Skip to content
Endpoint security
Initializing search
Home
Defender
Sentinel
Tools
Guides
Blog
SecOptimized
Home
Defender
Defender
Tools
Tools
Endpoint
Endpoint
Endpoint security
Endpoint security
Attack surface reduction
Settings
Settings
Advanced features
Office 365
Office 365
Investigations
Explorer
Review
Campaigns
Threat tracker
Exchange message trace
Attack simulation training
Policies and rules
Policies and rules
Threat Policies
Threat Policies
Preset Security Policies
Configuration analyzer
Anti-phishing
Anti spam
Anti spam
Anti-spam Inbound
Anti-spam Outbound
Connection Filter Policy
Anti-malware
Safe Attachments
Safe Links
Tenant Allow/Block Lists
Email authentication settings
Advanced delivery
Enhanced filtering
Quarantine policies
Alert policies
Alert policies
Activity alerts
Settings
Settings
User reported settings
User tags
Priority account protection
Microsoft Teams protection
Permissions
Timing
Email Authentication
Cloud Apps
Cloud Apps
Cloud discovery
Cloud app catalog
OAuth apps
Activity log
Policies
Policies
Policy management
Policy templates
Settings
Settings
System
System
About
Organization details
Mail settings
Scoped deployments and privacy
IP address ranges
User groups
API tokens
SIEM agents
Playbooks
My account
My account
My email notifications
Cloud Discovery
Cloud Discovery
Score metrics
Snapshot reports
Continuous reports
Automatic log upload
App Tags
Exclude entities
Microsoft Defender for Endpoint
User enrichment
Anonymization
Delete data
Connected apps
Connected apps
App connectors
Conditional Access App Control apps
Information Protection
Information Protection
Admin quarantine
Microsoft Information Protection
Azure security
Files
App governance
App governance
Service status
Reports
Reports
Attack Surface Reduction
Sentinel
Sentinel
General
General
Overview
Logs
News & guides
Search
Threat management
Threat management
Incidents
Workbooks
Hunting
Notebooks
Entity behavior
MITRE ATT&CK
SOC Optimization
Content management
Content management
Content hub
Community
Configuration
Configuration
Data connectors
Analytics
Watchlist
Settings
Sentinel Pricing
Tools
Tools
Microsoft Zero Trust Persona Access Card
Guides
Guides
Archive
Archive
2025
Categories
Categories
Conditional access
Phishing
Threats
Blog
Blog
Archive
Archive
2025
2024
Categories
Categories
Conference
Features
KQL
Kusto
Microsoft changes
Preview
Site update
Endpoint security
Back to top