MS-101 Manage your security services in Microsoft Defender XDR
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Examine Exchange Online Protection
- Describe how Exchange Online Protection (EOP) analyzes email to provide anti-malware pipeline protection
- List several mechanisms used by EOP to filter spam and malware
- Describe other solutions administrators may implement to provide extra protection against phishing and spoofing
- Describe the benefits of the Spoof Intelligence feature in the Security & Compliance Center
- Module 2: Examine Microsoft Defender for Office 365
- Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
- Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
- Module 3: Manage Safe Attachments
- Create and modify a Safe Attachments policy using Microsoft 365 Defender
- Create a Safe Attachments policy by using PowerShell
- Configure a Safe Attachments policy
- Describe how a transport rule can disable a Safe Attachments policy
- Describe the end-user experience when an email attachment is scanned and found to be malicious
- Module 4: Manage Safe Links
- Create and modify a Safe Links policy using Microsoft 365 Defender
- Create a Safe Links policy using PowerShell
- Configure a Safe Links policy
- Describe how a transport rule can disable a Safe Links policy
- Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
- Module 5: Explore reporting in the Microsoft 365 security services
- List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector
- Identify where to access reports generated by EOP and Microsoft Defender for Office 365
- Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365
By the end of this module, you'll be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
By the end of this module, you will be able to:
Syllabus
- Module 1: Examine Exchange Online Protection
- Introduction
- Examine the anti-malware pipeline in Microsoft 365
- Detect messages with spam or malware using Zero-hour auto purge
- Explore the phishing and spoofing protection provided by EOP
- Explore the spoofing protection provided by EOP
- Manage spoof intelligence in the Microsoft 365 Security Compliance Center
- Knowledge check
- Summary
- Module 2: Examine Microsoft Defender for Office 365
- Introduction
- Expand EOP protections by using Safe Attachments and Safe Links
- Protect users from malicious attachments by using Safe Attachments
- Configure Safe Attachment policy options
- Protect users from malicious URLs by using Safe Links
- Configure Safe Links policy options
- Knowledge check
- Summary
- Module 3: Manage Safe Attachments
- Introduction
- Create Safe Attachment policies using Microsoft 365 Defender
- Create Safe Attachments policies using PowerShell
- Modify an existing Safe Attachments policy
- Create a transport rule to bypass a Safe Attachments policy
- Examine the end-user experience with Safe Attachments
- Knowledge check
- Summary
- Module 4: Manage Safe Links
- Introduction
- Create Safe Links policies using Microsoft 365 Defender
- Create Safe Links policies using PowerShell
- Modify an existing Safe Links policy
- Create a transport rule to bypass a Safe Links policy
- Examine the end-user experience with Safe Links
- Knowledge check
- Summary
- Module 5: Explore reporting in the Microsoft 365 security services
- Introduction
- Examine the Threat Protection Status report
- Examine the Defender for Office 365 Message Disposition report
- Examine the File Type and Disposition report
- Examine the Malware Detections report
- Examine the Top Malware report
- Examine the Top Senders and Recipients report
- Examine the Spoof Mail report
- Examine the Spam Detections report
- Examine the Sent and Received Email report
- Knowledge check
- Summary
Tags
Related Courses
Deploy Machine Learning Model into AWS Cloud ServersCoursera Project Network via Coursera Google Analytics: Spam Proofing
LinkedIn Learning Data Science: Natural Language Processing (NLP) in Python
Udemy