Instead of clicking on a phishing link, suppose the user is searching the web and clicks on a website that attempts to install malware on your organization's device in what we call a drive-by infection. The user's personal email may contain malicious phishing links, that once clicked, will install malware to devices within your organization. Suppose a user is checking his or her private email account in an Internet browser installed on your organization's equipment. But, we need to also consider another phishing attack vector. The previous blog in this series discusses how to configure ATP Safe Links, ATP Safe Attachments, and ATP Anti-Phishing policies (features within Office 365 ATP) to protect links in email and Office files in Office 365. Within this blog series we are setting up a variety of locks that a phishing attack will need to pick for a successful email phishing attack. Part 11: Monitor Phishing and SPAM Attacks in Office 365 Part 10: Deploy and Enforce Smart Screen for Microsoft Edge, Microsoft Internet Explorer and Google Chrome Part 9: Deploy ATP Safe Attachment Policies Part 7: Deploy ATP Anti-Phishing Policies Part 6: Deploy Outlook Plug-in to Report Suspicious Emails Part 5: Define Country and Region Logon Restrictions for Office 365 and Azure Services Part 3: Deploy Multi Factor Authentication (MFA) Part 2: Training Users with the Office 365 Attack Simulator Part 1: Customize the Office 365 Logon Portal Introduction: Enhance Your Organization's Security Posture This guide is written for system administrators with skills ranging from beginner to expert. By implementing some or all of these items, an organization will increase their security posture against phishing email attacks designed to steal user identities. The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |