How to detect and block QR code phishing using Microsoft Defender for Office 365

QR coding phishing is a risk that is being actively exploited globally. This attack hides URLs within QR codes and redirects users to malicious sites. This post will explore how Microsoft Defender for Office 365 (MDO) tackles QR code phishing and how you can combine email security methods to safeguard your Microsoft 365 tenant. You…

Mail flow reports in the Microsoft 365 Defender portal

The new Microsoft 365 Defender portal includes some email-related reports that have been moved from the old Security Center. In this article, you will learn about the reports available in the new and the old portal. This will help you manage your tenant in an organized manner. In this post, I explain the details of…

Reply All Storm Protection settings in Microsoft 365

Reply All storms have been a nuisance that was left unchecked for a long time. Microsoft has finally decided to crack down on this rather reprehensible aspect of Exchange. In this article, you will be introduced to the Reply All Storm Protection component of Microsoft 365. You will also learn the tenant-level settings that you…

Understanding the Microsoft 365 Threat protection status report

The Microsoft 365 Threat protection status report is an amalgamation of several Exchange Online security reports that contain information about malicious messages detected by Exchange Online Protection (EOP) and Office 365 ATP. This article gives an overview of the Threat protection status report. You may read it here.

Taking action in Microsoft 365 Threat Explorer

In my last post, I outlined how you can identify malicious items in Microsoft 36 Threat Explorer. In today’s post, we’ll take a look at the possible actions you can take once you have found suspicious emails. You can read the post here.

Microsoft 365 Threat Explorer: Finding malicious emails

In this first post of two, you will be introduced to Microsoft 365 Threat Explorer. In my first post, I will explain how you can find malicious emails. In a follow-up post, I will outline the different options you have to neutralize suspicious items. You can read the article here.