|
6 | 6 | items:
|
7 | 7 | - name: Microsoft Defender for Office 365 overview
|
8 | 8 | href: mdo-about.md
|
9 |
| - - name: Exchange Online Protection overview |
| 9 | + - name: Overview of default email protections for cloud mailboxes |
10 | 10 | href: eop-about.md
|
11 | 11 | - name: What's new in Defender for Office 365
|
12 | 12 | href: defender-for-office-365-whats-new.md
|
|
23 | 23 | href: secure-by-default.md
|
24 | 24 | - name: Zero Trust for Defender for Office 365
|
25 | 25 | href: zero-trust-with-microsoft-365-defender-office-365.md
|
26 |
| - - name: Mail flow in EOP |
| 26 | + - name: Mail flow in cloud organizations |
27 | 27 | href: mail-flow-about.md
|
28 | 28 | - name: Defender for Office 365 in Microsoft Teams
|
29 | 29 | href: mdo-support-teams-about.md
|
|
57 | 57 | href: email-authentication-dmarc-configure.md
|
58 | 58 | - name: Configure trusted ARC sealers
|
59 | 59 | href: email-authentication-arc-configure.md
|
60 |
| - - name: Step 2 - Configure protection policies |
| 60 | + - name: Step 2 - Configure threat policies |
61 | 61 | items:
|
62 | 62 | - name: Preset security policies
|
63 | 63 | href: preset-security-policies.md
|
64 |
| - - name: Recommended settings for configuring EOP and Defender for Office 365 Security |
| 64 | + - name: Recommended email and collaboration threat policy settings for cloud organizations |
65 | 65 | href: recommended-settings-for-eop-and-office365.md
|
66 | 66 | - name: Step 3 - Assign permissions
|
67 | 67 | items:
|
|
127 | 127 | href: priority-accounts-security-recommendations.md
|
128 | 128 | - name: Usage card in Defender for Office 365
|
129 | 129 | href: mdo-usage-card-about.md
|
130 |
| - - name: Protection policies |
| 130 | + - name: Threat policies |
131 | 131 | items:
|
132 | 132 | - name: Preset security policies
|
133 | 133 | href: preset-security-policies.md
|
134 |
| - - name: Recommended settings for configuring EOP and Defender for Office 365 Security |
| 134 | + - name: Recommended email and collaboration threat policy settings for cloud organizations |
135 | 135 | href: recommended-settings-for-eop-and-office365.md
|
136 |
| - - name: Configuration analyzer for protection policies |
| 136 | + - name: Configuration analyzer for threat policies |
137 | 137 | href: configuration-analyzer-for-security-policies.md
|
138 |
| - - name: Anti-malware in EOP |
| 138 | + - name: Anti-malware in cloud organizations |
139 | 139 | items:
|
140 | 140 | - name: Anti-malware protection
|
141 | 141 | href: anti-malware-protection-about.md
|
|
147 | 147 | href: zero-hour-auto-purge.md
|
148 | 148 | - name: Virus detection in SharePoint
|
149 | 149 | href: anti-malware-protection-for-spo-odfb-teams-about.md
|
150 |
| - - name: Anti-spam in EOP |
| 150 | + - name: Anti-spam in cloud organizations |
151 | 151 | items:
|
152 | 152 | - name: Anti-spam protection
|
153 | 153 | href: anti-spam-protection-about.md
|
|
163 | 163 | href: anti-spam-bulk-complaint-level-bcl-about.md
|
164 | 164 | - name: Bulk senders insight
|
165 | 165 | href: anti-spam-bulk-senders-insight.md
|
166 |
| - - name: Backscatter in EOP |
| 166 | + - name: Backscatter messages cloud organizations |
167 | 167 | href: anti-spam-backscatter-about.md
|
168 | 168 | - name: Configure junk email settings on Exchange Online mailboxes
|
169 | 169 | href: configure-junk-email-settings-on-exo-mailboxes.md
|
170 | 170 | - name: Anti-spam protection FAQ
|
171 | 171 | href: anti-spam-protection-faq.yml
|
172 | 172 | - name: Zero-hour auto purge (ZAP)
|
