Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
welcome Sideburns to the industry. 65 Security Administration Course I'm your instructor, Jim Daniels. In this video, we're still a Model Three
00:09
in mystery 65. Threat protection.
00:12
But we're gonna start lesson to advanced threat protection with Port 1/3. 65. Advanced threat protection
00:20
In this lesson, we're gonna go over 03 65 80 p.
00:24
And how that takes what u p started and expands with how it adds value to GOP.
00:32
This is some serious advice from Michael Scott.
00:35
Don't be an escape. Good.
00:37
Don't be your organization's escape. Go
00:42
when you're CIS. Oh, with your stakeholders. Ask what kind of
00:46
you know what kind of SharePoint What kind of data protection features you have in place.
00:52
You can explaining them all about advanced threat protection,
00:56
about GOP all the totals we're talking about during this course.
01:02
But don't be the person who doesn't enact on this.
01:06
Who doesn't enable
01:07
and get this stuff going? Don't be that person.
01:11
Don't be the person who is forced to be an escape goat through inaction.
01:17
03 65 Advanced threat protection. It's safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
01:27
There are four main components
01:30
that make up those 3 65. 80 p.
01:34
Threat protection policies.
01:36
Customize them to meet your need. A level of protection
01:40
you want to on the happy medium that exists within your users, your culture and your
01:47
security posture for your organization. Reports real time reports to monitor the performance within your organization. You necessarily mind other performance of those policies you put in place.
01:59
Threat investigation and response capabilities. Investigate, understand, even simulate and prevent threats,
02:07
automated investigation and response capabilities. Keyword
02:12
Automated
02:13
We're never Something's automated is fantastic.
02:15
However, it's a increased responsibility on us as I t. Pro to make sure the automated process is set up correctly and test it correctly.
02:27
All right, so let's look at this diagram where we can kind of start to seize and illustrations on how
02:32
03 65. 80 p takes GOP and expands one.
02:38
We have three areas. Number one is the E. P area. This is what comes standard.
02:44
So we already said with our last lesson that centers reputation is protected. He goes through. The here is six.
02:51
It goes through multiple aggregates. All that's inclusion of the f E.
02:54
However, once that message is delivered
02:58
and it goes into your 10 that after that fact, if he is done
03:01
without 3 65 80 p, we have a couple more
03:06
tools you can implement. Safe attachments.
03:08
Protect the user against exploits and attachments. Safe links protects the users from sites with malicious content.
03:16
So we just talked about safe attachments and safe links. Some of the other protection services that you get with 03 65 80 p yes, will get a teepee where you can enable but within SharePoint one driving teams
03:30
that helps with fouls
03:31
so you can actually give in and look at files block. There's files that are malicious.
03:37
You could even go in and look at links that are embedded within the fouls.
03:43
80 p Anti phishing checks. Incoming messages for indicators. That message might be efficient. Attempt.
03:49
When users are covered by a teepee policies
03:51
it kind of messages are evaluated by multiple machine learning models that analyze the messages
03:57
and take appropriate action based on your configuration policy,
04:00
wrote Time reports. Becoming it on that already monitoring capabilities are available in the security and Compliance center
04:09
threat export. That's a rule time report that lets authorized users identifying analyzed recent threats.
04:15
It shows the last seven days within your tent
04:17
and within the industry. 65 worldwide environment. However you can modify to show up to the last 30 days.
04:26
Explore contains views such as malware, submissions, fishing and all. Email.
04:31
Real time detection.
04:33
Real time detection is a report in real time, of course, of US authorized users identifying analyzed recent threats
04:42
somewhere to third. Explore
04:44
threat trackers are informative widgets and views that provide authorized users with intelligence on cybersecurity issues that may impact your organization
04:53
Air Automated Incident response.
04:55
These capabilities available in the 03 65 80 p
04:59
and if we could run automated investigation processes in response to a well known threats that exist,
05:04
are automating certain tasks.
05:06
Security teams can operate more efficiently and effectively again.
05:11
Automation is the in go for all security teams. Remediation actions such as deleting malicious email messages or taking upon approval by your security operations Team Attacks simulator
05:25
this less you run realistic attacks within your organization.
05:30
You can do different kind of attacks. You can do a display name spearfishing attack
05:33
a password spray attack or even a brute force. Passport Attack
05:38
Quiz.
05:39
Which of the phone is not? A service provider by 03 65 80 p
05:45
Safe links
05:46
Real time detections
05:48
Safe computing Safe attachments Taxi Oh, survey says
06:01
safe computing.
06:03
The other four are services provided. Safe computing is not a service that's provide about 65 a TV.
06:12
So to recap this lesson 03 cc 5. 80 p Advanced threat protection safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
06:24
03 65 80 p
06:26
Picks up where GOP left off and expands on those features with any API.
06:31
Thank you for joining me for this lesson. I hope to see you next time. Take care.

Up Next

MS-500: Microsoft 365 Security Administration

The Microsoft 365 Security Administration course is designed to prepare students to take and pass the MS-500 certification exam. The course covers the four domains of the exam, providing students with the knowledge and skills they need to earn their credential.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor