{"id":35482,"date":"2020-06-11T16:00:32","date_gmt":"2020-06-11T16:00:32","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91162"},"modified":"2020-06-11T16:00:32","modified_gmt":"2020-06-11T16:00:32","slug":"whats-new-in-microsoft-365-compliance-and-risk-management","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/","title":{"rendered":"What\u2019s new in Microsoft 365 Compliance and Risk Management"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/What\u2019s-new-in-Microsoft-365-Compliance-BANNER.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>The world has dramatically changed over the past three months. As Satya shared in our recent quarterly earnings, we have seen two years\u2019 worth of digital transformation in two months. With that significant amount of rapid change, it\u2019s more important than ever to make sure your business-critical data is kept private and secure while ensuring you remain compliant with privacy laws and regulations.<\/p>\n<p>As the world continues to adjust, many of the customers I\u2019ve been talking with lately have started to focus on cost optimization\u2014how to do more with what they already have or even consolidate the number of systems they have to maintain.<\/p>\n<p>Within Microsoft 365 Compliance, we have been working alongside many of you to help you through the crisis, as well as continue to evaluate the implications of tech decisions on security, privacy, and compliance. With that in mind, here\u2019s a summary of some of the investments we\u2019ve made in the last two months in Microsoft 365 Compliance to help you to get the most out of Microsoft 365 and take a more integrated approach to secure, protect, and manage your data, while mitigating risk.<\/p>\n<h3>Data protection<\/h3>\n<p>With Microsoft Information Protection (MIP), we are building a unified set of capabilities for classification, labeling, protection, and data loss prevention not only in Office apps, but also in other popular productivity services where information resides (e.g., OneDrive, SharePoint, and Exchange). For example, to help you to have a more holistic understanding of the sensitive data in your digital estate, we <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/general-availability-of-know-your-data\/ba-p\/1387840\" target=\"_blank\" rel=\"noopener noreferrer\">recently announced the general availability<\/a> of the data classification capabilities in the Microsoft 365 compliance center. These capabilities enable you to discover, classify, review, and monitor your data and establish appropriate policies to better protect and govern critical data (e.g., by applying sensitivity and retention labels or data loss prevention policies).<\/p>\n<p>Another core component of Microsoft Information Protection is the ability to apply <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">sensitivity labels<\/a>. You can apply a sensitivity label to important documents or emails and associate it with protection policies and actions like encryption and visual marking. You can also be assured that the protection will persist with the document throughout its lifecycle. You can also apply sensitivity labels to a Microsoft Teams site, SharePoint site, or Microsoft 365 group and help to ensure appropriate device and privacy settings.<\/p>\n<p>Since labeling can help you to protect your data, you need a method that will scale with the vast amount of data you have. To help you achieve that scale,&nbsp;we are announcing general availability <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/apply-sensitivity-label-automatically?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">for automatic classification with sensitivity labels<\/a>&nbsp;for documents stored on OneDrive and SharePoint, and for emails in transit in Exchange.<\/p>\n<p>Users can also manually classify emails and documents by applying these labels based on their assessment of the content and their interpretation of the organizational guidelines. In fact, we <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/announcing-general-availability-of-sensitivity-labels-with\/ba-p\/1356224\" target=\"_blank\" rel=\"noopener noreferrer\">recently<\/a> announced the general availability of sensitivity labels with protection for Office files in SharePoint and OneDrive. Now your users can apply sensitivity labels, with protection policies, not just in Office apps on Windows, Mac, iOS, and Android but also in Office on the web. For files labeled and protected with encryption and stored in SharePoint and OneDrive, your users can search for content within these documents, coauthor using Office web apps, and be assured that the protection will persist even after the document is downloaded.<\/p>\n<p>We have also worked with other productivity tools like Microsoft Power BI to make it easy to apply Microsoft Information Protection\u2019s sensitivity label to Power BI artifacts \u2013 including dashboards, datasets, dataflows and reports. <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/announcing-general-availability-of-microsoft-information\/ba-p\/1449183\" target=\"_blank\" rel=\"noopener noreferrer\">Now generally available<\/a>, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/announcing-general-availability-of-microsoft-information\/ba-p\/1449183\" target=\"_blank\" rel=\"noopener noreferrer\">this ensures the persistent protection of the data<\/a> \u2013 even if exported to a file format such as Excel, as the exported file inherits the sensitivity label and associated protection settings. Rolling out soon is the persistence of label and protection when you embed a Power BI report in Microsoft Teams or when you maintain a live connection between an Excel file and a labeled Power BI data set.<\/p>\n<h3>Data governance<\/h3>\n<p>The increased volume of information and multiple collaboration tools can create complexity for managing business records with serious cost and risk implications. As organizations across a variety of industries face ever-increasing regulations, many companies move data to different systems of record to manage them and comply with regulations. However, moving content to a different system, instead of managing it in place, can increase the risk of missing records or not declaring them properly.<\/p>\n<p>With that in mind, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/30\/data-governance-matters-now-more-than-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">we recently released<\/a> the&nbsp;<a href=\"https:\/\/aka.ms\/RecordsManagementGAApril2020\" target=\"_blank\" rel=\"noopener noreferrer\">general availability of&nbsp;Microsoft 365&nbsp;Records Management<\/a>&nbsp;to provide you with significantly greater depth in protecting and governing critical data. With Records Management, you can classify, retain, review, dispose, and manage content without compromising productivity or data security. Records Management also uses machine learning capabilities to identify and classify regulatory, legal, and business critical records at scale. In addition, it can help you demonstrate compliance with regulations through defensible audit trails and proof of destruction.