173 | 173 | href: zero-hour-auto-purge.md
|
174 |
| - - name: Configure EOP to deliver spam to Junk Email folders in on-premises Exchange |
| 174 | + - name: Deliver cloud-detected spam to the Junk Email folder in on-premises mailboxes |
175 | 175 | href: /exchange/standalone-eop/configure-eop-spam-protection-hybrid
|
176 |
| - - name: Anti-phishing in EOP and Defender for Office 365 |
| 176 | + - name: Anti-phishing for all cloud mailboxes and Defender for Office 365 |
177 | 177 | items:
|
178 | 178 | - name: Anti-phishing protection
|
179 | 179 | href: anti-phishing-protection-about.md
|
180 | 180 | - name: Anti-phishing policies
|
181 | 181 | href: anti-phishing-policies-about.md
|
182 |
| - - name: Configure anti-phishing policies in EOP |
| 182 | + - name: Configure anti-phishing policies for all cloud mailboxes |
183 | 183 | href: anti-phishing-policies-eop-configure.md
|
184 | 184 | - name: Configure anti-phishing policies in Defender for Office 365
|
185 | 185 | href: anti-phishing-policies-mdo-configure.md
|
186 | 186 | - name: Anti-spoofing protection
|
187 | 187 | href: anti-phishing-protection-spoofing-about.md
|
188 | 188 | - name: Anti-spoofing protection FAQ
|
189 | 189 | href: anti-phishing-protection-spoofing-faq.yml
|
190 |
| - - name: How EOP validates the From address |
| 190 | + - name: How Microsoft 365 validates the From address |
191 | 191 | href: anti-phishing-from-email-address-validation.md
|
192 | 192 | - name: Tune anti-phishing protection
|
193 | 193 | href: anti-phishing-protection-tuning.md
|
|
211 | 211 | href: safe-links-about.md
|
212 | 212 | - name: Set up Safe Links policies in Defender for Office 365
|
213 | 213 | href: safe-links-policies-configure.md
|
214 |
| - - name: Outbound spam protection in EOP |
| 214 | + - name: Outbound spam protection in cloud organizations |
215 | 215 | items:
|
216 | 216 | - name: Outbound spam protection
|
217 | 217 | href: outbound-spam-protection-about.md
|
|
223 | 223 | href: outbound-spam-high-risk-delivery-pool-about.md
|
224 | 224 | - name: Restore restricted users
|
225 | 225 | href: outbound-spam-restore-restricted-users.md
|
226 |
| - - name: Connection filtering in EOP |
| 226 | + - name: Connection filtering in cloud organizations |
227 | 227 | items:
|
228 | 228 | - name: Configure the connection filtering policy
|
229 | 229 | href: connection-filter-policies-configure.md
|
|
473 | 473 | href: air-auto-remediation.md
|
474 | 474 | - name: Detect and address compromised user accounts in AIR
|
475 | 475 | href: address-compromised-users-quickly.md
|
476 |
| - - name: Integrate AIR with a custom solution or third-party solution |
| 476 | + - name: Integrate AIR with a custom solution or non-Microsoft solution |
477 | 477 | href: air-custom-reporting.md
|
478 | 478 | - name: Email analysis in investigations
|
479 | 479 | href: email-analysis-investigations.md
|
|
558 | 558 | href: step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
|
559 | 559 | - name: How to setup automated attacks and training within Attack simulation training
|
560 | 560 | href: step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
|
561 |
| - - name: Optimize and correct security policies with configuration analyzer |
| 561 | + - name: Optimize and correct threat policies with configuration analyzer |
562 | 562 | href: step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
|
563 | 563 | - name: Protect your c-suite with priority account protection
|
564 | 564 | href: step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md
|
|
0 commit comments