Data Lifecycle Management: Separate Copilot retention policies from Teams chats

In a previous post I mentioned how Microsoft is adding the capability to use Purview Data Loss Prevention on Copilot to block certain information from surfacing for the user. Now, Microsoft is adding Copilot to it's retention policy controls, and starting mid-February, public preview tenants can start exploringthis new feature. Admins will be able to create separate retention policies for Microsoft Teams chats and Microsoft 365 Copilot interactions, and allows for a more tailored data management. The feature will of course require that the targeted users have Microsoft 365 Copilot license.  According to the message center, the public preview will be during February, and we can hope for a general release sometime in March. The feature will be available by default, but policies will have to be set up.

Microsoft has started to disable Basic Authentication (affecting Teams and Exchange Online)

 Microsoft is serious about removing the Basic Authentication protocols from their services. The change was announced back in 2019, but has been delayed a couple of times. Earlier this fall Microsoft announced there would be on further delays, and that preparations for the change should be made.

Earlier this week I was notified about the coming change to my tenant through the Admin Message Center. 14 days from now, basic authentication will no longer be available to me: 

"14 days from today we're going to turn off Basic Authentication for POP3, IMAP4, Remote PowerShell, Exchange Web Services, Offline Address Book, MAPI, RPC and Exchange ActiveSync protocol in your tenant, and will also disable SMTP AUTH completely. Note: Based on our telemetry, no users in your tenant are currently using Basic Authentication with those protocols and so we expect there to be no impact to you."

This coming change can have a major impact on many organizations. As a consultant I am engaged in multiple companies facing the challenge of preparing for this change. It might seem trivial, but most organization have over time implemented many services that are using basic authentication without being aware of them. The best way of preparing for this is by starting to go through your sign-in logs in Azure AD and identify any user who use basic Authentication. Some of the things I have noticed are using basic authentication are: Many services reading calendar information (like switchboard integrations), printer services, old mobile devices (often up to date, but wrong configuration), Microsoft Teams Rooms not set up for modern authentication, 3rd party and self developed applications.

Stay up to date, and get Microsoft's recommendations here