🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 3
Domain 3 — Module 6 of 9 67%
18 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 3: Microsoft Security Solutions Premium ⏱ ~10 min read

Microsoft Defender for Office 365

Defender for Office 365 protects email, Teams, SharePoint, and OneDrive from phishing, malware, and business email compromise. Learn Safe Attachments, Safe Links, and the P1 vs P2 difference.

What does Defender for Office 365 protect?

☕ Simple explanation

Think of Defender for Office 365 as a security screening station for your mailroom.

Every package (email attachment) gets X-rayed before delivery. Every link on a letter gets checked before you follow it. If someone sends a letter pretending to be your CEO asking for a wire transfer — the screening station flags it.

It doesn’t just protect email, though. It also watches Teams messages, SharePoint files, and OneDrive uploads — anywhere people share content in Microsoft 365.

Microsoft Defender for Office 365 is a cloud-based email and collaboration protection service. It defends against phishing, malware, business email compromise (BEC), and other threats across Exchange Online, Microsoft Teams, SharePoint Online, and OneDrive for Business.

It sits on top of the baseline Exchange Online Protection (EOP) that every Microsoft 365 tenant receives. Defender for Office 365 adds advanced features like detonation-based attachment scanning, real-time URL rewriting, and impersonation detection.

Safe Attachments

Safe Attachments is one of the headline features you need to know for the exam.

How it works: When an email arrives with an attachment, Defender opens that attachment in a secure sandbox (an isolated virtual environment) and watches what happens. If the attachment tries to download malware, modify system files, or phone home to a command-and-control server — it gets blocked before it ever reaches the user’s inbox.

This is called detonation — the attachment is “detonated” safely where it can’t do damage.

Safe Attachments also protects files uploaded to SharePoint, OneDrive, and Teams — not just email.

💡 Exam tip: Safe Attachments vs standard anti-malware

Exchange Online Protection (EOP) includes basic anti-malware scanning that checks attachments against known malware signatures. Safe Attachments goes further by detonating files in a sandbox to catch unknown (zero-day) threats that don’t match any signature yet.

If the exam asks what catches “novel” or “zero-day” malware in email — the answer is Safe Attachments.

Safe Links

Safe Links protects users from malicious URLs — and the timing matters.

The problem: An attacker sends an email with a link that’s clean at delivery time. Hours later, after the email is sitting in the inbox, the attacker weaponises the URL — it now points to a phishing page.

The solution: Safe Links rewrites every URL in the email. When the user clicks, the rewritten URL first checks with Microsoft’s threat database at click-time, not delivery-time. If the link has turned malicious since delivery — the click is blocked.

Safe Links also works in Teams messages and Office documents, not just email.

Anti-phishing policies

Defender for Office 365 includes specialised anti-phishing protection:

  • Impersonation protection: Detects when someone pretends to be a specific person (like your CEO) or a specific domain (like your bank). You configure which users and domains to protect.
  • Mailbox intelligence: Learns each user’s typical email patterns. If someone suddenly receives an email from “your CEO” but the sending pattern doesn’t match — it’s flagged.
  • Spoof intelligence: Identifies when an email’s “from” address doesn’t match the actual sending domain.
💡 Scenario: Alex stops a BEC attack at SecureBank

Director Reyes (CISO) asks Alex to investigate a suspicious email that three employees received.

The email appears to come from “Director Reyes” asking employees to urgently wire money to a vendor. But Defender for Office 365 flagged it:

  • Impersonation detection caught that the sender’s domain was securebnk.com (not securebank.com)
  • Mailbox intelligence noted that Director Reyes never emails these employees directly
  • Safe Links rewrote the “Click here to authorise” URL — when one employee clicked, it was blocked because the destination was a credential-harvesting site

Result: Zero money lost, zero credentials stolen. Alex quarantined the emails and added the spoofed domain to the block list.

