Implementing and Managing Microsoft Defender for O365
This course will teach you how to implement and manage Microsoft Defender for Office 365.
What you'll learn
Collaboration software such as email, Teams, SharePoint platforms and more, are used widely today. In recent years, the use of these platforms have increased exponentially and with that comes a wealth of cybersecurity attacks. Protecting against these attacks entails using a solution which can easily and efficiently identify risks and threats and allow you to mitigate them. In this course, Implementing and Managing Microsoft Defender for O365, you’ll learn how to fully plan, deploy, and manage Defender for O365. First, you’ll explore the deployment of Defender for O365. Next, you’ll discover how to manage Defender for O365. Finally, you’ll gain an overview of the alerts and how to work with various threat components of Defender for O365. When you’re finished with this course, you’ll have the skills and knowledge of implementing and managing Microsoft Defender for O365 needed to fully deploy and manage Microsoft Defender for O365.
Table of contents
- Module Introduction 1m
- Getting Started 3m
- Threat Policies Overview 3m
- Working with Preset Security Policies 6m
- Creating a Custom Quarantine and Safe Attachment Policy 9m
- Configuring a Custom Safe Links Policy 6m
- Configuring a Custom Anti-malware Policy 4m
- Configuring a Custom Anti-phishing Policy 9m
- Creating a Custom Anti-spam Inbound Policy 6m
- Creating a Custom Anti-spam Outbound Policy 3m
- Tracking Changes with Configuration Analyzer 4m
- Creating Custom Alert Policies 4m
- Additional Defender for Office 365 Settings 5m
- Zero-hour Auto Purge Overview 2m
- Module Summary 2m