welcome Sideburns to the industry. 65 Security Administration Course I'm your instructor, Jim Daniels. In this video, we're still a Model Three
in mystery 65. Threat protection.
But we're gonna start lesson to advanced threat protection with Port 1/3. 65. Advanced threat protection
In this lesson, we're gonna go over 03 65 80 p.
And how that takes what u p started and expands with how it adds value to GOP.
This is some serious advice from Michael Scott.
Don't be an escape. Good.
Don't be your organization's escape. Go
when you're CIS. Oh, with your stakeholders. Ask what kind of
you know what kind of SharePoint What kind of data protection features you have in place.
You can explaining them all about advanced threat protection,
about GOP all the totals we're talking about during this course.
But don't be the person who doesn't enact on this.
and get this stuff going? Don't be that person.
Don't be the person who is forced to be an escape goat through inaction.
03 65 Advanced threat protection. It's safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
There are four main components
that make up those 3 65. 80 p.
Threat protection policies.
Customize them to meet your need. A level of protection
you want to on the happy medium that exists within your users, your culture and your
security posture for your organization. Reports real time reports to monitor the performance within your organization. You necessarily mind other performance of those policies you put in place.
Threat investigation and response capabilities. Investigate, understand, even simulate and prevent threats,
automated investigation and response capabilities. Keyword
We're never Something's automated is fantastic.
However, it's a increased responsibility on us as I t. Pro to make sure the automated process is set up correctly and test it correctly.
All right, so let's look at this diagram where we can kind of start to seize and illustrations on how
03 65. 80 p takes GOP and expands one.
We have three areas. Number one is the E. P area. This is what comes standard.
So we already said with our last lesson that centers reputation is protected. He goes through. The here is six.
It goes through multiple aggregates. All that's inclusion of the f E.
However, once that message is delivered
and it goes into your 10 that after that fact, if he is done
without 3 65 80 p, we have a couple more
tools you can implement. Safe attachments.
Protect the user against exploits and attachments. Safe links protects the users from sites with malicious content.
So we just talked about safe attachments and safe links. Some of the other protection services that you get with 03 65 80 p yes, will get a teepee where you can enable but within SharePoint one driving teams
that helps with fouls
so you can actually give in and look at files block. There's files that are malicious.
You could even go in and look at links that are embedded within the fouls.
80 p Anti phishing checks. Incoming messages for indicators. That message might be efficient. Attempt.
When users are covered by a teepee policies
it kind of messages are evaluated by multiple machine learning models that analyze the messages
and take appropriate action based on your configuration policy,
wrote Time reports. Becoming it on that already monitoring capabilities are available in the security and Compliance center
threat export. That's a rule time report that lets authorized users identifying analyzed recent threats.
It shows the last seven days within your tent
and within the industry. 65 worldwide environment. However you can modify to show up to the last 30 days.
Explore contains views such as malware, submissions, fishing and all. Email.
Real time detection.
Real time detection is a report in real time, of course, of US authorized users identifying analyzed recent threats
somewhere to third. Explore
threat trackers are informative widgets and views that provide authorized users with intelligence on cybersecurity issues that may impact your organization
Air Automated Incident response.
These capabilities available in the 03 65 80 p
and if we could run automated investigation processes in response to a well known threats that exist,
are automating certain tasks.
Security teams can operate more efficiently and effectively again.
Automation is the in go for all security teams. Remediation actions such as deleting malicious email messages or taking upon approval by your security operations Team Attacks simulator
this less you run realistic attacks within your organization.
You can do different kind of attacks. You can do a display name spearfishing attack
a password spray attack or even a brute force. Passport Attack
Which of the phone is not? A service provider by 03 65 80 p
Real time detections
Safe computing Safe attachments Taxi Oh, survey says
The other four are services provided. Safe computing is not a service that's provide about 65 a TV.
So to recap this lesson 03 cc 5. 80 p Advanced threat protection safeguards your organization against malicious threats posed by email messages, links and collaboration tools.
Picks up where GOP left off and expands on those features with any API.
Thank you for joining me for this lesson. I hope to see you next time. Take care.