YoVDO

MS-101 Manage your security services in Microsoft Defender XDR

Offered By: Microsoft via Microsoft Learn

Tags

Windows Systems Administration Courses Microsoft Office 365 Courses Spam Detection Courses

Course Description

Overview

  • Module 1: Examine Exchange Online Protection
  • By the end of this module, you'll be able to:

    • Describe how Exchange Online Protection (EOP) analyzes email to provide anti-malware pipeline protection
    • List several mechanisms used by EOP to filter spam and malware
    • Describe other solutions administrators may implement to provide extra protection against phishing and spoofing
    • Describe the benefits of the Spoof Intelligence feature in the Security & Compliance Center
  • Module 2: Examine Microsoft Defender for Office 365
  • By the end of this module, you will be able to:

    • Describe how the Safe Attachments feature in Microsoft Defender for Office 365 blocks zero-day malware in email attachments and documents.
    • Describe how the Safe Links feature in Microsoft Defender for Office 365 protects users from malicious URLs embedded in email and documents that point to malicious websites.
  • Module 3: Manage Safe Attachments
  • By the end of this module, you will be able to:

    • Create and modify a Safe Attachments policy using Microsoft 365 Defender
    • Create a Safe Attachments policy by using PowerShell
    • Configure a Safe Attachments policy
    • Describe how a transport rule can disable a Safe Attachments policy
    • Describe the end-user experience when an email attachment is scanned and found to be malicious
  • Module 4: Manage Safe Links
  • By the end of this module, you will be able to:

    • Create and modify a Safe Links policy using Microsoft 365 Defender
    • Create a Safe Links policy using PowerShell
    • Configure a Safe Links policy
    • Describe how a transport rule can disable a Safe Links policy
    • Describe the end-user experience when Safe Links identifies a link to a malicious website embedded in email, and a link to a malicious file hosted on a website
  • Module 5: Explore reporting in the Microsoft 365 security services
  • By the end of this module, you will be able to:

    • List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector
    • Identify where to access reports generated by EOP and Microsoft Defender for Office 365
    • Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365

Syllabus

  • Module 1: Examine Exchange Online Protection
    • Introduction
    • Examine the anti-malware pipeline in Microsoft 365
    • Detect messages with spam or malware using Zero-hour auto purge
    • Explore the phishing and spoofing protection provided by EOP
    • Explore the spoofing protection provided by EOP
    • Manage spoof intelligence in the Microsoft 365 Security Compliance Center
    • Knowledge check
    • Summary
  • Module 2: Examine Microsoft Defender for Office 365
    • Introduction
    • Expand EOP protections by using Safe Attachments and Safe Links
    • Protect users from malicious attachments by using Safe Attachments
    • Configure Safe Attachment policy options
    • Protect users from malicious URLs by using Safe Links
    • Configure Safe Links policy options
    • Knowledge check
    • Summary
  • Module 3: Manage Safe Attachments
    • Introduction
    • Create Safe Attachment policies using Microsoft 365 Defender
    • Create Safe Attachments policies using PowerShell
    • Modify an existing Safe Attachments policy
    • Create a transport rule to bypass a Safe Attachments policy
    • Examine the end-user experience with Safe Attachments
    • Knowledge check
    • Summary
  • Module 4: Manage Safe Links
    • Introduction
    • Create Safe Links policies using Microsoft 365 Defender
    • Create Safe Links policies using PowerShell
    • Modify an existing Safe Links policy
    • Create a transport rule to bypass a Safe Links policy
    • Examine the end-user experience with Safe Links
    • Knowledge check
    • Summary
  • Module 5: Explore reporting in the Microsoft 365 security services
    • Introduction
    • Examine the Threat Protection Status report
    • Examine the Defender for Office 365 Message Disposition report
    • Examine the File Type and Disposition report
    • Examine the Malware Detections report
    • Examine the Top Malware report
    • Examine the Top Senders and Recipients report
    • Examine the Spoof Mail report
    • Examine the Spam Detections report
    • Examine the Sent and Received Email report
    • Knowledge check
    • Summary

Tags

Related Courses

Deploy Machine Learning Model into AWS Cloud Servers
Coursera Project Network via Coursera
Google Analytics: Spam Proofing
LinkedIn Learning
Data Science: Natural Language Processing (NLP) in Python
Udemy