- Module 1: Examine Exchange Online Protection
- Describe how Exchange Online Protection (EOP) analyzes email to provide anti-malware pipeline protection
- List several mechanisms used by EOP to filter spam and malware
- Describe other solutions administrators may implement to provide extra protection against phishing and spoofing
- Describe the benefits of the Spoof Intelligence feature in the Security & Compliance Center
- Module 2: Examine Microsoft Defender for Office 365
- Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
- Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
- Module 3: Manage Safe Attachments
- Create and modify a Safe Attachments policy using Microsoft 365 Defender
- Create a Safe Attachments policy by using PowerShell
- Configure a Safe Attachments policy
- Describe how a transport rule can disable a Safe Attachments policy
- Describe the end-user experience when an email attachment is scanned and found to be malicious
- Module 4: Manage Safe Links
- Create and modify a Safe Links policy using Microsoft 365 Defender
- Create a Safe Links policy using PowerShell
- Configure a Safe Links policy
- Describe how a transport rule can disable a Safe Links policy
- Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
- Module 5: Explore reporting in the Microsoft 365 security services
- List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector
- Identify where to access reports generated by EOP and Microsoft Defender for Office 365
- Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365
By the end of this module, you'll be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to: