Summary and knowledge check
In this module, you learned how to plan, implement, and configure policies to protect your organization from malware, spam, and phishing.
Now that you have completed this module, you should be able to:
- List Microsoft Defender for Office 365 threat protection features.
- Explain filters.
- Explain quarantined items.
- Describe phishing protection.
- Explain spam confidence levels.
- Explain Microsoft Defender for Office 365.