Overview
-
Module 1: This module examines how Exchange Online Protection (EOP) protects organizations from phishing and spoofing. It also explores how EOP blocks spam, bulk email, and malware before they arrive in users’ mailboxes. By the end of this module, you should be able to:
- Describe how Exchange Online Protection analyzes email to provide anti-malware pipeline protection.
- List several mechanisms used by Exchange Online Protection to filter spam and malware.
- Describe other solutions administrators may implement to provide extra protection against phishing and spoofing.
- Understand how EOP provides protection against outbound spam.
-
Module 2: This module examines how Microsoft Defender for Office 365 extends EOP protection by filtering targeted attacks such as zero-day attacks in email attachments and Office documents, and time-of-click protection against malicious URLs. By the end of this module, you should be able to:
- Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
- Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
- Create outbound spam filtering policies.
- Unblock users who violated spam filtering policies so they can resume sending emails.
-
Module 3: This module examines how to manage Safe Attachments in your Microsoft 365 tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. By the end of this module, you should be able to:
- Create and modify a Safe Attachments policy using Microsoft 365 Defender.
- Create a Safe Attachments policy using PowerShell.
- Configure a Safe Attachments policy.
- Describe how a transport rule can disable a Safe Attachments policy.
- Describe the end-user experience when an email attachment is scanned and found to be malicious.
-
Module 4: This module examines how to manage Safe Links in your tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. By the end of this module, you should be able to:
- Create and modify a Safe Links policy using Microsoft 365 Defender.
- Create a Safe Links policy using PowerShell.
- Configure a Safe Links policy.
- Describe how a transport rule can disable a Safe Links policy.
- Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website.
University: Microsoft Learn
Provider: Microsoft
Categories: PowerShell Courses