Settings
A common practice for phishing attempts is to impersonate internal users to have them open malicious files or malicious links. Enabling this feature will ad...
Fri, 16 Jun, 2023 at 12:50 PM
Attackers will often research your organization to prepare targeted attacks. A person's calendar is a great source of such information and should not be...
Wed, 22 Jun, 2022 at 12:18 PM
Third-party apps should only be accepted by IT specialists after a vetting process. This will prevent normal users from accepting apps. Admins will still be...
Wed, 22 Jun, 2022 at 12:26 PM
This Security Control will create a transport rule in Exchange that will prevent users from creating forwarding rules to an external email address. It will ...
Wed, 22 Jun, 2022 at 12:31 PM
Office Protect will enable Security Defaults for your organization. Enabling this setting will: Block any kind of legacy authentication to Microsoft 36...
Mon, 7 Nov, 2022 at 3:44 PM
This setting enables some additional features of the Microsoft 365 MFA to help protect users from common attacks. Office Protect configures your Authenticat...
Wed, 14 Dec, 2022 at 1:57 PM
To limit the ability of hackers to perform large-scale actions on mailboxes if/when they break in. Such an action can be mitigated by removing the ability ...
Wed, 22 Jun, 2022 at 12:35 PM
A common practice for phishing attempts is to include an attachment mimicking an invoice, or document, containing a link to a webpage that will either reque...
Wed, 22 Jun, 2022 at 12:36 PM
Attachments containing links are often used for phishing. A common phishing practice is to use a staff member's name (CEO name is most common) and/or yo...
Thu, 18 Aug, 2022 at 3:10 PM
Mailbox audit logs are a requirement for Office Protect as this is how we monitor activity for our clients. If they are turned off, you lose all visibility ...
Wed, 22 Jun, 2022 at 12:38 PM