Tag Office 365

Advanced Threat Protection

Advanced Threat Protection Advanced Threat Protection (ATP) is a new email filtering service that complements Exchange Online Protection (EOP) and provides protection against specific types of advanced threats including phishing and zero day attacks. ATP delivers the following benefits: Safe…

Exchange Online Protection

Exchange Online Protection Exchange Online Protection is a cloud-based anti-spam and antivirus solution. Organizations can choose to deploy it as a single solution or a hybrid solution together with the Exchange Server on-premise antivirus protection. Because this is a cloud-based…

Searching the audit log in O365

Searching the audit log in O365 In the Security & Compliance Center, click Search & investigation > Audit log search. Configure the following search criteria (Note: Leave this box blank to return entries for all files, folders, and URLs in your organization): Activities. Click…

Enabling auditing in your O365 tenant

Enabling auditing in your O365 Tenant Enabling auditing in your tenant is a one-time process. Follow these steps to turn it on: In the Security & Compliance Center, click Search & investigation > Audit log search in the left navigation pane. Click Start recording…

Modifying an existing safe attachments policy in O365

Modifying an existing safe attachments policy The following steps illustrate how you would use the Security & Compliance Center to modify an existing safe attachments policy named SA block policy to exempt a security analyst named Ellie. The policy is configured with the…

Creating safe attachment policies in O365

Creating safe attachment policies by using the Security & Compliance Center You can set up an ATP safe attachments policy using either the Security & Compliance Center or the Exchange admin center (EAC). Creating a new safe attachment policy: The…

Protect against threats – Office 365

Protect against threats – Office 365 Microsoft 365 includes a variety of threat protection features. Here’s a quick-start guide you can use as a checklist to make sure your threat protection features are set up for your organization.  Important Initial…