How to Set Up Defender for Office 365: A Complete Guide

Jonathan Edwards
9 Aug 202428:18

Summary

TLDRIn this updated tutorial, Jonathan Edwards, the B365 guy, guides viewers through configuring Microsoft Defender for Office 365 Plan 1 for 2024. The video covers the essentials of setting up security policies for email protection, including anti-phishing, anti-spam, and anti-malware measures. Edwards explains both the easy method using preset security policies and the more advanced custom policy configuration, ensuring businesses can tailor their email security to meet specific needs. The tutorial aims to help businesses enhance their email security without being overly technical.

Takeaways

  • 😀 Jonathan Edwards, known as the B365 guy, provides an updated guide on configuring Defender for Office 365 Plan 1 for 2024.
  • đŸ›Ąïž Every Microsoft 365 mailbox comes with a basic level of protection called Exchange Online Protection, which includes anti-phishing, anti-spam, and anti-malware features.
  • 🔒 Defender for Office 365 offers advanced email protection and is available in two plans, with most customers opting for Plan 1 due to its inclusion in Microsoft 365 Business Premium.
  • 💡 Defender for Office 365 Plan 1 can be purchased as a standalone product for ÂŁ164 per mailbox per month, but requires proper configuration to be effective.
  • 📋 The script outlines two methods for configuring Defender for Office 365: an easy way using preset security policies and a more customized approach.
  • 🔄 Preset security policies in Defender for Office 365 include built-in, standard, and strict protection levels, each with varying degrees of aggressiveness.
  • đŸ‘„ Configuration allows for different levels of protection to be applied to various groups or individuals within a business, such as stricter settings for executive team members.
  • 🔄 The process of setting up standard protection involves choosing who the protection applies to, configuring Defender for Office 365 features, and setting up impersonation protection.
  • 📝 Detailed settings for each policy, such as anti-malware and anti-spam, are discussed, including options for handling emails that meet certain criteria.
  • đŸ› ïž The script provides a step-by-step guide on creating custom policies for anti-phishing, anti-spam, anti-malware, and safe attachments, emphasizing the importance of tailoring these to business needs.
  • ♻ The importance of quarantine policies is highlighted, with recommendations for setting up custom quarantine policies and global settings for notifications and user access.

Q & A

  • What is the purpose of the video?

    -The purpose of the video is to provide an updated guide on configuring Defender for Office 365 Plan 1 in 2024, as Microsoft frequently updates and adds new features.

  • Who is the presenter of the video?

    -The presenter of the video is Jonathan Edwards, also known as the B365 guy, who specializes in Microsoft 365 for businesses worldwide.

  • What is the basic level of protection included with every mailbox from Microsoft 365?

    -The basic level of protection included with every mailbox from Microsoft 365 is called Exchange Online Protection, which features anti-phishing, anti-spam, and anti-malware.

  • What are the two flavors of Defender for Office 365?

    -The two flavors of Defender for Office 365 are Plan 1 and Plan 2, with most customers using Plan 1 as it comes with Microsoft 365 Business Premium.

  • What is the cost of buying Defender for Office 365 Plan 1 as a single product?

    -The cost of buying Defender for Office 365 Plan 1 as a single product is ÂŁ164 per mailbox per month.

  • What are the two methods to configure Defender for Office 365 mentioned in the video?

    -The two methods to configure Defender for Office 365 mentioned in the video are using preset security policies (the easy way) and creating custom policies (the hard way).

  • What is the difference between the preset security policies and custom policies in Defender for Office 365?

    -Preset security policies are pre-configured by Microsoft and involve accepting their recommendations, while custom policies allow for more control and are tailored to the specific needs of the business.

  • How many levels of built-in protection are mentioned in the video?

    -Three levels of built-in protection are mentioned in the video: basic (built-in), standard, and strict.

  • What is the recommended approach for setting up anti-phishing policies in the video?

    -The recommended approach is to start with a moderate level of protection, monitor it, and adjust as necessary. The video suggests starting with the 'more aggressive' setting and then customizing based on the business's needs.

  • What is the importance of setting up impersonation protection?

    -Impersonation protection is important to safeguard senior figures in a business from cybercriminals who might pretend to be them to perform fraudulent activities, such as sending bogus emails to the finance department to extract money.

  • What is the Zero Hour Auto Purge feature in the context of anti-spam and anti-phishing policies?

    -The Zero Hour Auto Purge feature allows Microsoft to retrospectively remove emails from a user's mailbox that were delivered but later identified as spam or phishing attempts.

  • What is the recommended action for handling emails detected as user impersonation?

    -The recommended action for handling emails detected as user impersonation is to quarantine the message, which can then be reviewed and released by IT or admin personnel if deemed safe.

  • What is the purpose of creating an outbound spam policy?

    -The purpose of creating an outbound spam policy is to restrict the number of messages users can send to prevent a compromised mailbox from being used to send out large volumes of spam emails.

  • What is the default action when an email is detected as malware?

    -The default action when an email is detected as malware can be either to reject the message, which notifies the sender that it conflicts with security policies, or to quarantine the message for review by IT personnel.

