Prevent phishing attacks with these Microsoft 365 Defender features

29 Oct 2021

blog

Microsoft is a provider of powerful and intuitive tools that improve efficiency,

productivity, and security. And as phishing attacks become more sophisticated and prevalent, Microsoft is taking steps to protect its users, one of which is releasing powerful cybersecurity tools via Microsoft 365 Defender. Here are some of them.

1. Anti-phishing

The most dangerous types of phishing scams involve emails that are disguised to appear like it’s from an entity. An attacker may use cunning tactics, such as referring to the victims by their nickname. They may even take over actual email accounts and use these to trick their victims.

Through machine learning, Defender creates a list of contacts that users normally communicate with. It then employs an array of tools, including standard anti-malware solutions, to differentiate acceptable from suspicious behaviors.

2. Anti-spam

Since common phishing campaigns utilize spam emails to victimize people, blocking spam is a great way to protect your company from such attacks.

Defender’s anti-spam technology addresses the issue by examining both an email’s source and its contents. If an email is found to come from an untrustworthy source or has suspicious contents, it is automatically sent to the Spam folder. What’s more, this feature regularly checks the activity of people in your company to ensure that none of them sends out spam emails.

3. Anti-malware

Malware, such as ransomware and spyware, can spread via phishing emails. Ransomware locks systems and files from users until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, and taking screenshots, among other methods.

Defender employs a multilayered defense against both known and unknown types of malware. This covers the different stages of email transmission security, including filtering potentially harmful attachments, and real-time threat response. Microsoft also regularly deploys new definition updates to keep its defenses armed against the latest threats.

4. Sandbox

It’s not uncommon for some users to accidentally open a malicious email attachment, especially if they’re not careful.

Defender resolves this issue by opening all attachments in a sandbox first. This sandbox is an isolated environment, so if the attachment is malicious, it will only infect the sandbox and not your actual system. Microsoft will then warn you not to open the file. If it’s safe, you will be able to open it normally.

5. Safe Links

Instead of attachments, some phishing emails contain URLs that lead to fraudulent websites — often made to look like legitimate ones — that require victims to provide their personal information. Some of these URLs also lead to pages that download malware into a computer.

Through a process called URL detonation, Safe Links protects users by scanning the links in their emails and checking for malicious behavior, such as the transmission of malware. If the link opens a malicious website, Microsoft Defender will warn users not to visit it. Otherwise, users can open the destination URL normally. Even so, the service will rescan the link in the succeeding days and report any suspicious changes.

What’s great about Safe Links is that it also scans links in emails from people within your company and works on files uploaded to Microsoft Teams and SharePoint.

6. User Submissions

Defender allows you to set a specific mailbox to send emails you deem a threat. The User Submissions feature lets you set criteria for both malicious and safe email and identify mailboxes besides your spam folder to keep these messages in. This feature gives your administrators greater control over which emails to flag and which to report to Microsoft.

7. Enhanced Filtering

If your company uses third-party services to route emails to your on-premises environment before they are sent to Microsoft 365, you will benefit from Enhanced Filtering for Connectors. Defender uses inbound connectors to determine the trustworthiness of email sources. The more complex your routing scenario is, the more likely that an email’s inbound connectors will not reflect its real source.

Enhanced Filtering preserves authentication signals that may have been lost over the course of routing emails. This maximizes the effectiveness of Microsoft 365’s overall filtering capabilities, helping it detect spam and phishing emails.

If you need an email service that promotes efficiency while protecting your business, we can deploy and manage Microsoft 365 for you. Call us today to get started.

CONTACT US TODAY

Swift Chip provides managed IT and cybersecurity services for a wide variety of companies in fields with stringent privacy and compliance requirements.

Contact Us

Contact Info

LOS ANGELES

10100 Venice Blvd, Culver City, CA 90232, United States

[email protected] 310-881-8770
Swift Chip, Inc.
5.0
Based on 9 reviews
powered by Google
Adrianna SmithAdrianna Smith
01:52 27 May 22
The team at Swift Chip is responsive, knowledgeable, and super kind! Anytime I have an issue, they are quick to contact me back. Technology issues can be very overwhelming for a business owner, so having them on my team is super helpful to keeping my business operating smoothly!
Gary RotkopGary Rotkop
19:50 08 May 20
Very knowledgeable and professional staff that responded quickly, understood what I needed and resolved the issue economically. I had a very specific technical issue with an integration. Although AJ did not have specific knowledge of this very esoteric software, he managed to figure it out within minutes as we were discussing the problem. Very impressed. Thanks Swift Chip.
Udi BarkaiUdi Barkai
14:38 12 Oct 18
We have been working with SwiftChip for the last four years and have exceptional experience with these guys. In particular we would like to mention their extensive knowledge and outstanding customer service.
Keith R. SpragueKeith R. Sprague
10:46 22 Apr 16
Ken and his staff are great. They are very knowledgeable and always seem to have the answer. Highly Recommend...
Van HaasVan Haas
16:27 21 Oct 15
Ken May and his team at Swift Chip has always done a great job for me and the clients I refer. They are on the ball and are usually flexible with their schedule. They know their stuff and get it done right!
Tina Reed JohnsonTina Reed Johnson
16:46 25 Oct 12
Ken May is a very personable and responsive business owner, who is always ready to assist with computer and mobile issues. Swift Chip has the knowledge and know-how to get the job done, no matter how big or small.
Ken HowerKen Hower
14:03 09 Nov 11
Swift Chip worked on my wife's laptop and made it run better than ever...better than new! Pricing was more than reasonable...Call Ken May at Swift Chip...he's the man!!!

VENTURA

2140 Eastman Ave, #104 Ventura, CA 93003, United States

[email protected] 805-318-8770
Swift Chip, Inc.
5.0
Based on 7 reviews
powered by Google
Robert BrothersRobert Brothers
22:11 24 May 22
Best IT company I've worked with in the last 20 years. Highly recommended!
Kate BernabeKate Bernabe
00:52 16 Nov 21
Jim DeArklandJim DeArkland
22:34 20 Jun 21
always a positive experience!
Tiara PalazuelosTiara Palazuelos
15:11 18 Sep 20
They respond very quickly an are very professional! I'm very happy with the IT services they've provided!
Eric AndersonEric Anderson
17:25 06 May 19