the last 90 days
Problem to be solved: Removing guest users that are no long active minimizes the risk that these accounts can be compromised.
Policy definition: Find all guest users that have been inactive for the last 90 days
Remediation action: This policy will remove the inactive users.
External Users in security groups
Problem to be solved: External users that have access to resources and data due to their membership in security groups need periodic attestation to ensure they are not forgotten, and they have the least possible privileges.
Policy definition: Find all external members that have been added to security groups
Remediation action: This policy requires a named user attest that external users should still belong to the security groups of which they are a member. If not attested to, they will be removed from the group.
External Users in Microsoft 365 groups
Problem to be solved: External users that have access to resources and data due to their membership in M365 groups need periodic attestation to ensure they are not forgotten, and they have the least possible access.
Policy definition: Find all external members that have been added to M365 groups
Remediation action: This policy requires a named user attest that external users should still belong to the security groups of which they are a member. If not attested to, they will be removed from the group.
Admin on-cloud without strong password
Problem to be solved: Security best practices suggest to set strong passwords for cloud users. Strong passwords have to include one mandatory element that is complexity to avoid security breach, especially for admin accounts.
Policy definition: Find all Admins with 'Account type' = ONCLOUD and who have been identified as not having a strong password
Remediation Action: This policy forces admins without strong password to re-set the password to include complexity.
Users without MFA
Problem to be solved: MFA is a critical capability for users to reduce security risk due to compromised identity. MFA provides additional assurance that the individual attempting to gain access is who they claim to be.
Policy definition: Find all users without MFA enabled
Remediation action: This policy will re-enable MFA for targeted users.
Users without default MFA method
Problem to be solved: Enabling MFA for users is a two step process. The user must first enroll in MFA, at which point it can be enabled. An unenrolled account is more vulnerable than even one where MFA is not enabled since it provides an opportunity for a bad actor to take over an account by enrolling with false credentials.
Policy definition: Find all users where no strong authentication method has yet been identified.
Remediation action: This policy emails the user asking them to complete MFA enrollment process and identify a default authentication method.
License Management Playbook
The new License Management Playbook contains policies that have been crafted from our extensive experience working with hundreds of organizations on managing their Microsoft 365 Tenants. These policies provide recommended practices for identifying and preventing license waste, while also ensuring the protection of valuable data.
Disabled users with assigned license
Problem to be solved: As users leave the organization, without structures processes in place, it can be forgotten to remove the user’s licenses. By reclaiming these licenses, an organization can avoid purchasing unnecessary additional licenses.
Policy description: Finds users with blocked credentials who have an assigned license of any kind.
Remediation action: This policy will email the blocked account’s manager or a named account to attest within 15 days that the license(s) are still needed. Otherwise, it will remove the licenses.
Licenses assigned to basic shared mailboxes
Problem to be solved: Resource and shared mailboxes can store up to 50 GB of data without needing an assigned license. If these mailboxes are assigned license, they can be reclaimed so the organization can avoid purchasing unnecessary additional licenses.
Policy description: Finds shared mailboxes that have been assigned a license, but which are below 50 GB of data
Remediation action: This policy will email a named account to attest within 15 days that the license(s) are still needed. Otherwise, it will remove the licenses.
Licenses assigned to guest users
Problem to be solved: Guest users may temporarily require a license or may be given one unnecessarily. By reclaiming these licenses, an organization can avoid purchasing unnecessary additional licenses.
Policy description: Finds all guest users with assigned licenses
Remediation action: This policy will email the guest account’s manager or a named account to attest within 15 days that the license(s) are still needed. Otherwise, it will remove the licenses.
Inactive MS365 E3 plan
Inactive MS365 E5 plan
Inactive MS365 F1 plan
Inactive MS365 F3 plan
Inactive MS365 F5 plan
Inactive Office365 E1 plan
Inactive Office365 E3 plan
Inactive Office365 E5 plan
Inactive Office365 F3 plan
Inactive Office365 G1 plan
Inactive Office365 G3 plan
Inactive Office365 G5 plan
Problem to be solved: Inactive licenses are an unnecessary expense. By reclaiming unused licenses, an organization can avoid purchasing unnecessary additional licenses.
Policy description: Finds users with the identified plan that has been inactive for the last 60/90/180 days.
Remediation action: This policy will email the inactive account’s manager or a named account to approve within 15 days that the license is still needed. If approved, it will remove the licenses, convert the user’s mailbox to a shared mailbox and grant the manager permission to access, and add the manager as the new owner of the user’s OneDrive.
Note: The Remove License action in this policy requires that customer's Tenant has the Microsoft Graph API enabled. Follow this guide to enable the Graph API.