This course shows how to set up Microsoft Defender for Microsoft 365 through a series of practical demonstrations from the Microsoft 365 platform. You will learn about some general cybersecurity practices before being shown how Microsoft Defender can help you implement them.
- Understand how to protect against phishing, malware, and spam using Microsoft Defender
- Learn about safe links and safe attachments and configure them
- Learn how to enable zero-day malware protection
This course is intended for those who wish to learn how to configure protection in Microsoft Defender for Office 365.
To get the most out of this course, you should have a basic understanding of Microsoft 365.
Congratulations. You've come to the end of configuring Microsoft Defender for Office 365. Let's review what you've learned.
We started off with an intro to anti-phishing, anti-malware, and anti-spam options. I then showed you how to configure policies to protect against all three of these threats. You then learned about Safe Links and Safe Attachments before seeing how to configure them. You also got to see a demo that shows you how to enable zero-day malware protection in Microsoft Defender. At this point, you should have a good understanding of how to configure key protection policies in Microsoft Defender for Office 365.
To learn more about Microsoft Defender for Office 365, you can, and should, read Microsoft's published documentation. You should also keep an eye out for new courses on Cloud Academy because we're always publishing new ones. Be sure to give this course a rating, and if you have any questions or comments, please let us know. As always, thanks for watching and happy learning.
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.