By the
end of this module, you will be able to: List several types of reports that provide insight into how your organization is being protected from attacks using email as the threat vector Identify where to access reports generated by EOP and Microsoft Defender for Office 365 Describe how to access detailed information from reports generated by EOP and Microsoft Defender for Office 365 |
Manage
your Microsoft 365 security services Introduction Examine the Threat Protection Status report Examine the Defender for Office 365 Message Disposition report Examine the File Type and Disposition report Examine the Malware Detections report Examine the Top Malware report Examine the Top Senders and Recipients report Examine the Spoof Mail report Examine the Spam Detections report Examine the Sent and Received Email report Knowledge check Summary |
37 min | |
Intermediate | |
English | |
Self-paced | |
- | |
- | |
- | |
- |