Plan 1 vs Plan 2

Defender for Office 365: Plan 1 vs Plan 2
FeaturePlan 1 (P1)Plan 2 (P2)
Safe AttachmentsYesYes
Safe LinksYesYes
Anti-phishing policiesYesYes
Real-time detectionsYesYes
Threat ExplorerNoYes — investigate and hunt email threats
Automated investigation and response (AIR)NoYes — automatically investigate and remediate
Attack simulation trainingNoYes — send fake phishing to test employees
Threat trackersNoYes — track emerging threat campaigns

Simple way to remember: P1 = protection (block bad stuff). P2 = P1 + investigation (find and fix bad stuff that got through) + simulation (test your people).

Threat Explorer

Threat Explorer is a P2 feature that lets security teams investigate email threats after the fact:

  • Search for all emails containing a specific malicious URL
  • See which users received, clicked, or were affected
  • Manually remediate — delete emails from all inboxes, even if they were already delivered
  • Hunt for threats proactively

Alex uses Threat Explorer daily at SecureBank to investigate alerts and clean up any threats that slipped through.

How it fits into Defender XDR

Defender for Office 365 doesn’t work in isolation. Its email signals feed directly into the Defender XDR portal:

  • A phishing email detected by Defender for Office 365 can be correlated with malware detected by Defender for Endpoint on the device that clicked the link
  • All email alerts roll up into unified incidents in the Defender portal
  • Automated investigation in P2 can trigger response actions across the entire XDR stack — not just email

🎬 Video walkthrough

🎬 Video coming soon

Defender for Office 365 — SC-900 Module 6

Defender for Office 365 — SC-900 Module 6

~8 min

Flashcards

Question

What does Safe Attachments do in Defender for Office 365?

Click or press Enter to reveal answer

Answer

Safe Attachments detonates (opens) suspicious email attachments in an isolated sandbox environment. If the attachment behaves maliciously, it's blocked before reaching the user. It also scans files in SharePoint, OneDrive, and Teams.

Click to flip back

Question

How does Safe Links protect users from malicious URLs?

Click or press Enter to reveal answer

Answer

Safe Links rewrites URLs in emails, Teams messages, and Office documents. When a user clicks, the URL is checked at click-time (not just delivery-time) against Microsoft's threat database. This catches links that become malicious after the email was delivered.

Click to flip back

Question

What is the key difference between Defender for Office 365 Plan 1 and Plan 2?

Click or press Enter to reveal answer

Answer

Plan 1 provides real-time protection: Safe Attachments, Safe Links, and anti-phishing. Plan 2 adds everything in P1 PLUS investigation tools (Threat Explorer), automated investigation and response (AIR), and attack simulation training.

Click to flip back

Question

What three anti-phishing capabilities does Defender for Office 365 provide?

Click or press Enter to reveal answer

Answer

1) Impersonation protection — detects someone pretending to be a specific person or domain. 2) Mailbox intelligence — learns normal email patterns and flags anomalies. 3) Spoof intelligence — catches emails where the 'from' address doesn't match the sending domain.

Click to flip back

Knowledge Check

Knowledge Check

SecureBank receives an email with an attachment that contains a new type of malware not yet in any virus signature database. Exchange Online Protection (EOP) doesn't catch it. Which Defender for Office 365 feature is most likely to detect this threat?

Knowledge Check

Alex wants to send a fake phishing email to SecureBank employees to test their security awareness. He also wants to automatically investigate and remediate any real phishing emails that get through. Which Defender for Office 365 plan does he need?

Knowledge Check

An attacker sends an email to 200 SecureBank employees containing a link. The link is safe when the email is delivered but becomes malicious 3 hours later. 15 employees click the link after it turns malicious. What happens?


Next up: Microsoft Defender for Endpoint — protecting the devices where the real work (and real attacks) happen.

← Previous

Defender XDR: The Unified Threat Platform

Next →

Microsoft Defender for Endpoint

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.