Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

MS-101 Manage your security services in Microsoft Defender XDR

Microsoft via Microsoft Learn

Overview

  • Module 1: Examine Exchange Online Protection
  • By the end of this module, you'll be able to:

    • Describe how Exchange Online Protection (EOP) analyzes email to provide anti-malware pipeline protection
    • List several mechanisms used by EOP to filter spam and malware
    • Describe other solutions administrators may implement to provide extra protection against phishing and spoofing
    • Describe the benefits of the Spoof Intelligence feature in the Security & Compliance Center
  • Module 2: Examine Microsoft Defender for Office 365
  • By the end of this module, you will be able to:

    • Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
    • Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
  • Module 3: Manage Safe Attachments
  • By the end of this module, you will be able to:

    • Create and modify a Safe Attachments policy using Microsoft 365 Defender
    • Create a Safe Attachments policy by using PowerShell
    • Configure a Safe Attachments policy
    • Describe how a transport rule can disable a Safe Attachments policy
    • Describe the end-user experience when an email attachment is scanned and found to be malicious
  • Module 4: Manage Safe Links
  • By the end of this module, you will be able to:

    • Create and modify a Safe Links policy using Microsoft 365 Defender
    • Create a Safe Links policy using PowerShell
    • Configure a Safe Links policy
    • Describe how a transport rule can disable a Safe Links policy
    • Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
  • Module 5: Explore reporting in the Microsoft 365 security services
  • By the end of this module, you will be able to:

    • List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector
    • Identify where to access reports generated by EOP and Microsoft Defender for Office 365
    • Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365

Syllabus

  • Module 1: Examine Exchange Online Protection
    • Introduction
    • Examine the anti-malware pipeline in Microsoft 365
    • Detect messages with spam or malware using Zero-hour auto purge
    • Explore the phishing and spoofing protection provided by EOP
    • Explore the spoofing protection provided by EOP
    • Manage spoof intelligence in the Microsoft 365 Security Compliance Center
    • Knowledge check
    • Summary
  • Module 2: Examine Microsoft Defender for Office 365
    • Introduction
    • Expand EOP protections by using Safe Attachments and Safe Links
    • Protect users from malicious attachments by using Safe Attachments
    • Configure Safe Attachment policy options
    • Protect users from malicious URLs by using Safe Links
    • Configure Safe Links policy options
    • Knowledge check
    • Summary
  • Module 3: Manage Safe Attachments
    • Introduction
    • Create Safe Attachment policies using Microsoft 365 Defender
    • Create Safe Attachments policies using PowerShell
    • Modify an existing Safe Attachments policy
    • Create a transport rule to bypass a Safe Attachments policy
    • Examine the end-user experience with Safe Attachments
    • Knowledge check
    • Summary
  • Module 4: Manage Safe Links
    • Introduction
    • Create Safe Links policies using Microsoft 365 Defender
    • Create Safe Links policies using PowerShell
    • Modify an existing Safe Links policy
    • Create a transport rule to bypass a Safe Links policy
    • Examine the end-user experience with Safe Links
    • Knowledge check
    • Summary
  • Module 5: Explore reporting in the Microsoft 365 security services
    • Introduction
    • Examine the Threat Protection Status report
    • Examine the Defender for Office 365 Message Disposition report
    • Examine the File Type and Disposition report
    • Examine the Malware Detections report
    • Examine the Top Malware report
    • Examine the Top Senders and Recipients report
    • Examine the Spoof Mail report
    • Examine the Spam Detections report
    • Examine the Sent and Received Email report
    • Knowledge check
    • Summary

Reviews

Start your review of MS-101 Manage your security services in Microsoft Defender XDR

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.