Catching What Passed the Initial Controls
By now, we should have a good security foundation in the areas of spam and phishing protection, and while that lays a significant starting point, there are many other factors at play that we must look at, such as malware and what happens when our environment is the target. As with any security strategy, it is all about identifying gaps and implementing further layers that do not disrupt business. We will look at gaining an understanding of how mail travels through our organization and we will see what actions we can take to further fortify our defenses. We will also look at the controls Defender for Office 365 offers for things beyond emails, such as documents.
This chapter will cover the following topics:
- How to configure and use mail flow rules and trace messages
- How to prevent malware propagation via anti-malware and Safe Links policies and zero-hour purge
- What order do policies from different categories follow when being...