How to Configure Custom Safe Links Policies in Microsoft Defender for Office 365
by Cary Sun | Mar 28, 2024 | Azure, Cyber Security, Office365 | 0 |
Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.
Share this:
Migrate Physical Machine to Microsoft Failover Cluster
by Cary Sun | Mar 27, 2024 | Hyper-V, Windows Server | 0 |
Let’s walk through the steps to perform a Physical to Virtual machine (P2V) conversion using Veeam Backup and Replication (VBR) to migrate a physical server to a Cluster virtual machine.
Share this:
How to create custom Safe Attachments policies in Microsoft Defender for Office 365
by Cary Sun | Mar 26, 2024 | Azure, Cyber Security, Office365, Step-by-Step | 0 |
In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.
Share this:
How to create a Custom Quarantine Policy in Microsoft Deferent for Office 365
by Cary Sun | Mar 25, 2024 | Azure, Cyber Security, Office365, Step-by-Step | 0 |
Creating a custom quarantine policy in Microsoft Defender for Office 365 involves configuring advanced threat protection settings to protect your organization’s email environment.
Share this:
How to use the Microsoft Defender portal to assign Strict preset security policies to users
by Cary Sun | Mar 22, 2024 | Azure, Cyber Security, Office365 | 0 |
Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.
Share this:
How to use the Microsoft Defender portal to assign Standard preset security policies to users
by Cary Sun | Mar 21, 2024 | Azure, Cyber Security, Office365 | 0 |
Microsoft Defender for Office 365 provides preset security policies to help organizations protect their Office 365 environment from various threats. These preset policies are designed to offer baseline protection and can be customized according to the organization’s specific requirements.
Share this:
Navigating Compliance and Privacy in Microsoft Cloud Services
by John O'Neill Sr. | Mar 20, 2024 | Cyber Security | 0 |
Share this:
Understanding the Impact of Artificial Intelligence on Cybersecurity with Microsoft AI
by John O'Neill Sr. | Mar 15, 2024 | Cyber Security | 0 |
Share this:
Microsoft Defender for Office 365-Find the Domain Name of the Trusted ARC Sealers from the Message Header
by Cary Sun | Mar 8, 2024 | Azure, Cyber Security, Office365 | 0 |
An email message internet header is a metadata set containing information about the sender, recipient, routing, and delivery of an email. It can help you find the domain name of the trusted ARC sealers. The domain name must match the domain specified in the d value of the ARC-Seal and ARC-Message-Signature headers in affected messages.
Share this:
Microsoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains
by Cary Sun | Mar 7, 2024 | Azure, Cyber Security, Office365 | 0 |
Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).
Share this:
Microsoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains
by Cary Sun | Mar 6, 2024 | Azure, Cyber Security, Office365 | 0 |
Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.
Share this:
Microsoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains
by Cary Sun | Mar 5, 2024 | Azure, Cyber Security, Office365 | 0 |
DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.
Share this:
Microsoft Defender for Office 365-Configure SPF email authentication for Microsoft 365 domains
by Cary Sun | Mar 4, 2024 | Azure, Cyber Security, Office365 | 0 |
Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect businesses against advanced threats such as phishing and malware in emails, links, and collaboration tools like Microsoft Teams, SharePoint, and OneDrive. Formerly known as Office 365 Advanced Threat Protection (ATP), Microsoft Defender for Office 365 provides several features to enhance the security posture of an organization’s email and collaboration environment.
Share this:
Exploring the Benefits of Windows Hello for Business in Cybersecurity
by John O'Neill Sr. | Mar 1, 2024 | Cyber Security | 0 |
Share this:
Windows Server Patching Without Configuration Manager
by Émile Cabot | Feb 26, 2024 | Azure, System Center, Windows Server | 0 |
Share this:
Understanding the Role of Azure Sentinel in Modern Cybersecurity
by John O'Neill Sr. | Feb 13, 2024 | Cyber Security | 0 |
Share this:
Video: Introducing Windows Autopatch – A Leap Towards Automated Security
by Kevin Kaminski | Feb 13, 2024 | Intune, System Center, Windows 10 | 0 |
Share this:
Optimizing Resource Allocation in Hyper-V Clusters
by Cristal Kawula | Feb 5, 2024 | Hyper-V | 0 |
Share this:
Storage Failures in Hyper-V Cluster Management
by Cristal Kawula | Feb 4, 2024 | Hyper-V | 0 |
Share this:
Translate our Blog
Subscribe to our Blog
Our Authors
Category
- 1E
- 5nine
- ADFS
- Azure
- Books
- Certification
- Channel9
- Cisco
- Citrix
- Cool Tools
- Creative
- Cyber Security
- Design
- Exchange
- Hyper-V
- HyperConverged
- Intune
- MVP
- MVPDays
- Office365
- OMS
- OSD
- PatchSolution
- S2D
- SCCM
- Scripts
- Skype for Business
- Solarwinds
- Speaking
- Step-by-Step
- System Center
- Uncategorized
- Veeam
- ViaMonstra
- Videos
- Windows 10
- Windows 11
- Windows Admin Center
- Windows Server
Tags
Blog Stats
- 1,289,958 hits