  • What is the dynamic delivery option in safe attachments policy?

    -The dynamic delivery option in the safe attachments policy allows the email to be delivered while the attachments are still being scanned for malware. The attachment becomes available once the scan is complete.

  • What is the recommended setting for managing safe links in emails?

    -The recommended setting for managing safe links in emails is to leave all the security features turned on, including those for Office 365 apps, displaying organization branding, and using default or custom notification texts for users.

Outlines

00:00

😀 Introduction to Updating Defender for Office 365

The video script introduces the need to update a previous tutorial on configuring Defender for Office 365 due to changes and additions by Microsoft. The speaker, Jonathan Edwards, also known as the B365 guy, provides a brief introduction about his global business involvement with Microsoft 365. The script explains that while basic protection comes with every mailbox purchase, advanced protection through Defender for Office 365 is recommended, especially since many cyber attacks originate from emails. The video aims to guide viewers on configuring this advanced protection, offering both an easy preset configuration method and a more customized approach.

05:03

🔒 Configuring Basic and Advanced Email Protection Policies

This paragraph details the process of configuring basic and advanced email protection using preset security policies in Microsoft 365. It explains the difference between built-in, standard, and strict protection levels, and how to enable them through the Microsoft 365 admin center. The script also discusses the various settings included in each level, such as anti-malware, anti-spam, and anti-phishing policies, and how they can be customized for different groups within a business, such as applying stricter policies for executive team members.

10:04

🛠 Customizing Email Security Policies for Businesses

The script moves on to describe how to create custom security policies for more control over email security, beyond the preset options. It covers the steps to create new quarantine policies, set up anti-phishing rules, and configure impersonation protection. The paragraph emphasizes the importance of tailoring these policies to the specific needs of a business, including setting different levels of protection for various domains and users, and the option to allow or block certain senders and domains.

15:06

📧 Advanced Configuration of Anti-Fishing and Anti-Spam Policies

This section delves into the advanced configuration of anti-fishing and anti-spam policies, including setting up custom thresholds for what constitutes a phishing attempt and how aggressively these should be handled. The script outlines the process of creating custom policies, such as applying different levels of scrutiny to emails based on the sender's domain and the content of the email. It also discusses actions to take when suspicious emails are detected, such as quarantining or rejecting messages, and the use of AI for improved impersonation protection.

20:06

đŸš« Setting Up Outbound Spam Policies and Restrictions

The paragraph discusses the importance of setting up outbound spam policies to prevent a compromised mailbox from sending out mass emails. It explains how to create an outbound spam policy that restricts the number of messages a user can send before being blocked, and the different actions that can be taken when the message limit is reached. The script also covers the options for notifying IT departments or system controls when suspicious outbound messages are detected.

25:07

✅ Finalizing Anti-Malware and Safe Links Policies

The final paragraph of the script focuses on the last two policies: anti-malware and safe links. It describes how to set up an anti-malware policy to scan and quarantine attachments that may contain malware, and the options for handling such messages, such as notifying administrators or rejecting the messages outright. The paragraph also covers the configuration of safe links policies, which involve scanning links within emails for safety, and the settings for managing these scanned links, including organization branding and user notifications.

Mindmap

Keywords

💡Defender for Office 365

Defender for Office 365 is a security solution offered by Microsoft to protect against email-based cyber threats. It is central to the video's theme, as the script provides a tutorial on configuring this service. The video discusses two plans, with the focus on Plan 1, and how it can be configured for varying levels of protection.

💡Exchange Online Protection

Exchange Online Protection is a basic level of email protection included with every mailbox purchased from Microsoft 365. It features anti-phishing, anti-spam, and anti-malware capabilities. The script mentions it as the starting point of email security, which is built-in and can be enhanced with Defender for Office 365.

💡Preset Security Policies

Preset Security Policies in the script refer to pre-configured security settings provided by Microsoft. The video explains how to apply these settings, which include different levels of protection such as 'standard' and 'strict', to quickly configure Defender for Office 365 without creating custom policies.

💡Threat Policies

Threat Policies are rules within Defender for Office 365 that determine how the system handles potential security threats. The script details how to navigate to these policies in the Microsoft 365 admin center and how to enable or configure them for better email security.

💡Anti-Phishing

Anti-phishing is a security measure designed to detect and block emails that attempt to trick recipients into revealing sensitive information. The video script explains how to configure anti-phishing settings as part of the Defender for Office 365, emphasizing the importance of this feature in protecting against cyber attacks.

💡Impersonation Protection

Impersonation Protection is a feature within Defender for Office 365 that safeguards against emails where a sender pretends to be someone within the organization, often a high-ranking official. The script describes how to set up this protection to prevent potential fraud or unauthorized access.

💡Quarantine

Quarantine in the context of the video refers to the process of isolating suspicious emails to prevent them from reaching or affecting users' inboxes. The script provides a step-by-step guide on configuring quarantine policies and how to manage emails that are detected as threats.

💡Custom Policies

Custom Policies are user-defined rules created for more granular control over email security within Defender for Office 365. The video script offers guidance on creating these policies, which can be tailored to the specific needs and security posture of an organization.

