How to set up Office 365 advanced threat protection and security?
Answer
Setting up Microsoft Office 365 Advanced Threat Protection (now called Microsoft Defender for Office 365) requires configuring multiple security layers to protect against malware, phishing, and other email-based threats. The process involves enabling core features like Safe Attachments, Safe Links, and anti-phishing policies through the Microsoft 365 Defender portal, with options for both preset and custom configurations. Organizations should start by assessing their subscription plan, as ATP is only available in higher-tier plans like Office 365 Enterprise E5, Education A5, or Microsoft 365 Business, or as a separate add-on [10]. The setup follows a structured approach: first enabling default protections, then customizing policies based on organizational needs, and finally verifying configurations through the Defender portal or PowerShell.
Key steps and considerations include:
- Accessing the Defender portal via https://security.microsoft.com to configure threat policies under Email & Collaboration > Policies & Rules [4]
- Choosing between Standard and Strict security presets for anti-malware, anti-spam, and anti-phishing policies, with Strict recommended for high-risk environments [1]
- Enabling Safe Attachments and Safe Links as critical components, with Safe Attachments scanning email attachments in a virtual environment and Safe Links protecting against malicious URLs [4]
- Verifying licensing requirements, as ATP features are not available in lower-tier plans like Office 365 A1 without additional subscriptions [10]
Configuring Microsoft Defender for Office 365
Core Protection Layers and Initial Setup
Microsoft Defender for Office 365 operates through a multi-phase threat protection stack, with initial setup focusing on enabling foundational protections. The process begins in the Microsoft 365 Defender portal (https://security.microsoft.com), where administrators navigate to Email & Collaboration > Policies & Rules > Threat policies to access configuration options [4]. Before customizing policies, verify that your organization鈥檚 subscription includes Defender for Office 365, as it is only available in plans like Office 365 Enterprise E5, Education A5, or Microsoft 365 Business, or as a standalone add-on for lower-tier plans [10].
The protection stack is divided into four phases, each requiring specific configurations:
- Edge Protection: Automatically blocks malicious traffic using IP/domain reputation checks and directory-based filtering. No manual setup is required, but administrators should monitor blocked connections via the Threat Explorer in the Defender portal [2].
- Sender Intelligence: Relies on email authentication protocols (SPF, DKIM, DMARC) and impersonation detection. Configure these in Threat policies > Rules > Anti-spoofing and Anti-phishing sections [2].
- Content Filtering: Uses antivirus scanning, heuristic analysis, and machine learning to detect threats in email content. Enable this via Anti-malware policies under Threat policies [2].
- Post-Delivery Protection: Includes Safe Links and Safe Attachments, which require separate policy creation (detailed in later sections) [2].
For organizations new to Defender for Office 365, Microsoft recommends starting with preset security policies rather than custom configurations. These presets align with two protection levels:
- Standard: Balances security and usability, suitable for most organizations. Includes basic malware and phishing protection with moderate false-positive rates [1].
- Strict: Aggressive filtering for high-risk environments, with higher false-positive potential but stronger defense against advanced threats [1].
To apply a preset:
- Navigate to Threat policies > Preset Security Policies.
- Select Standard or Strict and click Apply to all recipients (or specify user groups).
- Review the summary of enabled protections, which includes anti-phishing, anti-malware, and Safe Links/Attachments baselines [1].
Configuring Safe Attachments and Safe Links
Safe Attachments and Safe Links are the two most critical components of Defender for Office 365, providing real-time protection against malicious files and URLs. Unlike basic Exchange Online Protection, these features use advanced techniques like virtual detonation (for attachments) and time-of-click URL scanning (for links) [4].
Safe Attachments Setup
Safe Attachments scans email attachments in a isolated virtual environment before delivery, blocking malicious files even if they bypass traditional antivirus. To configure:
- In the Defender portal, go to Email & Collaboration > Policies & Rules > Threat policies > Safe Attachments [8].
- Click Create to start a new policy. Name the policy (e.g., "Safe Attachments - All Users") and specify the recipients (apply to all domains or select specific users/groups).
- Under Safe Attachments unknown malware response, choose one of the following actions for detected threats: - Block: Prevents the email from reaching the recipient (recommended) [8]. - Replace: Delivers the email with the attachment removed and a notification [8]. - Monitor: Delivers the email but logs the threat for review [8].
- Enable Redirect attachments to Microsoft for scanning to ensure all files are analyzed, including those in SharePoint, OneDrive, and Teams [8].
- Set the policy priority if multiple policies exist (lower numbers = higher priority) [8].
- Review and save the policy. Verification can be done by sending a test email with a known malicious file (e.g., EICAR test file) to confirm blocking [8].
Key considerations for Safe Attachments:
- Licensing: Requires Microsoft Defender for Office 365 Plan 1 or Plan 2. Plan 2 includes additional features like detonation analysis for SharePoint/OneDrive files [8].
- Performance Impact: Scanning may delay email delivery by a few seconds, though Microsoft states this is typically unnoticeable [8].
- Exceptions: Exclude specific file types or senders if false positives occur, but use cautiously to avoid security gaps [8].
