The course is part of these learning paths
See 3 moreThis course shows how to set up Micorosft Defender for Microsoft 365 through a series of practical demonstrations from the Microsoft 365 platform. You will learn about some general cybersecurity practices before being shown how Microsoft Defender can help you implement them.
Learning Objectives
- Understand how to protect against phishing, malware, and spam using Microsoft Defender
- Learn about safe links and safe attachments and configure them
- Learn how to enable zero-day malware protection
Intended Audience
This course is intended for those who wish to learn how to configure protection in Microsoft Defender for Office 365.
Prerequisites
To get the most out of this course, you should have a basic understanding of Microsoft 365.
Hello, and welcome to Configuring Microsoft Defender for Office 365. My name is Thomas Mitchell. I'll be taking you through this course. I'm a Microsoft 365 instructor at Cloud Academy, and I have over 25 years of IT experience, several of those with cloud technologies. If you have any questions about this course, connect with me on LinkedIn or send an email to support@cloudacademy.com.
This course is intended for those who wish to learn how to configure protection in Microsoft Defender for Office 365. This is a quick but demo-heavy course. While there will be some lecture time to provide some basic intros and explanations. My goal in this course is to let you watch over my shoulder as I create several protection policies in Microsoft Defender for Office 365. We'll start off with an intro to anti-phishing, anti-malware, and anti-spam options. I'll then show you how to configure policies to protect against all three threats.
After learning how to configure these anti-phishing, anti-malware, and anti-spam policies, you'll learn about Safe Links and Safe Attachments before seeing how to configure them. You'll also get to see a demo that shows you how to enable zero-day malware protection in Microsoft Defender. By the time you finish this course, you should have a good understanding of how to configure various protection options in Microsoft Defender for Office 365.
We'd love to get your feedback on this course, so please give it a rating when you're finished. If you're ready to leave and about configuring protection in Microsoft Defender for Office 365, let's get started.
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.