Table of Contents
- The Security Wild West
- Basic Components of Defender for Office 365
- Basic Checks and Balances
- Basics of Configuration
- Common Troubleshooting
- Message Quarantine Procedures
- Strengthening Email Security
- Catching What Passed the Initial Controls
- Incidents and Security Operations
- Magnifying the Unseen - Threat Intelligence and Reports
- Integration and Artificial Intelligence
- User Awareness and Education

