This article examines the different components of Defender for Office 365, and how you can customize the configuration beyond the baselines to enhance the relevance and impact the policies have on your tenant. The most important aspects to review when modifying the configuration from baselines and the reasons to consider each configuration option are highlighted, but they don’t take you all the way. The items listed here are a subset of what’s available, but when combined with the baselines will help you to bring your Defender implementation to the next level.
How to use Exchange Online mail flow rules to improve the effectiveness of your EOP spam filtering and protect Office 365 users from phishing attacks.
A curious case of legitimate Azure Active Directory Identity Protection weekly digest emails being quarantined by Exchange Online Protection when international spam filtering is enabled.
Here’s my experience using the Advanced Threat Protection features in Exchange Online Protection to protect my Office 365 tenant.
How to plan, test and implement changes to MX records and inbound email traffic routes in an Exchange Server environment.