Use ORCA to Check Office 365 Advanced Threat Protection Settings

MVP

 

ORCA is a project to help Office 365 tenant administrators validate their anti-spam and anti-malware settings against recommendations from Microsoft. ORCA is installed as a PowerShell module with just one cmdlet. After running Get-ORCAReport, you’ll have a report containing recommendations and observations about your configuration.

 

https://office365itpros.com/2019/11/14/orca-checks-office365-atp-settings/

5 Replies
I was surprised to see version 2.0 out. I didn't think development was continuing but I was wrong. The 2.0 version has a nicer look but not much else new. We went from 14 recommendations to 15; 45 ok to 47 ok.
Do I understand correctly that this has now become a dashboard at https://security.microsoft.com/configurationAnalyzer?viewid=Setting, no longer requiring the PowerShell?

@Tony Derricott 

No. Although there's some overlap MS recommends you use both the configuration analyzer and the ORCA report. Configuration Analyzer is very easy to follow and its continually improving while the ORCA report is well known and very useful. Watch the video from our friend Siegfried in the MS Exchange YT channel: (158) Messaging Security: Deep Dive into Exchange Online Protection, Microsoft Defender for Office -... Its an older video but very informative. 

Can I automate this orca script on Power automate or Azure automation?
I don't see any reason why it wouldn't run on Azure Automation, but it's a while since I looked at the script. How would you deal with the output? You'd have to post it to a document, to a Teams channel, or in an email to get the information.