Service behavior a Multi-Geo enabled environment
Here's a look at how Microsoft 365 services work in a Multi-Geo environment.
The SharePoint admin center has a Geo locations tab in the left navigation that features a geo locations map where you can view and manage your geo locations. Use this page to add or delete geo locations for your Tenant.
Audit log search
A unified Audit log for all your Satellite Geography locations is available from the Microsoft 365 audit log search page. You can see all the audit log entries from across geo locations, for example, NAM & EUR users' activities will show up in one org view and then you can apply existing filters to see specific user's activities.
Exchange admin audit events are only available for the default location.
BCS, Secure Store, Apps
BCS, Secure Store, and Apps all have separate instances in each satellite location, therefore the SharePoint Online administrator should manage and configure these services separately from each satellite location.
Compliance admin center
There's one central Microsoft Purview compliance portal for a Multi-Geo Tenant: Microsoft Purview admin center.
By default, an eDiscovery Manager or Administrator of a Multi-Geo Tenant will be able to conduct eDiscovery only in the Primary Provisioned Geography of that Tenant. The Office 365 global administrator must assign eDiscovery Manager permissions to allow others to perform eDiscovery and assign a "Region" parameter in their applicable Compliance Security Filter to specify the region for conducting eDiscovery as satellite location, otherwise no eDiscovery will be carried out for the satellite location. To configure the Compliance Security Filter for a Region, see Configure Office 365 Multi-Geo eDiscovery.
Exchange Online mailboxes
Users' Exchange Online mailboxes are moved automatically if their PDL is changed. When a new mailbox is created, it's provisioned to the user's PDL or to the central location if no value has been set for the user's PDL.
Information Protection (IP) Data Loss Prevention (DLP) policy
You can set your IP DLP policies for OneDrive for Business, SharePoint Online, and Exchange Online in the Security and Compliance center, scoping policies as needed to the whole Tenant or to applicable users. For example: If you wish to select a policy for a user in a satellite location, select to apply the policy to a specific OneDrive for Business and enter the user's OneDrive for Business URL. See Overview of data loss prevention policies for general guidance in creating DLP policies.
The DLP policies are automatically synchronized based on their applicability to each geo location.
Implementing Information Protection and Microsoft Purview Data Loss Prevention policies to all users in a geo location isn't an option available in the UI, instead you must select the applicable accounts for the policy or apply the policy globally to all accounts.
Microsoft Power Apps
Power Apps created for the satellite location will use the end point located in the central location for the Tenant. Microsoft Power Apps isn't a Multi-Geo service.
Microsoft Power Automate
Flows created for the satellite location will use the end point located in the default geo location for the Tenant. Microsoft Power Automate isn't a Multi-Geo service.
SharePoint Online storage quota
By default, all geo locations of a multi-geo environment share the available Tenant storage quota. You can also manage the storage quota by allocating a specific quota for a particular geo location. For more information, see SharePoint storage quotas in multi-geo environments.
Administrators can set and manage sharing policies for each of their locations. The OneDrive for Business and SharePoint Online sites in each geo location will honor only the corresponding geo-specific sharing settings. (For example, you can allow external sharing for your central location, but not for your satellite location or vice versa.) Note that the sharing settings don't allow configuring sharing limitations between geo locations.
Videos uploaded to Microsoft Stream in a 1:1 chat are stored in the OneDrive for Business of the person uploading. Meeting recordings are stored in the OneDrive for Business of each attendee who records the meeting.
We support a unified taxonomy for enterprise-managed metadata across geo locations, with the master being hosted in the central location for your company. We recommend that you manage your global taxonomy from the central location and only add location-specific terms to the satellite location's Taxonomy. Global taxonomy terms will synchronize to the satellite locations.
See Manage metadata in a Multi-Geo tenant for more details and for developer guidance.
User Profile Application
There's a user profile application in each geo location. Each user's profile information is hosted in their geo location and available to the administrator for that geo location.
If you have custom profile properties, then we recommend that you use the same profile schema across geographies and populate your custom profile properties either in all geo locations or where needed. For guidance regarding how to populate user profile data programmatically, please refer to the Bulk User Profile Update API.
See Work with user profiles in a Multi-Geo tenant for additional details and for developer guidance.
Yammer is not a Multi-Geo workload. Yammer threads stored in Yammer will be placed in the Tenant's central location. Yammer is rolling out a file storage change which will store Yammer files within SharePoint. Yammer files stored in SharePoint will be placed the SharePoint site associated with the Yammer group. SharePoint group sites are based on PDL logic as outlined in SharePoint Sites and Groups.
Submit and view feedback for