Settings
To limit the ability of hackers to perform large-scale actions on mailboxes if/when they break in. Such an action can be mitigated by removing the ability ...
Wed, 22 Jun, 2022 at 12:35 PM
A common practice for phishing attempts is to include an attachment mimicking an invoice, or document, containing a link to a webpage that will either reque...
Wed, 22 Jun, 2022 at 12:36 PM
Attachments containing links are often used for phishing. A common phishing practice is to use a staff member's name (CEO name is most common) and/or yo...
Thu, 18 Aug, 2022 at 3:10 PM
Mailbox audit logs are a requirement for Office Protect as this is how we monitor activity for our clients. If they are turned off, you lose all visibility ...
Wed, 22 Jun, 2022 at 12:38 PM
Allow Microsoft to remove files and emails from your user's inboxes if they are found to be dangerous after delivery. All email messages are evaluat...
Wed, 22 Jun, 2022 at 12:38 PM
Attackers can use malicious attachments to gain access to sensitive information, steal credentials, or install malware on a victim's computer. Safe Att...
Sun, 28 Jan, 2024 at 11:45 AM
Attackers can often gain access to sensitive information, compromise systems or launch ransomware attacks by tricking users into downloading malicious docum...
Sun, 28 Jan, 2024 at 11:41 AM
Attackers often try to obtain sensitive information through phishing attacks, which involve tricking a user into clicking on a link that leads to a maliciou...
Tue, 20 Jun, 2023 at 5:14 PM
A notification will be sent to the email account set here if one of the organization's accounts is flagged for sending spam. A normal user that sudd...
Wed, 22 Jun, 2022 at 12:39 PM