Learn how to defend against threats to Office 365 products that can enter through dangerous web links and email attachments.
Overview
Syllabus
Introduction
- Secure your organization with Microsoft Defender
- What you should know
- Course lab setup
- Licensing
- Accessing the Defender Portal
- Preset security policies and rules
- Exchange Online Policies (EOP) anti-spam policies
- Configuration analyzer
- Allow and Block lists
- Scenario: What would you do?
- Anti-phishing
- Safe Attachments
- Safe Links
- Anti-spam
- Anti-malware
- Alert policies
- Scenario: What would you do?
- Overview of Cloud App Protection in Defender for Office 365
- Cloud App Catalog
- Create Cloud App policies
- Scenario: What would you do?
- Utilize message trace to track an email
- Analyze the health of the system
- Configure permissions and roles
- Incidents and alerts
- Scenario: What would you do?
- Guided threat hunting
- Schema alerts
- Learning Kusto Query Language (KQL)
- Scenario: What would you do?
- Next steps
Taught by
Robert McMillen