Manage your Microsoft 365 security services

Go to class
Write Review

Free Online Course: Manage your Microsoft 365 security services provided by Microsoft Learn is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Examine Exchange Online Protection
    • By the end of this module, you'll be able to:

      • Describe how Exchange Online Protection (EOP) analyzes email to provide anti-malware pipeline protection
      • List several mechanisms used by EOP to filter spam and malware
      • Describe other solutions administrators may implement to provide extra protection against phishing and spoofing
      • Describe the benefits of the Spoof Intelligence feature in the Security & Compliance Center
    • Module 2: Examine Microsoft Defender for Office 365
    • By the end of this module, you will be able to:

      • Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
      • Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
    • Module 3: Manage Safe Attachments
    • By the end of this module, you will be able to:

      • Create and modify a Safe Attachments policy using Microsoft 365 Defender
      • Create a Safe Attachments policy by using PowerShell
      • Configure a Safe Attachments policy
      • Describe how a transport rule can disable a Safe Attachments policy
      • Describe the end-user experience when an email attachment is scanned and found to be malicious
    • Module 4: Manage Safe Links
    • By the end of this module, you will be able to:

      • Create and modify a Safe Links policy using Microsoft 365 Defender
      • Create a Safe Links policy using PowerShell
      • Configure a Safe Links policy
      • Describe how a transport rule can disable a Safe Links policy
      • Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
    • Module 5: Explore reporting in the Microsoft 365 security services
    • By the end of this module, you will be able to:

      • List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector
      • Identify where to access reports generated by EOP and Microsoft Defender for Office 365
      • Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365

Syllabus
    • Module 1: Examine Exchange Online Protection
      • Introduction
      • Examine the anti-malware pipeline in Microsoft 365
      • Detect messages with spam or malware using Zero-hour auto purge
      • Explore the phishing and spoofing protection provided by EOP
      • Explore the spoofing protection provided by EOP
      • Manage spoof intelligence in the Microsoft 365 Security Compliance Center
      • Knowledge check
      • Summary
    • Module 2: Examine Microsoft Defender for Office 365
      • Introduction
      • Expand EOP protections by using Safe Attachments and Safe Links
      • Protect users from malicious attachments by using Safe Attachments
      • Configure Safe Attachment policy options
      • Protect users from malicious URLs by using Safe Links
      • Configure Safe Links policy options
      • Knowledge check
      • Summary
    • Module 3: Manage Safe Attachments
      • Introduction
      • Create Safe Attachment policies using Microsoft 365 Defender
      • Create Safe Attachments policies using PowerShell
      • Modify an existing Safe Attachments policy
      • Create a transport rule to bypass a Safe Attachments policy
      • Examine the end-user experience with Safe Attachments
      • Knowledge check
      • Summary
    • Module 4: Manage Safe Links
      • Introduction
      • Create Safe Links policies using Microsoft 365 Defender
      • Create Safe Links policies using PowerShell
      • Modify an existing Safe Links policy
      • Create a transport rule to bypass a Safe Links policy
      • Examine the end-user experience with Safe Links
      • Knowledge check
      • Summary
    • Module 5: Explore reporting in the Microsoft 365 security services
      • Introduction
      • Examine the Threat Protection Status report
      • Examine the Defender for Office 365 Message Disposition report
      • Examine the File Type and Disposition report
      • Examine the Malware Detections report
      • Examine the Top Malware report
      • Examine the Top Senders and Recipients report
      • Examine the Spoof Mail report
      • Examine the Spam Detections report
      • Examine the Sent and Received Email report
      • Knowledge check
      • Summary