MS-102 Manage your security services in Microsoft Defender XDR Flashcards
(39 cards)
To add, modify, and delete anti-malware policies, you must be a member of what role group?
Organization Management or Security Administrator role groups.
Exchange Online Protection
Organizations that host mailboxes in Exchange Online rely on Exchange Online Protection (EOP) to protect incoming and outgoing mail.
Microsoft Defender’s Safe Attachments
scans all file attachments. In fact, it scans files even if they don’t appear to be suspicious. By doing so, it protects against malware that doesn’t have a known anti-virus signature.
to create an anti-malware policy in the Microsoft Defender portal:
In the Microsoft Defender portal, under the Email & Collaboration section in the navigation pane, select Policies & rules.
On the Policies & rules page, in the list of policies, select Threat policies.
On the Threat policies page, under the Policies section, select Anti-malware.
On the Anti-malware page, the Default policy is displayed in the list of policies. Select Create to create a custom policy.
common attachments filter
The file types that you specify are automatically identified as malware. As such, Microsoft Defender automatically quarantines messages containing these types of file
Create anti-malware policies using Exchange PowerShell
create a malware filter policy,new-MalwareFilterPolicy -Name “<PolicyName>"</PolicyName>
Use Exchange PowerShell to create a malware filter rule
New-MalwareFilterRule -Name “<RuleName>"</RuleName>
MX record
ensures that email sent to the tenant’s domain arrives in mailboxes hosted in Exchange Online through the EOP service.
How to bypass spam filtering on incoming messages
you can use Exchange mail flow rules (also known as transport rules) to bypass most spam filtering on incoming messages. For example, you might route email through a non-Microsoft protection service or device before delivery to Microsoft 365.
Zero-hour auto purge (ZAP)
retroactively detects and neutralizes malicious phishing, spam, or malware messages the system already delivered to Exchange Online mailboxes
Spoofing
the fraudulent practice of sending emails purporting to be from reputable companies.
Sender Policy Framework
a DNS record that helps to prevent spoofing and phishing. It does so by verifying the domain name from which the sender sent the message.
Domain Keys Identified Mail
adds a digital signature to email messages in the message header.
Domain-based Messaging and Reporting Compliance
This authentication technique protects organizations from phishers who spoofed the 5322.From email address.
How does EOP handle a message marked as ‘High confidence phishing’?
Quarantine’s the message
Microsoft Defender for Office 365 P1
Protects email and collaboration from zero-day malware, phish, and business email compromise
Microsoft Defender for Office 365 P2
Adds post-breach investigation, hunting, and response, as well as automation, and simulation (for training).
Safe Attachments
When a user receives an email with an attachment, Safe Attachments tests the file to determine if it’s safe.
Safe Attachments opens the attachment in a virtual environment and executes it in a sandboxed environment to check for any suspicious behavior or activity.
Safe Links
feature that helps protect users from malicious links in emails, documents, and other content. When a user selects a link, Safe Links tests the URL to determine if it’s safe.
spoof intelligence insight in the Microsoft Defender
quickly identify spoofed senders who are legitimately sending you unauthenticated email.
to open the spoof intelligence insight in the Microsoft Defender portal:
In the Microsoft Defender portal at https://security.microsoft.com, go to Email & Collaboration, then Policies & Rules, then Threat policies, and then Tenant Allow/Block Lists in the Rules section.
On the Tenant Allow/Block Lists page,
The outbound spam filter policy.
Specifies the actions for outbound spam filtering verdicts and the notification options.
The outbound spam filter rule
Specifies the priority and sender filters (who the policy applies to) for an outbound spam filter policy.
Create outbound spam policies in the Microsoft Defender portal
In the Microsoft Defender portal at https://security.microsoft.com, select Email & Collaboration, then Policies & Rules, then Threat policies, and then Anti-spam in the Policies section.
On the Anti-spam policies page, select Create policy and then select Outbound from the drop-down list that appears.