Summary and knowledge check

Completed

In this module, you learned how to plan, implement, and configure policies to protect your organization from malware, spam, and phishing.

Now that you have completed this module, you should be able to:

  • List Microsoft Defender for Office 365 threat protection features.
  • Explain filters.
  • Explain quarantined items.
  • Describe phishing protection.
  • Explain spam confidence levels.
  • Explain Microsoft Defender for Office 365.

Check your knowledge

1.

Which of the following threat protection features require a subscription?

2.

What setting should you configure to skip spam filtering for all incoming messages, when they come from source email servers you've identified?

3.

Who can view a quarantined message?

4.

Which tool should you use to create fake phishing messages and send them to internal users as an education aid?

5.

What is the default action for a message with an SCL of 5?

6.

With Safe Links, what happens when a user selects a blocked URL?