Security in MS-365 Part 3: Email Protection

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Welcome back. Security minded Saberi ins to the M s 3 65 Security Administration course.
00:07
It's my privilege to be your instructor, Jim Daniels
00:11
and World Model three Industry 65 Threat protection.
00:14
Still, unless someone security within M s 3. 65
00:18
part three email protection
00:21
if you want to guess what this lesson is about, Yeah, email protection. Of course, I just said so in this lesson, we're going to go home or into
00:29
E. O. P s anti malware features.
00:31
We're gonna look at zero hour perch.
00:34
Also spoofing and phishing protection mechanisms within exchange online.
00:41
So want the age old question since nineties hip hop.
00:44
Are you down with the GOP?
00:47
If you have exchange Oman, the answer is yes.
00:50
You're down with the GOP whether you want to be your knots,
00:53
because remember,
00:54
it comes included with the base exchange online.
00:59
It's a cloud based email. Filtering service helps protect your organization against spam, and nowhere
01:06
it includes features the Safe Gorge Organization from messaging policy violations.
01:11
You can simplify the management of your messaging environment and alleviate many of the bargains that come with maintaining on premises, hardware and software.
01:22
Here's the GOP plans
01:23
You ve Standalone, a separate cloud based service that protects your warm print email environment
01:29
with European the clown.
01:32
It's not very popular. Not very common is there if you need it.
01:36
European Exchange aligns built in protection
01:38
for the exchange Salon hosted mailboxes
01:42
Exchange Enterprise
01:44
Cow with services Client access license
01:47
is the adult license you purchase for your warm Premises Exchange organization. It includes E a p, another cloud based features.
01:56
Any of those three scenarios will grant you GOP usage
02:00
for your organization.
02:04
Let's take a look at the anti malware Pipeline and M s 3 65
02:09
poppy reputations. Send a reputation advanced heuristics All of those air used before the mail even enters a mystery. 65 Network
02:21
Melo, scanned by multiple signature based Avie scanners
02:24
in the visual fouls or scan using a reputation block
02:30
here is that clustering is used to identify Mel as suspicious. Based on analysis of delivery patterns,
02:37
results are aggregated
02:38
and ran through missing learning models.
02:42
E O. P. Protection is extended at this point
02:46
if the tenor has 03 65. 80 p, formally known as M s 3. 65. 80 p enable at this point,
02:53
which is regularly epi.
02:55
After number four, you get all one through. Four
03:00
was standard e of the
03:01
number five you extended.
03:04
So if you have 03 65 a C P, which we're gonna talk about,
03:08
you get additional
03:09
tools and security measures.
03:13
Zero hour purge or zap.
03:15
It's an email protection feature within exchange.
03:19
Oman Protection. You happy service
03:21
the text messages with spam from our that previously went undetected and were delivered.
03:27
Zap continuously monitors updates to a mystery 65 span in our signatures
03:32
and can identify previously undetected malicious messages already delivered in your mailbox.
03:40
It automatically removes unready malicious messages
03:44
to the junk mail folder.
03:46
You also can do policies and investigations on actions
03:50
within the cloud out security broker and some of the other 03 65. 80 p features where you can use that as a feature
03:59
phishing and spoofing protection
04:02
by design SMTP support spoofing.
04:05
It's just the way in 30 call works
04:09
E. O. P. Has built in anti spoofing anti phishing protection
04:14
that's designed to detect legitimate cases of spoofing while shooting organization from the illegitimate ones.
04:23
E. A P supports email authentication techniques, including SPF
04:27
de Can and Demark,
04:30
SPF Deacon and Demark. Those air low hanging fruit for your email protection.
04:36
If your organization designed utilize all three of these,
04:41
please get all that.
04:42
Just send a note putting a ticket. Do whatever you need to do if you're the email administrator and it's not enable the same one used Paul's it get the work done and come back really seriously.
04:55
There's three things to be enable every email domain in the 21st century and beyond.
05:02
03 65
05:04
over the years has actually had a evolution
05:09
to wear at the very beginning, maybe 56 years ago. It wasn't as hard on felled SPF records or DeCamp.
05:16
Now it's starting to
05:19
be harsher
05:20
when those values don't match. So you need to make sure your SPF is up today. Make sure you have d came and Demark
05:28
also enable within your tenant in your male domain
05:30
very, very important but simple
05:34
steps to keep your email environment safe.
05:39
Spoof intelligence. It's included with the M s 3. 65 e five.
05:43
That's the Sweet
05:44
or 03 65 83 licenses
05:47
provides inside in the centres. They're spoofing your tennis domain
05:51
automatically created, enabled and enforced by defaults. To recap the lesson
05:58
E. A p is a cloud based email filtering service that helps protect your organization. Get spanning malware.
06:03
GOP supports email authentication techniques
06:06
included. Center policy framework, SPF
06:10
Domain Keys Identified. Mel D. Kim and Domain based Message and Reporting Compliance. A Demarche.
06:16
Thank you for joining me when this lesson. I have to see you next time. Take care.
Up Next