Search

MC466201 – (Updated) Azure Active Directory (AAD) and Microsoft (MSA) accounts can be linked to earn Microsoft Rewards points (archived)

Microsoft Edge

*For this entry exists the more relevant or more recent entry MC512607

check before: 2022-12-11

Product:

Azure Active Directory, Entra, Entra ID, Microsoft 365 admin center, Microsoft Edge, Microsoft Search

Platform:

World tenant, Online

Status:

Change type:

Admin impact, New feature, Updated message, User impact

Links:

MC512607

Details:

Updated December 27, 2022: We are providing additional guidance for your information:
After December 10, admins can turn off account linking using PowerShell script (outlined below).
After January 17, the toggle to enable or disable the feature will be available in Microsoft 365 Admin portal Settings page. Until then, please use the PowerShell script.
Microsoft now offers the ability to link an Azure Active Directory (AAD) work account and a personal Microsoft account (MSA). With this change, AAD users with a linked MSA account can now earn Microsoft Rewards points for Microsoft Bing searches done in their browser or Windows search box while signed in with their AAD account. This expanded Rewards eligibility was made based on user feedback.
The ability to link accounts will be enabled by default so account linking is available to an organization’s employees, but still requires employees to opt-in. The choice to link accounts is in an employee’s hands, and they need to take action to connect their AAD and MSA accounts.
Account linking will not change any group policies. Personal and work searches will not be linked, and there is no change to how searches are stored. Microsoft’s principles for data security and privacy in the enterprise still hold, which ensures that confidential organizational information including search history will not be collected on AAD accounts even after accounts are linked. Microsoft will not collect any new data for targeted advertising as a result of this change.
[When will this happen]
Admin control (via PowerShell) available now.
After January 17, the toggle to enable or disable the feature will be available in Microsoft 365 Admin portal Settings page. Until then, please use the PowerShell script.

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Release Phase:

Created:
2022-11-12

updated:
2022-12-28

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


changes*

DatePropertyoldnew
2022-12-28MC MessagesMicrosoft now offers the ability to link an Azure Active Directory (AAD) work account and a personal Microsoft account (MSA). With this change, AAD users with a linked MSA account can now earn Microsoft Rewards points for Microsoft Bing searches done in their browser or Windows search box while signed in with their AAD account. This expanded Rewards eligibility was made based on user feedback.
The ability to link accounts will be enabled by default so account linking is available to an organization’s employees, but still requires employees to opt-in. The choice to link accounts is in an employee’s hands, and they need to take action to connect their AAD and MSA accounts.
Account linking will not change any group policies. Personal and work searches will not be linked, and there is no change to how searches are stored. Microsoft’s principles for data security and privacy in the enterprise still hold, which ensures that confidential organizational information including search history will not be collected on AAD accounts even after accounts are linked. Microsoft will not collect any new data for targeted advertising as a result of this change.
[When will this happen]
Admin control (via PowerShell) available now.
Account linking will be enabled no earlier than December 11, 2022 and will honor enabled/disabled settings.
Updated December 27, 2022: We are providing additional guidance for your information:
After December 10, admins can turn off account linking using PowerShell script (outlined below).
After January 17, the toggle to enable or disable the feature will be available in Microsoft 365 Admin portal Settings page. Until then, please use the PowerShell script.
Microsoft now offers the ability to link an Azure Active Directory (AAD) work account and a personal Microsoft account (MSA). With this change, AAD users with a linked MSA account can now earn Microsoft Rewards points for Microsoft Bing searches done in their browser or Windows search box while signed in with their AAD account. This expanded Rewards eligibility was made based on user feedback.
The ability to link accounts will be enabled by default so account linking is available to an organization’s employees, but still requires employees to opt-in. The choice to link accounts is in an employee’s hands, and they need to take action to connect their AAD and MSA accounts.
Account linking will not change any group policies. Personal and work searches will not be linked, and there is no change to how searches are stored. Microsoft’s principles for data security and privacy in the enterprise still hold, which ensures that confidential organizational information including search history will not be collected on AAD accounts even after accounts are linked. Microsoft will not collect any new data for targeted advertising as a result of this change.
[When will this happen]
Admin control (via PowerShell) available now.
After January 17, the toggle to enable or disable the feature will be available in Microsoft 365 Admin portal Settings page. Until then, please use the PowerShell script.
2022-12-28MC TitleAzure Active Directory (AAD) and Microsoft (MSA) accounts can be linked to earn Microsoft Rewards points(Updated) Azure Active Directory (AAD) and Microsoft (MSA) accounts can be linked to earn Microsoft Rewards points
2022-12-28MC Last Updated11/12/2022 01:14:512022-12-27T22:08:18Z
2022-12-28MC MessageTagNamesNew feature, User impact, Admin impactUpdated message, New feature, User impact, Admin impact
2022-12-28MC End Time01/13/2023 09:00:002023-02-28T09:00:00Z

*starting April 2022

Last updated 4 months ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!