Home > New Features and Improvements
Download this articleRelease Date for the Commercial Environment: April 12, 2026
Release Date for the US Government Environment: April 19, 2026
Policies for Microsoft 365 is now supported in the United Arab Emirates (Dubai) data center.
A new auto-fix action is now available for the Scanned Orphaned Users rule. You can assign the primary contact or a specific user as the primary site admin when the orphaned user currently holds that role, ensuring the orphaned user can be removed as expected.
The Site Collection Administrator Enforcement rule now lets you enforce either the primary contact or the secondary contact as the primary site admin.
The dashboard now includes a violation trends report that shows the total number of violations, fixed violations, and a breakdown of manual versus automatic fixes. You can filter results by time period and object type for more detailed insights.
Dynamic object name references are now supported in violation report details, automatically displaying workspace-specific identifiers (such as site names) in email notifications so users can quickly identify the affected object.
For the following sharing link related rules, the Include both the Microsoft Entra groups and their members checkbox has been added. When enabled, Policies for Microsoft 365 will evaluate all individual members within the specified Microsoft Entra groups, including those in nested groups.
Restrict Sharing Links
Restrict Sharing links with Edit Permission
Sharing Link Expiration Enforcement
You can now set independent scan intervals for the following rules:
Privacy Restriction
User/Group Restriction
Owner Number Restriction
The Ownership Restriction rule for Groups and Teams now includes an additional auto-fix action to demote out-of-policy users to members.
The Private Channel Ownership Enforcement rule has been enhanced to ensure it works correctly even if the designated user account isn’t a member of the parent team.
This feature requires an additional application permission TeamMember.ReadWrite.All.
If your organization has configured an app profile for the service app, navigate to AvePoint Online Services > Management > App management to re-authorize the app profile.
If your organization has configured an app profile for the custom Azure app, navigate to the Microsoft Entra admin center to add permission to the app.