Summary
In this chapter, we examined how Microsoft Defender for Office 365 can be used to protect your organization’s users, groups, and domains from malicious content. We then learned how anti-phishing policies can be created to protect your users from spoofing. We also created Safe Attachments and Safe Links policies to protect users, groups, and domains by using the Microsoft 365 Defender portal and also by using Exchange Online PowerShell. Additionally, we learned about the reporting options within Microsoft Defender for Office 365 and how to configure and execute attack simulation training for users to improve their awareness of threats and vulnerabilities within emails and attachments.
In the next chapter, we will examine the principles of Microsoft Sentinel and learn how to plan and implement Microsoft Sentinel in your organization to monitor Microsoft 365 security. We will also learn how to configure playbooks and manage and monitor them using Microsoft Sentinel and...