You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-threat-protection-with-microsoft-365-defender/includes/3-describe-defender-office.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,12 +12,15 @@ These capabilities can be categorized into the following security emphases:
12
12
13
13
Some of the features of Microsoft Defender for Office 365 that help organizations prevent and detect email and collaboration based threats include:
14
14
15
-
- Policies for anti-malware, anti-spam, and anti-phishing
15
+
- Anti-malware protection that protects against major categories of malware, including viruses, spyware, and ransomware.
16
+
- Anti-spam protection that uses content filtering technologies to identify and separate junk email from legitimate email.
17
+
- Anti-phishing (spoofing) protection to protect against phishing (spoofed) email attacks that try to steal sensitive information in messages that appear to be from legitimate or trusted senders.
16
18
- Outbound spam filtering
17
19
- Connection filtering to help identify good or bad source email servers by IP addresses.
18
20
- Quarantine policies to define the user experience for quarantined messages
19
-
- Submit messages, URLs, and attachments to Microsoft for analysis.
20
-
- Safe attachments that provide an additional layer of protection against malware. After files are scanned by the common virus detection engine in Microsoft 365, Safe Attachments opens files in a virtual environment to see what happens (a process known as detonation).
21
+
- The Submissions page in the Microsoft Defender portal to submit messages, URLs, and attachments to Microsoft for analysis.
22
+
- Safe attachments that provide an additional layer of protection against malware. After files are scanned by the common virus detection engine in Microsoft 365, Safe Attachments opens files in a virtual environment to see what happens (a process known as detonation).
23
+
- Safe Links scanning that protects your organization from malicious links that are used in phishing and other attacks.
21
24
- Email and collaboration alerts
22
25
- Attack simulation training, which allows admins to run realistic attack scenarios in your organization. These simulated attacks help identify and train vulnerable users before a real attack impacts your bottom line.
23
26
- Security information and event management (SIEM) integration for alerts.
0 commit comments