💡Zero Hour Auto Purge

Zero Hour Auto Purge is a feature that allows Microsoft to automatically remove malicious emails that were delivered to a user's mailbox but later identified as a threat. The script highlights this feature as an important aspect of maintaining email security.

💡Safe Attachments and Safe Links

Safe Attachments and Safe Links are advanced security features of Defender for Office 365 that scan email attachments and hyperlinks for malware and other threats. The video script explains how to enable and configure these features to enhance the protection of the organization's email system.

💡Spoof Intelligence

Spoof Intelligence is a capability within Defender for Office 365 that helps detect and handle emails that appear to come from a legitimate source but are actually fraudulent. The script discusses enabling spoof intelligence to improve the detection of such emails.

Highlights

Introduction to the necessity of updating the video on configuring Defender for Office 365 due to Microsoft's frequent updates and feature additions.

Overview of the basic protection provided by Exchange Online Protection, including anti-phishing, anti-spam, and anti-malware.

Emphasis on the importance of advanced email protection against cyber attacks, with Defender for Office 365 being Microsoft's top offering.

Explanation of the two versions of Defender for Office 365: Plan 1 and Plan 2, with most customers opting for Plan 1.

Clarification that Defender for Office 365 requires proper configuration to work effectively for a business.

Introduction of the two methods for configuring Defender for Office 365: the easy way with preset security policies and the hard way with custom configurations.

Demonstration of applying preset security policies using Microsoft's recommendations for quick setup.

Description of the built-in, standard, and strict preset security policies and their respective levels of aggressiveness.

Guidance on how to access and navigate the Microsoft 365 admin center to configure threat policies.

Step-by-step instruction on applying different levels of protection to specific groups or domains within an organization.

Discussion on the settings included in preset policies, such as anti-malware and anti-spam policy settings.

Explanation of how to customize protection levels for impersonation protection to safeguard senior figures in a business.

Tutorial on creating custom policies for more control over email security, beyond the preset options.

Details on configuring quarantine policies, including recipient message access and notification settings.

How to create and apply custom anti-phishing, anti-spam, anti-malware, safe attachments, and safe links policies tailored to business needs.

Importance of monitoring and adjusting custom policies based on their impact and effectiveness.

Final thoughts on the comprehensive configuration process of Defender for Office 365 to ensure robust email security.