Safe Links Setup
Safe Links protects users from malicious URLs by scanning links at the time of click, even if the email was delivered earlier. Configuration steps:
- In the Defender portal, navigate to Email & Collaboration > Policies & Rules > Threat policies > Safe Links [7].
- Click Create and name the policy (e.g., "Safe Links - All Users").
- Select the recipients (apply to all or specific groups). For granular control, create multiple policies for different departments [7].
- Under URLs and click protection, enable the following: - Check a list of known, malicious links: Blocks access to URLs on Microsoft鈥檚 threat intelligence list [7]. - Scan URLs in email messages: Applies to links in email bodies and attachments [7]. - Scan URLs in Office documents: Extends protection to links in Word, Excel, and PowerPoint files [7]. - Apply Safe Links to email sent within the organization: Recommended to prevent internal phishing attacks [7].
- Under Action for unknown or malicious URLs, choose: - On: Blocks the URL and displays a warning page (recommended) [7]. - Off: Allows the URL but logs the event (not recommended) [7].
- Set the policy priority and save. Verify by sending a test email with a known malicious URL (e.g., from a phishing simulation tool) [7].
Safe Links best practices:
- Cover All Entry Points: Enable Safe Links for Teams, Office apps, and SharePoint/OneDrive if using Plan 2 [7].
- Custom Block Pages: Use the Custom notification option to direct users to internal security training if they click a blocked link [7].
- Exclusions: Avoid excluding domains unless absolutely necessary, as this creates security blind spots [7].
- Reporting: Monitor clicked URLs in Threat Explorer to identify phishing trends [7].
Anti-Phishing and Advanced Policies
While Safe Attachments and Safe Links address file and URL-based threats, anti-phishing policies target impersonation and credential theft attempts. Defender for Office 365 includes specialized protections like impersonation detection, domain spoofing prevention, and mailbox intelligence to identify unusual sender patterns [2].
Anti-Phishing Policy Configuration
- In the Defender portal, go to Email & Collaboration > Policies & Rules > Threat policies > Anti-phishing [3].
- Click Create and name the policy (e.g., "Anti-Phishing - Executives").
- Select the recipients. For high-value targets (e.g., executives, finance teams), create dedicated policies with stricter settings [3].
- Under Impersonation, enable: - Protect against impersonation of your domains: Blocks emails spoofing your organization鈥檚 domains [3]. - Protect against impersonation of external domains: Add domains of partners or frequently impersonated entities (e.g., Microsoft, banks) [3]. - Mailbox intelligence: Uses AI to detect unusual sender behavior (e.g., a colleague suddenly requesting sensitive data) [2].
- Under Actions, choose: - Quarantine the message: Recommended for high-confidence phishing [3]. - Redirect to another email address: Useful for security teams to review suspicious emails [3].
- Enable Spoof intelligence, which automatically investigates and blocks spoofed senders [2].
- Save the policy and prioritize it above less strict policies.
Quarantine and User Reporting
Defender for Office 365 includes quarantine capabilities to isolate suspicious emails and allow administrators or users to review them:
- Configure quarantine policies under Threat policies > Quarantine policies [1].
- Set permissions for who can release quarantined emails (admins only or end-users) [1].
- Enable end-user spam notifications to alert users when emails are quarantined [1].
- Customize quarantine retention periods (default is 15 days for spam, 30 days for phishing) [1].
Advanced Threat Protection Features
For organizations with Defender for Office 365 Plan 2, additional features include:
- Threat Explorer: A real-time dashboard to investigate emails, URLs, and attachments flagged as threats. Accessible under Reports > Explorer [2].
- Automated Investigation and Response (AIR): Automatically investigates and remediates threats using playbooks. Configure under Incidents & alerts > Automated investigation [4].
- Attack Simulation Training: Runs phishing simulations to train employees. Found under Email & Collaboration > Attack simulation training [3].
Verification and Ongoing Management
After initial setup, verification ensures policies are functioning as intended:
- Test Emails: Send emails with known threats (e.g., EICAR test file for malware, phishing simulation links) to confirm blocking [7].
- Threat Explorer: Monitor blocked threats in real-time under Reports > Explorer. Filter by policy type (e.g., Safe Links, Anti-phishing) [2].
- PowerShell: Use cmdlets like
Get-SafeAttachmentPolicyorGet-SafeLinksPolicyto verify policy settings [7]. - User Feedback: Encourage users to report false positives/negatives via the Report Message add-in for Outlook [1].
Ongoing management tasks include:
- Regular Policy Reviews: Adjust policies based on threat trends (e.g., increase Strict preset usage during high-risk periods) [1].
- Incident Response: Use Threat Explorer and AIR to investigate and remediate breaches [2].
- User Training: Combine ATP with security awareness programs to reduce phishing success rates [3].
- License Audits: Ensure all protected users have valid Defender for Office 365 licenses, as unlicensed users will not receive ATP protections [10].
Sources & References
learn.microsoft.com
learn.microsoft.com
learn.microsoft.com
learn.microsoft.com
Discussions
Sign in to join the discussion and share your thoughts
Sign InFAQ-specific discussions coming soon...