microsoft 365 defender
558 TopicsThe Microsoft Cloud App Security (MCAS) Ninja Training (March 2021 Update)
We’ve updated the MCAS Ninja Training since this post was published. For the latest version of the training, visit Microsoft Cloud App Security (MCAS) Ninja Training | September 2021 - Microsoft Tech Community.224KViews24likes25Commentsemail quarantine and reason "high confidence phish"
Hi I started testing a phishing email campaign from an external vendor KnowBe4. The emails keep going to quarantine reason "high confidence phish" What is the best way to fix this? I tried excluded the URL from Safe Links and added their sender IPs to O365 Tenant allow/block list. Thank you in advanced.Updating best practices for Domain Controllers
Customers are on a journey and hybrid identity environments will be an important state for many customers for a long time. Domain Controllers still act as a pivotal piece of infrastructure for many organizations, and the identities that Active Directory holds are often the target for attackers.Practical guide to security using Microsoft 365 Business
This guide summarizes Microsoft’s recommendations for enabling employees at small and medium-sized businesses to securely work from anywhere- whether from home, in the office or on the go, using the features included in Microsoft 365 Business Premium. Microsoft 365 Business Premium is a comprehensive suite of collaboration products and enterprise-grade security tools curated specifically for businesses with 1 to 300 employees. It includes Office productivity apps and services plus advanced security capabilities to help defend businesses against cyberthreats, protect company data, and secure devices. Although other licensing plans include some of these advanced security and management capabilities, for organizations with less than 300 employees, Microsoft 365 Business Premium is generally the most cost-effective package. Because SMBs have different security needs and attitudes, the checklist includes general recommendations scenarios; however, you should evaluate each recommendation and adjust based on your customers’ unique circumstances and requirements. Many businesses will want to enable security and balance ease of use with security. Other businesses may want to maximize security protections and have higher concern for risk (for example, to adhere to regulatory requirements such as HIPAA or GLBA). This business is also willing to apply more effort and resources into maintaining security and control of the work environment. These guidelines are intended to provide a starting point for a serious discussion around the security and compliance options available, rather than prescriptive guidance. One of the first and most important things that IT leaders and business leaders can do is talk through the possibilities.55KViews2likes0CommentsOnenote Files used in Malware attacks
Hi Folks, Any comments or recommendations regarding the increase of attacks via onenote files as noted in the below articles? I'm seeing a increased number of recommendations for blocking .one and .onepkg mail attachments. One issue is onepkg files currently cannot be added to the malware filter. https://www.securityweek.com/microsoft-onenote-abuse-for-malware-delivery-surges/ https://labs.withsecure.com/publications/detecting-onenote-abuse B JoshuaSolved50KViews0likes2CommentsIntroducing credit monitoring and privacy protection for Microsoft Defender
Today, we are excited to announce two new features coming soon to Microsoft Defender for individuals, in the United States: credit monitoring and privacy protection. Credit monitoring and privacy protection will help keep our users safe in today's ever evolving threat landscape that sees attackers target people's identity and data over more traditional attacks that focus on their devices.