Home » 360 View » Microsoft Office 365 » How to Prevent and Monitor Impersonation Based Phishing Attacks
Impersonation is where the sender or the sender’s email domain in a message looks similar to a real sender or domain. Microsoft Defender for Office 365 (previously known as Office 365 Advanced Threat Protection) helps protect against impersonation based phishing attacks. The videos below show you how to create the protection policy to prevent such attacks, create an alert policy to monitor such attacks and a couple of examples.
Creating a custom anti-phishing policy in the Security & Compliance Center creates the anti-phish rule and the associated anti-phish policy at the same time using the same name for both.
When you’re finished, click Next.
After you select the condition, a corresponding dropdown appears with an Any of these box.
To add an additional condition, click Add a condition and select a remaining value under Applied if.
To add exceptions, click Add a condition and select an exception under Except if. The settings and behavior are exactly like the conditions.
When you’re finished, click Next.
After you create the anti-phishing policy with these general settings, use the instructions in the next section to configure the protection settings in the policy.
Microsoft 365 Business is an integrated solution, bringing together the best-in-class productivity of Office 365 with advanced security and device management capabilities to help safeguard your business. If your IT Security Team is not using Microsoft 365 Business, Advanced Threat Protection or just not sure how to use it to its full potential, give us a call. We’ll show you how to use Microsoft 365 Business, Office 365, Azure or Windows Defender Advanced Threat Protection in a smart way to ensure that you are protected against advanced attacks, malware threats and data breaches while taking advantage of the secure productivity suite in Office 365.