User Profile
Vaman-Kini
Brass Contributor
Joined Mar 04, 2019
User Widgets
Recent Discussions
Re: How to Enable the First Contact Safety Tip for Exchange Online Protection
TonyRedmond I ran into a quite odd situation where the feature works on a test Tenant/domain but not in the production. The headers show that the rule hit for both domains which should mean that the transport rule works. The mail flow is same for both tenants. Any tips on troubleshooting that you could share ?45KViews1like3CommentsRe: Block Display Name Spoof in EAC
dgillespie-adf I have had success with the Impersonation policy under phishing wherein we tested with <Myname> mailto:myname@domain.com added to the list of users to protect and send an email from <Myname> xyz@somedomain.com . The policy detected it to be impersonation. I wanted to test this safely with the Senior management email address and trying figure out a safe way to do that. documentation is https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide42KViews0likes1CommentRe: Roles for Office 365 P2
VasilMichev Thank you for the great input. I would need still some documentation to figure out which roles to include. The documentation that i quoted in my post, does not have that information. The other alternative would be to figure this out by trial and error. In short , I am looking for " what roles should we assign to be able to access explorer, submissions, investigations threat tracker and campaign in the Threat management menu"953Views0likes0CommentsRoles for Office 365 P2
I would like to know if there is some better way of using the Office ATP features like Threat Trackers, Threat Explorer ,Automated investigation and response, Campaigns , etc without giving out Security admin /operator roles groups as outlined in the https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp?view=o365-worldwide ? Are they any specific roles like "Quarantine" that are available ? That would help practice the least privilege model instead of such broad access.1KViews0likes2Comments
Recent Blog Articles
No content to show