Category OFFICE 365

Searching the audit log in O365

Searching the audit log in O365 In the Security & Compliance Center, click Search & investigation > Audit log search. Configure the following search criteria (Note: Leave this box blank to return entries for all files, folders, and URLs in your organization): Activities. Click…

Enabling auditing in your O365 tenant

Enabling auditing in your O365 Tenant Enabling auditing in your tenant is a one-time process. Follow these steps to turn it on: In the Security & Compliance Center, click Search & investigation > Audit log search in the left navigation pane. Click Start recording…

Modifying an existing safe attachments policy in O365

Modifying an existing safe attachments policy The following steps illustrate how you would use the Security & Compliance Center to modify an existing safe attachments policy named SA block policy to exempt a security analyst named Ellie. The policy is configured with the…

Creating safe attachment policies in O365

Creating safe attachment policies by using the Security & Compliance Center You can set up an ATP safe attachments policy using either the Security & Compliance Center or the Exchange admin center (EAC). Creating a new safe attachment policy: The…

Protect against threats – Office 365

Protect against threats – Office 365 Microsoft 365 includes a variety of threat protection features. Here’s a quick-start guide you can use as a checklist to make sure your threat protection features are set up for your organization.  Important Initial…