Table of Contents

Work With Us

Automated Threat Protection

PhishHunter-03

Prevention

Through Advanced Threat Protection or ATP.

PhishHunter-04

Detection

In Office 365 Cloud App Security.

PhishHunter-05

Notification

And auto-repair hidden issues with Flow rules.

PhishHunter-06

Remediation

Through Azure Active Directory.

“In early 2018, I noted a much more realistic quality of phishing emails. The login pages that came after the click was also very realistic. If a user didn’t happen to notice the odd URL, there’d be no way they could resist logging in. We quickly made the decision to use PhishHunter to automatically disable compromised accounts.”
Volusia County Schools

Alex Kennedy Director of Infrastructure & Technical Services at Volusia County Schools

The Details

Why Was Microsoft PhishHunter for M365 Built?

Tactics and techniques used to manipulate or take advantage of victims include phishing (92%), pretexting (4%), and bribery/solicitation (3%). Stats like these and increased demand on internal IT personnel caused us to build a solution to help automate threat protection.

 

PhishHunter's Integration with Microsoft

Microsoft PhishHunter for M365 makes your life easier by using Microsoft's Cloud App Security and other Microsoft applications like Power BI, Azure, and Flow to bring awareness of high priority phishing scams as well as breaches.

 

PhishHunter's Data Architecture

When it comes to preventing a breach, data is king. Microsoft PhishHunter for M365 takes aim at criteria that is specified by an Admin. Some areas to keep in mind are IP address, proxy, location, timing, etc.

 

Video: PhishHunter Explained

Resources

The Support Life Cycle For All Active Skype For Business Products

On Tuesday, Microsoft announced that Skype for Business Online will be retired on July 31, 2021, and after that date the service will no longer be accessible. Between now and then, current Skype for...

Optimizing Network Performance for Office 365

Networking teams are finding that traditional hub and spoke, best effort network designs do not provide optimal performance for Office 365. This is especially true for the real-time traffic of Skype...

Who Should “Own” an Office 365 Tenant?

We periodically get this question, especially when consulting larger organizations who have multiple administrators handling Active Directory, Exchange, and/or SharePoint. Some ask as they are just...

PhishHunter

 

ref:_00D80KtFf._5000y1WwWQD:ref