Time
6 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back. Security minded Saberi ins to the M s 3 65 Security Administration course.
00:07
It's my privilege to be your instructor, Jim Daniels
00:11
and World Model three Industry 65 Threat protection.
00:14
Still, unless someone security within M s 3. 65
00:18
part three email protection
00:21
if you want to guess what this lesson is about, Yeah, email protection. Of course, I just said so in this lesson, we're going to go home or into
00:29
E. O. P s anti malware features.
00:31
We're gonna look at zero hour perch.
00:34
Also spoofing and phishing protection mechanisms within exchange online.
00:41
So want the age old question since nineties hip hop.
00:44
Are you down with the GOP?
00:47
If you have exchange Oman, the answer is yes.
00:50
You're down with the GOP whether you want to be your knots,
00:53
because remember,
00:54
it comes included with the base exchange online.
00:59
It's a cloud based email. Filtering service helps protect your organization against spam, and nowhere
01:06
it includes features the Safe Gorge Organization from messaging policy violations.
01:11
You can simplify the management of your messaging environment and alleviate many of the bargains that come with maintaining on premises, hardware and software.
01:22
Here's the GOP plans
01:23
You ve Standalone, a separate cloud based service that protects your warm print email environment
01:29
with European the clown.
01:32
It's not very popular. Not very common is there if you need it.
01:36
European Exchange aligns built in protection
01:38
for the exchange Salon hosted mailboxes
01:42
Exchange Enterprise
01:44
Cow with services Client access license
01:47
is the adult license you purchase for your warm Premises Exchange organization. It includes E a p, another cloud based features.
01:56
Any of those three scenarios will grant you GOP usage
02:00
for your organization.
02:04
Let's take a look at the anti malware Pipeline and M s 3 65
02:09
poppy reputations. Send a reputation advanced heuristics All of those air used before the mail even enters a mystery. 65 Network
02:21
Melo, scanned by multiple signature based Avie scanners
02:24
in the visual fouls or scan using a reputation block
02:30
here is that clustering is used to identify Mel as suspicious. Based on analysis of delivery patterns,
02:37
results are aggregated
02:38
and ran through missing learning models.
02:42
E O. P. Protection is extended at this point
02:46
if the tenor has 03 65. 80 p, formally known as M s 3. 65. 80 p enable at this point,
02:53
which is regularly epi.
02:55
After number four, you get all one through. Four
03:00
was standard e of the
03:01
number five you extended.
03:04
So if you have 03 65 a C P, which we're gonna talk about,
03:08
you get additional
03:09
tools and security measures.
03:13
Zero hour purge or zap.
03:15
It's an email protection feature within exchange.
03:19
Oman Protection. You happy service
03:21
the text messages with spam from our that previously went undetected and were delivered.
03:27
Zap continuously monitors updates to a mystery 65 span in our signatures
03:32
and can identify previously undetected malicious messages already delivered in your mailbox.
03:40
It automatically removes unready malicious messages
03:44
to the junk mail folder.
03:46
You also can do policies and investigations on actions
03:50
within the cloud out security broker and some of the other 03 65. 80 p features where you can use that as a feature
03:59
phishing and spoofing protection
04:02
by design SMTP support spoofing.
04:05
It's just the way in 30 call works
04:09
E. O. P. Has built in anti spoofing anti phishing protection
04:14
that's designed to detect legitimate cases of spoofing while shooting organization from the illegitimate ones.
04:23
E. A P supports email authentication techniques, including SPF
04:27
de Can and Demark,
04:30
SPF Deacon and Demark. Those air low hanging fruit for your email protection.
04:36
If your organization designed utilize all three of these,
04:41
please get all that.
04:42
Just send a note putting a ticket. Do whatever you need to do if you're the email administrator and it's not enable the same one used Paul's it get the work done and come back really seriously.
04:55
There's three things to be enable every email domain in the 21st century and beyond.
05:02
03 65
05:04
over the years has actually had a evolution
05:09
to wear at the very beginning, maybe 56 years ago. It wasn't as hard on felled SPF records or DeCamp.
05:16
Now it's starting to
05:19
be harsher
05:20
when those values don't match. So you need to make sure your SPF is up today. Make sure you have d came and Demark
05:28
also enable within your tenant in your male domain
05:30
very, very important but simple
05:34
steps to keep your email environment safe.
05:39
Spoof intelligence. It's included with the M s 3. 65 e five.
05:43
That's the Sweet
05:44
or 03 65 83 licenses
05:47
provides inside in the centres. They're spoofing your tennis domain
05:51
automatically created, enabled and enforced by defaults. To recap the lesson
05:58
E. A p is a cloud based email filtering service that helps protect your organization. Get spanning malware.
06:03
GOP supports email authentication techniques
06:06
included. Center policy framework, SPF
06:10
Domain Keys Identified. Mel D. Kim and Domain based Message and Reporting Compliance. A Demarche.
06:16
Thank you for joining me when this lesson. I have to see you next time. Take care.

Up Next

MS-500: Microsoft 365 Security Administration

The Microsoft 365 Security Administration course is designed to prepare students to take and pass the MS-500 certification exam. The course covers the four domains of the exam, providing students with the knowledge and skills they need to earn their credential.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor