Defending Exchange Online
Written by John Gruber
Published on Sep 28, 2022
Last Updated on Sep 28, 2022
- Where do suspicious emails go
- Which users should you tell your boss can receive the attack simulation fake threats
- Block and track any access to the GitBit.org domain
- What two places can you go to review the missing attachments
- Track user clicks on any links to gitbit.org
- What is a prerequisite for running an Attack simulator
- Phishing email messages must be quarantined if the messages are sent from a spoofed domain
- Block malware.gitbit.org from being opened from within an email or any Office app
- reconfigure the email filter to deliver any emails that contain malware without the attachment