Transcripts

play00:00

now a while ago I created a video called

play00:02

configuring Defender for Office 365 plan

play00:05

one but Microsoft have got a bit of a

play00:08

habit of changing things and adding new

play00:11

features so that video is a bit out of

play00:14

date so today's video is configuring

play00:17

Defender for Office 365 plan 1 2024 but

play00:22

before we start just a quick intro my

play00:24

name is Jonathan Edwards also known as

play00:27

the B 365 guy I have businesses all over

play00:31

the world with their Microsoft 365 you

play00:34

can get more information at be 365 guy

play00:38

Toom now with every mailbox that you buy

play00:40

from Microsoft 365 you do get a very

play00:43

basic level of protection this is called

play00:47

exchange online protection and it

play00:49

features things like anti- fishing anti-

play00:52

spam and anti- malware however a lot of

play00:56

cyber attacks originate from email so if

play00:59

there's better protection out there from

play01:01

Microsoft you should be getting it and

play01:04

Defender for Office 365 is the best

play01:07

protection for email that Microsoft

play01:09

offer now Defender for Office 365 does

play01:12

come in two flavors there's plan one and

play01:16

there's plan two most of our customers

play01:18

use plan one because plan one comes with

play01:22

Microsoft 365 business premium if you

play01:25

want you can buy Defender for Office 365

play01:28

plan one as a single single product this

play01:31

costs

play01:32

ÂŁ164 per mailbox per month but the thing

play01:35

is you can't just buy the license and

play01:38

Defender for Office 365 just starts

play01:41

working no no no no no you've got to

play01:44

configure it and you've got to configure

play01:46

it the right way for your business now

play01:49

there are a couple of ways that you can

play01:51

configure it there's an easy way where

play01:53

you just basically go through the

play01:55

settings and accept Microsoft

play01:58

recommendations or if that doesn't suit

play02:00

you there's a hard way and lucky for you

play02:04

I'm going to show you both in today's

play02:06

video let's start with the easy way

play02:09

these are called preset security

play02:11

policies and we're basically just

play02:13

accepting Microsoft's

play02:15

recommendations let me show you how to

play02:17

do that so I'm logged into the Microsoft

play02:20

365 admin Center in my test Tenon what I

play02:23

need to do to start with is go to admin

play02:25

centers and then click on security now

play02:28

once that has launched we can see here

play02:30

this is email and collaboration and this

play02:32

is where Defender for Office 365 lives

play02:35

so I click on that drop drop Arrow there

play02:37

and go to policies and rules and go to

play02:40

threat

play02:41

policies now to begin with we're going

play02:43

to look at the Microsoft preset security

play02:46

policies so I'll look at that and you

play02:48

can see I've got three blocks here I've

play02:51

got some built-in protection now this is

play02:53

as a name suggest it's built in this is

play02:56

a basic level of protection that will

play02:59

come switched on with the on Microsoft

play03:01

365 tency we've also then got standard

play03:04

protection and strict protection now

play03:07

these are usually a bit more aggressive

play03:09

than the built-in protection so you've

play03:11

got more features now you can see that

play03:13

both of these are switched off and you

play03:16

can also see it's fairly easy to switch

play03:18

them on and I'm going to go through

play03:20

those settings in a moment but you might

play03:22

be wondering what's included in the

play03:24

built-in protection what's included in

play03:26

the standard protection when you switch

play03:28

it on and like requires the strip

play03:31

protection so we're going to have a look

play03:32

at this web page here and I will link

play03:35

this below the video here's all the

play03:37

settings that are included in the preset

play03:40

policies I can scroll down and the first

play03:43

section here is the anti malware and you

play03:46

can see we've got all the settings there

play03:49

I'm just going to scroll down to the

play03:50

anti- spam policy settings again if I

play03:53

expand this table you can see along the

play03:56

top we've got the default the standard

play03:58

and the strict so let's have a look at a

play04:00

setting here bulk email threshold okay

play04:05

with the default that is set to seven so

play04:08

that's going to allow more bulk email

play04:11

through with the standard it's set to

play04:13

six it's going to allow less bulk email

play04:17

through and the strict is set to five so

play04:21

a lot more bulk email will get caught in

play04:24

the quarantine so that is one setting

play04:27

we've looked at but there's an awful lot

play04:28

of settings for example if Microsoft

play04:32

thinks that an email is fishing with the

play04:35

standard or with the default that's

play04:37

going to move that email to the junk

play04:39

email folder but with the standard and

play04:41

the strict it's actually going to

play04:43

quarantine that email it's not going to

play04:45

put that anywhere near Microsoft Outlook

play04:47

so you can have a look at all these

play04:49

settings and you can decide which is the

play04:52

right level of protection for you and

play04:54

again these are just standard policies

play04:56

we can't change any of these so if I go

play04:59

back to hear it's worth noting you don't

play05:03

have to choose one level of protection

play05:06

for everyone in your business let me

play05:08

explain we might decide that the people

play05:12

in the executive team or the managing

play05:14

director the chief executive we want to

play05:17

enroll them with strip protection and

play05:20

everyone else in the business we're okay

play05:22

with standard protection we can

play05:24

absolutely do that so let's look at the

play05:27

standard protection here so click on

play05:29

here now the first thing we do is look

play05:31

at exchange online protection so

play05:33

exchange online protection is anti-spam

play05:36

anti-malware and anti- fishing so who do

play05:39

we want to apply this to so at the

play05:42

moment it says nobody or I can choose

play05:45

specific recipients so here I can choose

play05:48

individual users I can look at

play05:50

individual groups so if I've got a group

play05:52

called management or executive I could

play05:55

add that group in here or I can choose

play05:57

different domains so I might have

play05:59

different domains within my tency and I