<\/p>\n<h3>Compliance and security in Microsoft Teams<\/h3>\n<p>With the move to remote work, many companies are operating solely in platforms like Microsoft Teams to stay connected, productive, and collaborative and keep their businesses moving forward. However, the move to remote work only seems to amplify the need for security, privacy, and compliance. We built Teams with that mind. <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/04\/06\/it-professionals-privacy-security-microsoft-teams\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data in Teams is encrypted<\/a> at rest and in transport, and uses secure real-time protocol for video, audio, and desktop sharing.<\/p>\n<p>Last month, we shared that there are also several tools that help you remain in control and protect sensitive documents and data in&nbsp;Microsoft 365. For example, you can&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels-teams-groups-sites?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">restrict Teams experiences for guests and people outside of your organization<\/a>. You can also govern the apps to which each user has access. Setting up&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/dlp-microsoft-teams?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">DLP policies in Teams<\/a>&nbsp;can protect your data and take specific actions when sensitive information is shared.<\/p>\n<p>There\u2019s so much more. Read the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/06\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 blog<\/a> for details.<\/p>\n<h3>Managing insider risk and maintaining your culture<\/h3>\n<p>We also know that&nbsp;<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2008_005_001_14981.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">stressful events contribute to the likelihood of insider risks<\/a>, such as leakages, IP theft, or data harassment. Insider Risk Management looks at activity from across&nbsp;Microsoft 365, including Teams, to identify potential suspicious activity early.<\/p>\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/announcing-the-general-availability-of-communication-compliance\/ba-p\/1167989\" target=\"_blank\" rel=\"noopener noreferrer\">Communication Compliance<\/a>, part of the new Insider Risk Management solution set in&nbsp;Microsoft 365, leverages machine learning to quickly identify and take action on code of conduct policy violations in company communications channels, including Teams. Communication Compliance reasons over language used in Teams\u2014<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/yammer-blog\/use-communication-compliance-to-manage-risk-and-identify\/ba-p\/1391174\" target=\"_blank\" rel=\"noopener noreferrer\">and now also Yammer<\/a>\u2014which may indicate issues related to threats (harm to oneself or others). Detecting this type of language in a timely manner not only minimizes the impact of internal risk, but also can help to support employee mental health in uncertain times like this.<\/p>\n<h3>Commitment to continued investment<\/h3>\n<p>This new remote work world makes data protection, governance, and security arguably more important than ever. We continue to innovate across Microsoft 365 Compliance to ensure you have the tools you need to help keep your data safe while addressing compliance and proper risk management.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/06\/11\/whats-new-microsoft-365-compliance-risk-management\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out some of the investments we\u2019ve made to help you to get the most out of Microsoft 365 Compliance and take a more integrated approach to secure, protect, and manage your data, while mitigating risk.<br \/>\nThe post What\u2019s new in Microsoft 365 Compliance and Risk Management appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35483,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,347,6420],"class_list":["post-35482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-cybersecurity","tag-microsoft-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-11T16:00:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What\u2019s new in Microsoft 365 Compliance and Risk Management\",\"datePublished\":\"2020-06-11T16:00:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/\"},\"wordCount\":1182,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/whats-new-in-microsoft-365-compliance-and-risk-management.png\",\"keywords\":[\"compliance\",\"Cybersecurity\",\"Microsoft 365\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/\",\"name\":\"What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/whats-new-in-microsoft-365-compliance-and-risk-management.png\",\"datePublished\":\"2020-06-11T16:00:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/whats-new-in-microsoft-365-compliance-and-risk-management.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/whats-new-in-microsoft-365-compliance-and-risk-management.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-new-in-microsoft-365-compliance-and-risk-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What\u2019s new in Microsoft 365 Compliance and Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-11T16:00:32+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What\u2019s new in Microsoft 365 Compliance and Risk Management","datePublished":"2020-06-11T16:00:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/"},"wordCount":1182,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png","keywords":["compliance","Cybersecurity","Microsoft 365"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/","url":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/","name":"What\u2019s new in Microsoft 365 Compliance and Risk Management 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png","datePublished":"2020-06-11T16:00:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/whats-new-in-microsoft-365-compliance-and-risk-management.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whats-new-in-microsoft-365-compliance-and-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"What\u2019s new in Microsoft 365 Compliance and Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35482"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35483"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}