- This module examines how Exchange Online Protection (EOP) protects organizations from phishing and spoofing. It also explores how EOP blocks spam, bulk email, and malware before they arrive in users’ mailboxes.
By the end of this module, you should be able to:
Describe how Exchange Online Protection analyzes email to provide anti-malware and anti-spam protection.
List several mechanisms used by Exchange Online Protection to filter spam and malware.
Describe other solutions administrators might implement to provide extra protection against phishing and spoofing.
Understand how EOP provides protection against outbound spam.
- This module examines how Microsoft Defender for Office 365 extends EOP protection through various tools, including Safe Attachments, Safe Links, spoofed intelligence, spam filtering policies, and the Tenant Allow/Block List.
By the end of this module, should be able to:
Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
Create outbound spam filtering policies.
Manage email access with the Restrict Access list and the Tenant Allow/Block list.
Submit messages, URLs, files, and attachments to Microsoft for analysis.
- This module examines how to manage Safe Attachments in your Microsoft 365 tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. MS-102
By the end of this module, you should be able to:
Create and modify a Safe Attachments policy using Microsoft Defender XDR
Create a Safe Attachments policy by using PowerShell
Configure a Safe Attachments policy
Describe how a transport rule can disable a Safe Attachments policy
Describe the end-user experience when an email attachment is scanned and found to be malicious
- This module examines how to manage Safe Links in your tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. MS-102
By the end of this module, you should be able to:
Create and modify a Safe Links policy using Microsoft Defender XDR
Create a Safe Links policy using PowerShell
Configure a Safe Links policy
Describe how a transport rule can disable a Safe Links policy
Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Examine email protection in Microsoft 365
- Introduction
- Implement anti-malware policies
- Implement anti-spam policies
- Detect messages with spam or malware using Zero-hour auto purge
- Explore anti-spoofing protection provided by Exchange Online Protection
- Explore other anti-spoofing protection
- Examine outbound spam filtering
- Module assessment
- Summary
- Enhance your email protection using Microsoft Defender for Office 365
- Introduction
- Climb the security ladder from EOP to Microsoft Defender for Office 365
- Expand EOP protections by using Safe Attachments and Safe Links
- Manage spoofed intelligence
- Configure outbound spam filtering policies
- Manage email access in Microsoft 365
- Submit messages, URLs, files, and attachments to Microsoft for analysis
- Module assessment
- Summary
- Manage Safe Attachments
- Introduction
- Protect users from malicious attachments by using Safe Attachments
- Create Safe Attachment policies using Microsoft Defender for Office 365
- Create Safe Attachments policies using PowerShell
- Modify an existing Safe Attachments policy
- Create a transport rule to bypass a Safe Attachments policy
- Examine the end-user experience with Safe Attachments
- Module assessment
- Summary
- Manage Safe Links
- Introduction
- Protect users from malicious URLs by using Safe Links
- Create Safe Links policies using Microsoft 365 Defender
- Create Safe Links policies using PowerShell
- Modify an existing Safe Links policy
- Create a transport rule to bypass a Safe Links policy
- Examine the end-user experience with Safe Links
- Module assessment
- Summary