Skip to content

Commit 2aa4285

Browse files
authored
Update anti-phishing-policies-about.md
1 parent 30d6037 commit 2aa4285

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

defender-office-365/anti-phishing-policies-about.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn about the anti-phishing policies that are available in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 4/8/2024
20+
ms.date: 5/10/2024
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -30,15 +30,16 @@ appliesto:
3030

3131
Policies to configure anti-phishing protection settings are available in Microsoft 365 organizations with Exchange Online mailboxes, standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, and Microsoft Defender for Office 365 organizations.
3232

33+
> [!TIP]
34+
> Strengthen your organization's security posture with our comprehensive [Security Analyzer setup guide](https://go.microsoft.com/fwlink/p/?linkid=2268615). Use the guide to scrutinize networks, endpoints, and servers, identifying vulnerabilities and potential breaches. With intuitive insights and step-by-step instructions, learn how to fortify defenses, improve compliance, and navigate the cybersecurity landscape with confidence. Sign in credentials are required. Microsoft 365 advanced deployment guides are available for unauthenticated users on [setup.cloud.microsoft](https://go.microsoft.com/fwlink/p/?linkid=2268522). Anyone, from potential Microsoft clients to partners and IT admins, can access the guides and use them freely (credentials aren't required).
35+
3336
Examples of Microsoft Defender for Office 365 organizations include:
3437

3538
- Microsoft 365 Enterprise E5, Microsoft 365 Education A5, etc.
3639
- [Microsoft 365 Enterprise](https://www.microsoft.com/microsoft-365/enterprise/home)
3740
- [Microsoft 365 Business](https://www.microsoft.com/microsoft-365/business)
3841
- [Microsoft Defender for Office 365 as an add-on](https://products.office.com/exchange/advance-threat-protection)
3942

40-
> [!TIP]
41-
> Strengthen your organization's security posture with our comprehensive [Security Analyzer setup guide](https://go.microsoft.com/fwlink/?linkid=2268615). Use the guide to scrutinize networks, endpoints, and servers, identifying vulnerabilities and potential breaches. With intuitive insights and step-by-step instructions, learn how to fortify defenses, improve compliance, and navigate the cybersecurity landscape with confidence. Login credentials are required. Microsoft 365 advanced deployment guides are available for unauthenticated users on [setup.cloud.microsoft](https://go.microsoft.com/fwlink/?linkid=2268522). Anyone, from potential Microsoft clients to partners and IT admins, may access the guides and use them freely (Login credentials are not required). 
4243
The high-level differences between anti-phishing policies in EOP and anti-phishing policies in Defender for Office 365 are described in the following table:
4344

4445
|Feature|Anti-phishing policies<br>in EOP|Anti-phishing policies<br>in Defender for Office 365|

0 commit comments

Comments
 (0)