MS-102 Manage your security services in Microsoft Defender XDR Flashcards

(39 cards)

1
Q

To add, modify, and delete anti-malware policies, you must be a member of what role group?

A

Organization Management or Security Administrator role groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exchange Online Protection

A

Organizations that host mailboxes in Exchange Online rely on Exchange Online Protection (EOP) to protect incoming and outgoing mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Microsoft Defender’s Safe Attachments

A

scans all file attachments. In fact, it scans files even if they don’t appear to be suspicious. By doing so, it protects against malware that doesn’t have a known anti-virus signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

to create an anti-malware policy in the Microsoft Defender portal:

A

In the Microsoft Defender portal, under the Email & Collaboration section in the navigation pane, select Policies & rules.

On the Policies & rules page, in the list of policies, select Threat policies.

On the Threat policies page, under the Policies section, select Anti-malware.

On the Anti-malware page, the Default policy is displayed in the list of policies. Select Create to create a custom policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

common attachments filter

A

The file types that you specify are automatically identified as malware. As such, Microsoft Defender automatically quarantines messages containing these types of file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Create anti-malware policies using Exchange PowerShell

A

create a malware filter policy,new-MalwareFilterPolicy -Name “<PolicyName>"</PolicyName>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use Exchange PowerShell to create a malware filter rule

A

New-MalwareFilterRule -Name “<RuleName>"</RuleName>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MX record

A

ensures that email sent to the tenant’s domain arrives in mailboxes hosted in Exchange Online through the EOP service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to bypass spam filtering on incoming messages

A

you can use Exchange mail flow rules (also known as transport rules) to bypass most spam filtering on incoming messages. For example, you might route email through a non-Microsoft protection service or device before delivery to Microsoft 365.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero-hour auto purge (ZAP)

A

retroactively detects and neutralizes malicious phishing, spam, or malware messages the system already delivered to Exchange Online mailboxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

the fraudulent practice of sending emails purporting to be from reputable companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sender Policy Framework

A

a DNS record that helps to prevent spoofing and phishing. It does so by verifying the domain name from which the sender sent the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Domain Keys Identified Mail

A

adds a digital signature to email messages in the message header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain-based Messaging and Reporting Compliance

A

This authentication technique protects organizations from phishers who spoofed the 5322.From email address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does EOP handle a message marked as ‘High confidence phishing’?

A

Quarantine’s the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Microsoft Defender for Office 365 P1

A

Protects email and collaboration from zero-day malware, phish, and business email compromise

17
Q

Microsoft Defender for Office 365 P2

A

Adds post-breach investigation, hunting, and response, as well as automation, and simulation (for training).

18
Q

Safe Attachments

A

When a user receives an email with an attachment, Safe Attachments tests the file to determine if it’s safe.

Safe Attachments opens the attachment in a virtual environment and executes it in a sandboxed environment to check for any suspicious behavior or activity.

19
Q

Safe Links

A

feature that helps protect users from malicious links in emails, documents, and other content. When a user selects a link, Safe Links tests the URL to determine if it’s safe.

20
Q

spoof intelligence insight in the Microsoft Defender

A

quickly identify spoofed senders who are legitimately sending you unauthenticated email.

21
Q

to open the spoof intelligence insight in the Microsoft Defender portal:

A

In the Microsoft Defender portal at https://security.microsoft.com, go to Email & Collaboration, then Policies & Rules, then Threat policies, and then Tenant Allow/Block Lists in the Rules section.

On the Tenant Allow/Block Lists page,

22
Q

The outbound spam filter policy.

A

Specifies the actions for outbound spam filtering verdicts and the notification options.

23
Q

The outbound spam filter rule

A

Specifies the priority and sender filters (who the policy applies to) for an outbound spam filter policy.

24
Q

Create outbound spam policies in the Microsoft Defender portal

A

In the Microsoft Defender portal at https://security.microsoft.com, select Email & Collaboration, then Policies & Rules, then Threat policies, and then Anti-spam in the Policies section.

On the Anti-spam policies page, select Create policy and then select Outbound from the drop-down list that appears.

25
daily message limit
A valid value is 0 to 10000.
26
PowerShell to create an outbound spam filter policy
New-HostedOutboundSpamFilterPolicy -Name
27
PowerShell to create an outbound spam filter rule
New-HostedOutboundSpamFilterRule -Name
28
Restricted Access list in mail flow rules in Exchange Online
Primarily used to prevent specific users from sending outbound emails. When you add a user to this list, they're restricted from sending emails but can still receive them
29
Blocking domains or user email addresses in Microsoft Defender for Office 365.
Provides robust email filtering capabilities. Blocking domains or specific email addresses helps protect your organization from phishing, spam, and other threats.
30
Perform the following steps to create mail flow rules using the EAC:
Sign in to the new EAC. Navigate to Recipients > Mailboxes. Select the user mailbox for which you want to establish a mail flow rule. In the user mailbox pane that appears, the General tab is displayed by default. Select the Mailbox tab. In the Message Delivery Restrictions section, select Manage message delivery restrictions.
31
create mail flow rules using Exchange Online PowerShell.
Set-Mailbox -Identity "UserEmailAddress" -AcceptMessagesOnlyFromSendersOrMembers "Organization"
32
To create block entries for domains and email addresses, use either of the following methods:
From the Emails tab on the Submissions page. When you submit a message as Should have been blocked (False negative), you can select Block all emails from this sender or domain to add a block entry to the Domains & email addresses tab on the Tenant Allow/Block Lists page
33
Use Microsoft Defender to create block entries
In the Microsoft Defender portal, go to Policies & rules > Threat Policies > Rules section > Tenant Allow/Block Lists. On the Tenant Allow/Block Lists page, verify that the Domains & addresses tab is selected. On the Domains & addresses tab, select +Block.
34
Creating a custom Safe Attachments policy in Microsoft Defender XDR
In the Microsoft 365 admin center, select Show All in the left-hand navigation pane, and then under Admin centers, select Security. In the Microsoft Defender portal, select Policies & rules in the left-hand navigation pane. On the Policies & rules page, select Threat policies. On the Threat policies page, under the Policies section, select Safe Attachments. On the Safe Attachments page, select Create.
35
priority of Safe Attachments policies
automatically assigns policies a priority based on their order of creation. So the first policy you create is assigned priority 0, which is the highest priority policy.
36
To create, modify, and delete Safe Links policies, you must be a member of
The Organization Management or Security Administrator role groups in the Microsoft Defender portal.
37
reating a custom Safe Links policy in Microsoft Defender XDR
In the Microsoft Defender portal, select Policies and rules in the left-hand navigation pane. On the Policies and rules page, select Threat policies. On the Threat policies page, under the Policies section, select Safe Links. On the Safe Links page, select Create.
38
correct sequence of steps to setting up a Safe Links policy in Microsoft Defender for Office 365.
Create Safe Links policy, turn on Safe Links protection, turn on real-time URL scanning, create Safe Links rule, specify recipient filters
39