play06:02

can add different levels of protection

play06:05

per domain but for the purpose of this

play06:07

tutorial let's just go with all

play06:10

recipients I'll click on next and then

play06:12

it's going to ask us about the defender

play06:14

for 365 protection so Defender for

play06:17

Office 365 is the advanced stuff things

play06:20

like safe attachments and safe links

play06:22

you'll see these in more detail later so

play06:25

again I can apply this protection to

play06:27

previously selected recipent I so if I

play06:30

have chosen some groups and some users

play06:32

in the last setting it will be quicker

play06:35

just to carry those settings over I can

play06:37

do specific recipients again different

play06:40

recipients or I can choose all

play06:42

recipients again click on next and then

play06:44

we're going to look at impersonation

play06:46

protection so that is when someone

play06:48

pretends to be someone in your business

play06:51

usually a senior figure so if I'm a

play06:53

cyber criminal I might pretend to be

play06:55

your CEO I might create a bogus email

play06:58

and I might send it to the finance

play07:00

department to try and get money out of

play07:02

you so who do you want to protect when

play07:05

it comes to impersonation now here it's

play07:08

best to to manually add all the users in

play07:11

your business who you want to protect

play07:14

usually it's senior figures so what I

play07:16

would do here I would click in this

play07:18

email choose the user Mickey Mouse and

play07:21

simply click on ADD so Mickey Mouse is

play07:24

protected with impersonation click on

play07:27

next and then we want to look look at

play07:29

the domains as well so we want to add

play07:31

all the domains a that we own and also

play07:35

our key suppliers and partners so if

play07:37

we're dealing with specific customers

play07:39

all of the time let's add the domain in

play07:42

here but I will just add my car domain

play07:45

Okay click on ADD and I'll add that in

play07:47

there click on next now on here we've

play07:50

got the ability to add trusted email

play07:53

addresses and domains so Microsoft do

play07:56

not even flag it as

play07:57

impersonation okay so you can add them

play07:59

in here now a good tip here I've seen it

play08:02

before where a CEO of a business used

play08:05

his personal email address to email his

play08:08

work email address perhaps out of hours

play08:10

or something like that and because he

play08:12

obviously had the same name Microsoft

play08:15

flaged that up as impersonation so he

play08:17

got pretty annoyed that every time he

play08:20

emailed from his private email address

play08:21

into his work email address the email

play08:24

was getting caught in quarantine so what

play08:26

he could have done here is just add his

play08:28

email address in here personal one Okay

play08:31

click on next and then we can turn the

play08:33

policy on when finished or we can leave

play08:36

it turned off click on next and there it

play08:39

is so I would click on confirm got a lot

play08:42

of green ticks click on done you can see

play08:44

that that is switched on so that is as

play08:46

easy as that the same basically applies

play08:49

to strict protection you can go through

play08:52

it's the same settings that you choose

play08:54

but you're just getting a different

play08:56

level of protection okay so I won't go

play08:58

through all of those

play09:00

that is basically how to apply the

play09:03

preset policies now you can see

play09:05

configuring Defender for Office 365

play09:08

using Microsoft's recommendations only

play09:11

takes a few minutes but what if the

play09:13

preset security policies don't suit your

play09:16

business or what if you want more

play09:19

control over your email security well to

play09:22

do that you can't use the preset

play09:24

policies you've got to go in and you've

play09:26

got to create all your own policies do

play09:29

you want me to show you how to do that

play09:31

okay let's go okay so we're back in the

play09:34

threat policies screen now the first

play09:36

thing I like to do before I start

play09:38

configuring these five policies here I

play09:40

go into the quarantine policies and what

play09:43

I do is I create a new quarantine policy

play09:46

for the customer that I'm working with

play09:48

just before I do that you can click into

play09:50

global settings here and there are a few

play09:53

things that you can do so you can set a

play09:55

display name so these are the the emails

play09:58

that people received let them know that

play10:00

some emails have been stuck in

play10:01

quarantine you can choose a subject you

play10:04

can choose the language and you can even

play10:06

upload the company logo I think it's

play10:08

well worth doing because it just makes

play10:10

that email look a little bit more

play10:12

personalized what I also do here so send

play10:15

and user spam notifications it's set at

play10:18

Daily I like to put within 4 hours I

play10:20

think it's important people receive them

play10:23

quickly I will click on save for that

play10:25

okay click on okay just close that out

play10:27

there

play10:29

okay next up we're going to add a custom

play10:32

quarantine policy now just give this

play10:34

policy a name might be something like

play10:36

that you can call it whatever you want

play10:37

but click on

play10:38

next and then we've got the recipient

play10:41

message access so if I just choose on

play10:43

limited access it tells us what that is

play10:46

so what access do we want the recipients

play10:48

of these quarantine emails to be able to

play10:50

do with the quarantine emails so when we

play10:53

look at limited access what they can do

play10:56

is they can preview the message they can

play10:58

request message releases they can delete

play11:01

messages and they can allow certain

play11:03

senders but with limited access

play11:05

recipients can't release messages from

play11:09

quarantine so it has to be done at an IT

play11:12

level or an admin level okay now if I

play11:15

look at the set specific access this is

play11:18

Advanced so the release action

play11:21

preference allow recipients to request a

play11:23

message or allow recipients to release a

play11:26

message I prefer this I like to give

play11:29

more control to the end user I like to

play11:33

educate them on cyber security but then

play11:35

fundamentally give them the control you

play11:37

might agree with that you might disagree

play11:39

with that either is okay and then we can

play11:42

select additional access that recipients

play11:44

can take so they can delete they can

play11:46

preview block senders and allow senders

play11:49

that is how I set it up I click on next

play11:52

we're going to enable this notification

play11:55

okay and this is an option here that we

play11:56

can include or don't include quar 20

play11:59

messages from block sender so I will

play12:01

keep that as don't and click on next

play12:04

I've got that summary and I click on

play12:05

submit okay I got some nice green ticks

play12:08

click on done and you can see that my

play12:10

quarantine policy is now there so I can

play12:13

head back here now to the threat

play12:15

policies and what I've got to do now for

play12:17

the rest of this video we're going to

play12:19

create these different policies so we'll

play12:21

start off with anti- fishing click on

play12:23

there okay we've got these default

play12:26

policies here that we discussed earlier

play12:28

so the default one the built-in is

play12:30

always on the standard one which we

play12:32

switched on is now switched off so I'm

play12:35

going to create my own policy so that

play12:37

stands for company anti fishing policy

play12:40

again you can call it what you want

play12:42

we're going to click on next again we've

play12:44

got this screen here who are we applying

play12:46

this to okay this time we've not got an

play12:49

option to select all users or anything

play12:51

like that so what I do here is just list

play12:54

all the domains in the tency it depends

play12:56

who you're applying it to but if it's

play12:58

just one domain in one tency I can apply

play13:01

to that domain like that okay but list

play13:03

them all in there click on next okay so

play13:07

the fishing threshold and protection

play13:10

we've got to choose what level of

play13:11

protection we want we've got one

play13:13

standard we've got two aggressive we've

play13:16

got more aggressive and we've got most

play13:19

aggressive so with the most aggressive

play13:21

it says here messages that are

play13:22

identified as fishing with a low medium

play13:25

or high degree of confidence so for for

play13:28

example Microsoft might say I think this

play13:30

email is fishing but it might not be

play13:33

I've got low confidence well that will

play13:35

be trapped at most aggressive and you

play13:37

can come down the ladder here it might

play13:39

be helpful to go back to our our page

play13:42

here so this was the the fishing

play13:44

settings here the standard is one or the

play13:47

default sorry is one the standard

play13:50

protection is three and the strict is

play13:52

four so you can choose whatever you want

play13:54

there it's better to go maybe with three

play13:57

a bit of advice here start off with

play13:59

something monitor it you can always come

play14:02

back in and change it later okay so

play14:04

we'll we'll look at more aggressive

play14:06

again you might recognize these this is

play14:08

impersonation protection so we had this

play14:10

when we were setting up the standard

play14:12

protection earlier but of course we're

play14:14

doing everything manually now so what I

play14:16

would do is click on there and we click

play14:18

on manage senders like that and then

play14:20

you'd add your Us in there now you can

play14:22

add up to 30 350 internal and external

play14:26

senders okay so I'll just add Mickey

play14:28

into here click on add user type in an

play14:31

email select Mickey Mouse and click on

play14:33

ADD so you would add all your users into

play14:36

here nice and simple we then would add

play14:40

the domains in again we did that before

play14:42

so include all the domains I own is a

play14:44

good one and that's all the domains in

play14:46

the tency and then you can include any

play14:48

custom domains as well for suppliers

play14:50

Partners or all other domains I'll leave

play14:53

that as it is and then I'll scroll down

play14:56

okay on this bit here we can add trusted

play14:58

senders and and domains again we had

play15:00

that before we've got a couple of other

play15:02

settings here using AI so enable mailbox

play15:06

intelligence and enable intelligence for

play15:08

imperson impersonation protection this

play15:11

is using AI determines user email

play15:13

patterns with their frequent contacts so

play15:16

you might say well this user always

play15:17

speaks to this user so it must be okay

play15:20

and we've also got that I will switch

play15:22

this on as well for intelligence for

play15:24

impersonation protection that is good we

play15:27

will scroll down enable spoof

play15:29

intelligence again we will switch that

play15:31

on click on

play15:33

next and then we've got some various

play15:35

actions here so what do we want how do

play15:37

we want Microsoft to behave when we get

play15:40

these types of emails so firstly if

play15:42

Microsoft receives an email and if the

play15:44

message is detected as user

play15:47

impersonation we've got all these

play15:49

options we can redirect to someone

play15:51

else's email address maybe an IT support

play15:54

mailbox we can move the message into the

play15:56

junk email we can quarantine the message

play16:00

we can deliver the message and add maybe

play16:02

an IT support email in the BCC we can

play16:06

delete it before it's delivered or not

play16:08

do anything and let it be delivered so

play16:10

what I like to do is Select quarantine

play16:13

message and then it's going to say well

play16:15

what policy do you want to use and of

play16:17

course we're going to use the one we

play16:19

created and I basically do this for all

play16:22

these actions so again I quarantine

play16:27

that into that policy

play16:30

I qur in this move it into the policy so

play16:33

basically if Microsoft is suspecting any

play16:36

of these emails for all of these what we

play16:38

can do is move it to our quarantine

play16:41

message again this is a useful setting

play16:44

here with the rise of dmar email

play16:46

security recently with the Google

play16:48

changes so if the message is detected of

play16:51

spoof and Demar policy is set to reject

play16:54

what do you want to do do you want to

play16:56

reject the message you can do that's

play16:58

good ad device to do or you could choose

play17:01

also to quarantine that message if you

play17:03

wanted to I would choose reject this

play17:05

message because that is what dmark is

play17:07

all about and again for this one here

play17:09

we'll also quarantine the message so

play17:12

basically what I do is I want all the

play17:15

messages to be stuck in the quarantine

play17:17

and let the user decide what they want

