Service behavior a Multi-Geo enabled environment

Here's a look at how Microsoft 365 services work in a Multi-Geo environment.

Administrator experience

The SharePoint admin center has a Geo locations tab in the left navigation that features a geo locations map where you can view and manage your geo locations. Use this page to add or delete geo locations for your Tenant.

A unified Audit log for all your Satellite Geography locations is available from the Microsoft 365 audit log search page. You can see all the audit log entries from across geo locations, for example, NAM & EUR users' activities will show up in one org view and then you can apply existing filters to see specific user's activities.

BCS, Secure Store, Apps

BCS, Secure Store, and Apps all have separate instances in each satellite location, and therefore the SharePoint administrator should manage and configure these services separately from each satellite location.

Compliance admin center

There's one central Microsoft Purview compliance portal for a Multi-Geo Tenant: Microsoft Purview admin center.

eDiscovery

By default, an eDiscovery Manager or Administrator of a Multi-Geo Tenant will be able to conduct eDiscovery tasks only in the Primary Provisioned Geography of that Tenant. A member of the Organization Management role group or a user with the Role Management role must assign eDiscovery Manager permissions in the Microsoft Purview portal to allow others to perform eDiscovery tasks and assign a "Region" parameter in their applicable Compliance Security Filter to specify the Geography for conducting eDiscovery as Satellite Geography location. Otherwise, no eDiscovery activities will be carried out for the Satellite Geography location. Only one "Region" security filter per user is supported.

See Assign eDiscovery permissions in the compliance portal for more information. To configure the Compliance Security Filter for a Region, see Configure Office 365 Multi-Geo eDiscovery.

Exchange Online mailboxes

Users' Exchange Online mailboxes are moved automatically if their PDL is changed. When a new mailbox is created, it's provisioned to the user's PDL or to the central location if no value has been set for the user's PDL.

Information Protection (IP) Data Loss Prevention (DLP) policy

You can set your IP DLP policies for OneDrive, SharePoint, and Exchange Online in the Security and Compliance center, scoping policies as needed to the whole Tenant or to applicable users. For example: If you wish to select a policy for a user in a satellite location, select to apply the policy to a specific OneDrive and enter the user's OneDrive URL. See Overview of data loss prevention policies for general guidance in creating DLP policies.

The DLP policies are automatically synchronized based on their applicability to each geo location.

Implementing Information Protection and Microsoft Purview Data Loss Prevention policies to all users in a geo location isn't an option available in the UI, instead you must select the applicable accounts for the policy or apply the policy globally to all accounts.

Microsoft Power Apps

Power Apps created for the satellite location will use the end point located in the central location for the Tenant. Microsoft Power Apps isn't a Multi-Geo service.

Microsoft Power Automate

Flows created for the satellite location will use the end point located in the default geo location for the Tenant. Microsoft Power Automate isn't a Multi-Geo service.

SharePoint storage quota

By default, all geo locations of a multi-geo environment share the available Tenant storage quota. You can also manage the storage quota by allocating a specific quota for a particular geo location. For more information, see SharePoint storage quotas in multi-geo environments.

Sharing

Administrators can set and manage sharing policies for each of their locations. The OneDrive and SharePoint sites in each geo location will honor only the corresponding geo-specific sharing settings. (For example, you can allow external sharing for your central location, but not for your satellite location or vice versa.) Note that the sharing settings don't allow configuring sharing limitations between geo locations.

Microsoft Stream

Videos uploaded to Microsoft Stream in a 1:1 chat are stored in the OneDrive of the person uploading. Meeting recordings are stored in the OneDrive of each attendee who records the meeting.

Taxonomy

We support a unified taxonomy for enterprise-managed metadata across geo locations, with the master being hosted in the central location for your company. We recommend that you manage your global taxonomy from the central location and only add location-specific terms to the satellite location's Taxonomy. Global taxonomy terms will synchronize to the satellite locations.

See Manage metadata in a Multi-Geo tenant for more details and for developer guidance.

User Profile Application

There's a user profile application in each geo location. Each user's profile information is hosted in their geo location and available to the administrator for that geo location.

If you have custom profile properties, then we recommend that you use the same profile schema across geographies and populate your custom profile properties either in all geo locations or where needed. For guidance regarding how to populate user profile data programmatically, please refer to the Bulk User Profile Update API.

See Work with user profiles in a Multi-Geo tenant for additional details and for developer guidance.

Viva Engage

Viva Engage isn't a Multi-Geo workload. Viva Engage threads stored in Viva Engage will be placed in the Tenant's central location. Viva Engage is rolling out a file storage change which will store Viva Engage files within SharePoint. Viva Engage files stored in SharePoint will be placed the SharePoint site associated with the Viva Engage group. SharePoint group sites are based on PDL logic as outlined in SharePoint Sites and Groups.