Advanced Threat Protection Part 1: Office 365 ATP

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
welcome Sideburns to the industry. 65 Security Administration Course I'm your instructor, Jim Daniels. In this video, we're still a Model Three
00:09
in mystery 65. Threat protection.
00:12
But we're gonna start lesson to advanced threat protection with Port 1/3. 65. Advanced threat protection
00:20
In this lesson, we're gonna go over 03 65 80 p.
00:24
And how that takes what u p started and expands with how it adds value to GOP.
00:32
This is some serious advice from Michael Scott.
00:35
Don't be an escape. Good.
00:37
Don't be your organization's escape. Go
00:42
when you're CIS. Oh, with your stakeholders. Ask what kind of
00:46
you know what kind of SharePoint What kind of data protection features you have in place.
00:52
You can explaining them all about advanced threat protection,
00:56
about GOP all the totals we're talking about during this course.
01:02
But don't be the person who doesn't enact on this.
01:06
Who doesn't enable
01:07
and get this stuff going? Don't be that person.
01:11
Don't be the person who is forced to be an escape goat through inaction.
01:17
03 65 Advanced threat protection. It's safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
01:27
There are four main components
01:30
that make up those 3 65. 80 p.
01:34
Threat protection policies.
01:36
Customize them to meet your need. A level of protection
01:40
you want to on the happy medium that exists within your users, your culture and your
01:47
security posture for your organization. Reports real time reports to monitor the performance within your organization. You necessarily mind other performance of those policies you put in place.
01:59
Threat investigation and response capabilities. Investigate, understand, even simulate and prevent threats,
02:07
automated investigation and response capabilities. Keyword
02:12
Automated
02:13
We're never Something's automated is fantastic.
02:15
However, it's a increased responsibility on us as I t. Pro to make sure the automated process is set up correctly and test it correctly.
02:27
All right, so let's look at this diagram where we can kind of start to seize and illustrations on how
02:32
03 65. 80 p takes GOP and expands one.
02:38
We have three areas. Number one is the E. P area. This is what comes standard.
02:44
So we already said with our last lesson that centers reputation is protected. He goes through. The here is six.
02:51
It goes through multiple aggregates. All that's inclusion of the f E.
02:54
However, once that message is delivered
02:58
and it goes into your 10 that after that fact, if he is done
03:01
without 3 65 80 p, we have a couple more
03:06
tools you can implement. Safe attachments.
03:08
Protect the user against exploits and attachments. Safe links protects the users from sites with malicious content.
03:16
So we just talked about safe attachments and safe links. Some of the other protection services that you get with 03 65 80 p yes, will get a teepee where you can enable but within SharePoint one driving teams
03:30
that helps with fouls
03:31
so you can actually give in and look at files block. There's files that are malicious.
03:37
You could even go in and look at links that are embedded within the fouls.
03:43
80 p Anti phishing checks. Incoming messages for indicators. That message might be efficient. Attempt.
03:49
When users are covered by a teepee policies
03:51
it kind of messages are evaluated by multiple machine learning models that analyze the messages
03:57
and take appropriate action based on your configuration policy,
04:00
wrote Time reports. Becoming it on that already monitoring capabilities are available in the security and Compliance center
04:09
threat export. That's a rule time report that lets authorized users identifying analyzed recent threats.
04:15
It shows the last seven days within your tent
04:17
and within the industry. 65 worldwide environment. However you can modify to show up to the last 30 days.
04:26
Explore contains views such as malware, submissions, fishing and all. Email.
04:31
Real time detection.
04:33
Real time detection is a report in real time, of course, of US authorized users identifying analyzed recent threats
04:42
somewhere to third. Explore
04:44
threat trackers are informative widgets and views that provide authorized users with intelligence on cybersecurity issues that may impact your organization
04:53
Air Automated Incident response.
04:55
These capabilities available in the 03 65 80 p
04:59
and if we could run automated investigation processes in response to a well known threats that exist,
05:04
are automating certain tasks.
05:06
Security teams can operate more efficiently and effectively again.
05:11
Automation is the in go for all security teams. Remediation actions such as deleting malicious email messages or taking upon approval by your security operations Team Attacks simulator
05:25
this less you run realistic attacks within your organization.
05:30
You can do different kind of attacks. You can do a display name spearfishing attack
05:33
a password spray attack or even a brute force. Passport Attack
05:38
Quiz.
05:39
Which of the phone is not? A service provider by 03 65 80 p
05:45
Safe links
05:46
Real time detections
05:48
Safe computing Safe attachments Taxi Oh, survey says
06:01
safe computing.
06:03
The other four are services provided. Safe computing is not a service that's provide about 65 a TV.
06:12
So to recap this lesson 03 cc 5. 80 p Advanced threat protection safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
06:24
03 65 80 p
06:26
Picks up where GOP left off and expands on those features with any API.
06:31
Thank you for joining me for this lesson. I hope to see you next time. Take care.
Up Next