Part 2 - Day-to-Day Operations
In this part, you will learn about the activities performed by a security team once Defender for Office 365 is in place. We will begin by exploring troubleshooting approaches and options for complex issues. Next, we will customize our message quarantine process to minimize user impact and enable users to assist with security efforts. We will then focus on enhancing protection against phishing and spam messages through robust filters and email authentication. To understand how our controls affect users, we will examine the flow of messages through our system and learn how to proactively detect misconfiguration. We will discuss customizing protections against malicious files and links to enhance the user experience. Finally, we will touch on threat hunting, security operations, and alert management, including implementing automation to reduce alert fatigue, detect advanced adversaries, and enhance our security maturity.
This part contains the following...