Through Advanced Threat Protection or ATP.
In Office 365 Cloud App Security.
And auto-repair hidden issues with Flow rules.
Through Azure Active Directory.
“In early 2018, I noted a much more realistic quality of phishing emails. The login pages that came after the click was also very realistic. If a user didn’t happen to notice the odd URL, there’d be no way they could resist logging in. We quickly made the decision to use PhishHunter to automatically disable compromised accounts.”
Alex Kennedy Director of Infrastructure & Technical Services at Volusia County Schools
Tactics and techniques used to manipulate or take advantage of victims include phishing (92%), pretexting (4%), and bribery/solicitation (3%). Stats like these and increased demand on internal IT personnel caused us to build a solution to help automate threat protection.
Microsoft PhishHunter for M365 makes your life easier by using Microsoft's Cloud App Security and other Microsoft applications like Power BI, Azure, and Flow to bring awareness of high priority phishing scams as well as breaches.
When it comes to preventing a breach, data is king. Microsoft PhishHunter for M365 takes aim at criteria that is specified by an Admin. Some areas to keep in mind are IP address, proxy, location, timing, etc.
October 10, 2022
October 10, 2022