play17:19

to do with it we've got some more

play17:21

options here these are all safety tips

play17:23

that you can use so these will appear on

play17:25

emails I like to switch all these on why

play17:28

not Okay click on next and then just

play17:31

review it and that's all okay we'll

play17:34

submit that okay that's been created so

play17:36

we click on done you can see that this

play17:38

now is switched on priority zero so

play17:41

that's in place we go back to threat

play17:43

policies click on anti-spam okay when it

play17:46

comes to anti-spam policies there's a

play17:48

couple of policies we can create both an

play17:50

inbound and an outbound so firstly let's

play17:53

start with the the inbound so company

play17:55

anti-pan policy inbound click on next

play17:59

again who are we applying this to I'll

play18:01

go ahead and put the domain in here

play18:03

click on next and then we've got the

play18:04

threshold so set your bulk email

play18:07

threshold so a higher bulk email

play18:10

threshold means more bulk email will be

play18:13

delivered to the user okay so if we put

play18:16

that right down to to one no email is

play18:19

getting through to the user okay but I

play18:21

would use that with caution okay again

play18:24

going back to our settings here I've got

play18:27

these settings here so the default is

play18:28

seven that's quite a lot of bulk email

play18:30

getting through the strict is only five

play18:33

okay so you don't want to go too gungho

play18:35

with this again it's something you need

play18:38

to set I would set it at 5 or 6 I would

play18:41

monitor it and go from there if it's

play18:43

proving that too much has been held in

play18:45

quarantine then you can always come back

play18:48

and amend it okay we've got some other

play18:50

things we can do to improve the security

play18:53

so we can increase the spam score of an

play18:55

email coming in if any of these are in

play18:58

place so if there's a an image Link in

play19:00

the email which goes to a remote site we

play19:02

can go to increase the spam score or we

play19:05

can set it test so that's a nice thing

play19:07

to do if there is a numeric IP in a URL

play19:12

again we can switch that on so what that

play19:14

will do is increase the spam score which

play19:17

makes it more likely to be set to for

play19:20

the email to be caught in quarantine so

play19:22

what you can do is you can switch all

play19:24

these on if you like and you can see how

play19:26

that goes again a lot of email settings

play19:28

just tweaking it as you go next section

play19:32

if you want we can mark all emails as

play19:35

spam if they're empty so if there's

play19:37

nothing in them at all we can say well

play19:38

that's clearly spam and then we've got

play19:40

all these settings down here that we can

play19:42

change so Microsoft's recommendation is

play19:45

actually to have these all switched off

play19:47

again if you've got a specific need you

play19:49

can switch them on but Microsoft

play19:51

recommend that you you keep these on

play19:53

keep these off sorry okay click on next

play19:56

okay so what again back to the actions I

play19:58

don't like to use the junk email folder

play20:00

in Outlook I like everything to go to

play20:02

quarantine okay so again I quarantine

play20:06

the message and it's a familiar thing

play20:08

here we're going through and and

play20:09

choosing our quarantine policy high

play20:11

confidence spam again let's quarantine

play20:13

it let the user be the judge of that

play20:16

fishing we will quarantine it again our

play20:19

quarantine policy quarantine the message

play20:22

there uh put our quarantine on there if

play20:26

the bulk email has been met or exceeded

play20:28

again and you get the idea here we're

play20:30

going to quarantine everything keep that

play20:32

as default how many how many days do we

play20:34

want to retain spam in quarantine I like

play20:36

to put this at 30 rather than 15 again

play20:40

we've got some safety tips the zero hour

play20:43

auto Purge is really worth having on

play20:45

what can happen is if retrospectively an

play20:48

email has been flagged for fishing after

play20:50

it's been delivered to the to the

play20:52

mailbox of the user Microsoft can go in

play20:54

and take that back out of the mailbox

play20:56

okay same for spam messages so again

play20:59

worth having click on next click on next

play21:02

we've got the allow and block list here

play21:04

so we can allow certain senders certain

play21:06

domains likewise we can block domains

play21:09

and senders click on next this is going

play21:12

to be review click on Create and our

play21:14

policy has been created so click on done

play21:17

okay we've now got our company inbound

play21:19

policy that is good let's create an

play21:21

outbound policy so why do you need an

play21:24

outbound spam policy well with the

play21:26

outbound spam policy you can restrict

play21:28

the number of messages users send so

play21:31

I've seen it before where someone's

play21:32

mailbox has been hacked and what the

play21:34

hacker does is just spray loads of

play21:37

emails out to random people thousands of

play21:39

them but what we can do in this

play21:41

situation is restrict that from

play21:43

happening by putting a maximum number of

play21:46

emails that a user can send before they

play21:48

get blocked so it's well worth having so

play21:51

give firstly give it a name company

play21:53

anti-spam policy outbound click on next

play21:56

again apply it to your demands click on

play21:59

next so here are the limits so set an

play22:02

external message limit set an internal

play22:04

one and set a daily message limit so

play22:07

what should you set these out again

play22:09

let's hop over to the Microsoft

play22:11

recommendations the default is it say

play22:13

zero which means it's kind of unlimited

play22:15

the recommended standard you've got 500

play22:18

for externals 1,000 internals and a

play22:21

daily message at 1,000 that's slightly

play22:23

lower with the strict again it's up to

play22:26

you for this I would be nearing towards

play22:29

this I mean who sends 400 emails a day

play22:31

you must be very busy if you do but it's

play22:33

up to you so I'll set that that 800 for

play22:36

that so this is obviously more or less

play22:38

the strict profile and what happens when

play22:42

someone reaches the message limit so

play22:44

we've got a few options we can restrict

play22:46

the user from sending email until the

play22:48

next day I think that's a bit pointless

play22:51

we can put no action alert only I like

play22:53

