Managing Your Microsoft 365 Security Services

A Part of MD - 101.

Beginner 4(1 Ratings)
What will you learn?
  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection
  • List several mechanisms used to filter spam and malware
  • Describe additional solutions to protect against phishing and spoofing
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents
  • Describe the end-user experience when an email attachment is scanned and found to be malicious
  • Describe how reports provide visibility into how EOP and ATP is protecting your organization
  • Understand how to access detailed information from reports generated by EOP and ATP

Live training
  • Date : June 29, 2021
  • Time (GMT) : 14:00:00
  • Time (EST) : 09:00:00
  • Duration : 120 Minutes
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

This session is a part of MD - 101. In this, you will study about managing the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. You will be introduced to the various reports that monitor your security health.


Managing Your Microsoft 365 Security Services

  • Introduction to Exchange Online Protection.
  • Introduction to Advanced Threat Protection.
  • Managing Safe Attachments.
  • Managing Safe Links.
  • Monitoring and Reports.

Demo: Managing Your Microsoft 365 Security Services

  • Implement a Safe Attachments policy.
  • Implement a Safe Links policy.


  • Implement In-Place Records Management in SharePoint.
  • Implement archiving and retention in Exchange.
  • Create retention policies in the Security and Compliance Center.
  • Plan their security and compliance needs.
  • Build ethical walls in Exchange Online.
  • Create a DLP Policy from a built-in template.
  • Implement policy tips.
  • Troubleshoot data governance.
  • Implement Advanced Implementation Protection.
  • Search for content in the Security and Compliance Center.
  • Audit log investigations.

    + View more
    Other related courses
    Student feedback
    Average rating
    • 0%
    • 0%
    • 0%
    • 100%
    • 0%
    Buy now
    • Learn from Industry Experts
    • Ask Question to Trainer
    • 100% Online Courses
    • Certificate of Completion