to use this restrict the user from

play22:56

sending email and yes sometimes you get

play22:59

tickets into your business if you're an

play23:00

IT department to say I can't send any

play23:03

emails and the first question is have

play23:05

you sent more than 400 external ones

play23:08

today and they might say something like

play23:11

yeah I did a marketing Blast From Me

play23:13

from my mailbox and that's something

play23:15

that they shouldn't really be doing from

play23:16

Outlook so I I restrict the user from

play23:18

sending email but again it's up to you

play23:21

automatic forwarding rules we can have

play23:23

system control we can disable or we can

play23:25

enable I like to leave that as that

play23:28

again if we've got suspicious outbound

play23:30

messages we can send them again you can

play23:32

put maybe your it Department in there if

play23:34

you like to do that and again you can

play23:37

put the IT department in this one as

play23:39

well so you can be notified if you want

play23:41

if something's not looking Okay click on

play23:44

next that's quite an easy policy click

play23:46

on Create and then we've got that policy

play23:49

created so we click on done so now we've

play23:51

got a an inbound and an outbound click

play23:54

on threat policies again the next one

play23:56

we're going to tackle is anti malware

play23:58

again we've got the default but we're

play24:00

going to create another one so we'll

play24:01

call this company antimalware policy

play24:04

click on next again the demain so we'll

play24:06

put that in there okay click on next

play24:09

okay so this is all about sending

play24:10

malware by email so the first setting

play24:13

enable the common attachment filter so

play24:17

all these attachments will be

play24:19

quarantined as malware okay and what you

play24:23

can do you can remove certain

play24:25

attachments out of here so if your

play24:27

company receiv some attachments for

play24:29

something for maybe dobat files or

play24:32

something like that you can remove them

play24:34

I would advise you not to or you can add

play24:37

another file attachment that you want to

play24:39

block okay just keep that as it is for

play24:42

now that's my

play24:44

opinion what you can also do here so

play24:46

we're just going to come back here onto

play24:48

the reject message or quarantine the

play24:50

message so if you reject the message the

play24:53

person who sent it will get a message

play24:55

saying sorry this can't be delivered it

play24:57

conflicts with our security you can do

play24:59

that if you like or you can choose

play25:02

quarantine the message now this is where

play25:04

I would disagree with sending it to the

play25:06

user so if you quarantine the message

play25:09

you can choose if you want to add it to

play25:11

quarantine or admin access I think for

play25:14

antimalware it needs to be done on an IT

play25:17

level so a user might call you and say

play25:19

I've been sent a dobat file by someone

play25:22

and I can't get it it's not been

play25:23

delivered and then it can look and

play25:25

release it if they think it's safe but

play25:28

it's up to you you can quarantine the

play25:30

message or you can just reject it I'm

play25:32

going to leave it as that again the Zero

play25:35

Hour Purge it's similar to the settings

play25:37

we talked about earlier that means if

play25:39

something was delivered to the user's

play25:41

mailbox and then Microsoft realized it

play25:43

was malware it can pull that out of the

play25:46

users's mailbox okay so that's a good

play25:48

setting to have again you got all your

play25:51

notifications so you can choose to

play25:53

notify admin it departments etc etc with

play25:57

these settings here click on next and

play25:59

just review that it's a very simple

play26:01

policy click on submit great that is

play26:03

done so click on there and we've got our

play26:06

policy there the final two too safe

play26:09

attachments this is where Microsoft

play26:11

scans the attachments great we've got

play26:13

some standard rules in here built-in

play26:15

protection let's create our own company

play26:18

safe attachment policy click on next

play26:21

again add the domaining click on next

play26:24

okay how do we want to scan these

play26:26

attachments so at the moment this says

play26:28

off attachments are not going to get

play26:30

scanned we can deliver the message if m

play26:33

is detected and just track the results

play26:35

that doesn't sound great the one that I

play26:38

always go with is the dynamic delivery

play26:41

so what happens is the message gets

play26:43

delivered okay when the user opens the

play26:46

email it says this attachment is still

play26:49

being scanned it might be 30 seconds 45

play26:53

seconds before that attachment is

play26:55

available and all Microsoft is doing is

play26:58

scanning it I think this works the best

play27:00

of all again we've got a quarantine

play27:03

message coming on here we can choose

play27:04

different policies again for this one

play27:07

here I will choose admin only and we can

play27:09

redirect messages if we want somewhere

play27:12

else Okay click on next very easy that

play27:15

one click on submit and that creates the

play27:17

policy click on done okay and the final

play27:21

policy is save links okay let's create

play27:24

our own policy click on next again have

play27:27

the domain click on next so we've got

play27:30

different settings here how do you want

play27:32

to manage safe links with an email all

play27:34

these are turned on leave them on this

play27:36

is all good security teams Office 365

play27:41

apps they're all switched on by default

play27:43

we can display the organization branding

play27:45

and things like that but this is just we

play27:48

leave all these on it's good security

play27:50

click on next now you can use a default

play27:53

notification text you can use your own

play27:55

if you want to display to the user I'll

play27:58

just use a default click on next again

play28:00

it's a very simple policy to create and

play28:03

that creates it and that's it we've

play28:05

created our five policies we've gone

play28:07

through Defender for Office 365 great

play28:09

that is how to configure Defender for

play28:11

Office 365 plan one I hope you found

play28:14

this video informative look forward to

play28:16

see you again soon

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Email SecurityOffice 365Defender SetupCyber ProtectionAnti-PhishingAnti-SpamAnti-MalwarePolicy ConfigurationSecurity TutorialMicrosoft 365IT Administration
Besoin d'un résumé en anglais ?