Episode Details

Back to Episodes
Defender for M365 Isn't What You Think

Defender for M365 Isn't What You Think

Published 7 months ago
Description
Ever wonder why phishing emails still slip past your filters, even with Defender for M365 turned on? You're not alone. Today, we're breaking down exactly how Safe Links, ATP, and phishing detection actually work together—or miss the mark—inside Microsoft 365. Think you've set up everything just right? Let's see where threats can still find a way through, and why understanding the system as a whole makes all the difference for your business security.Unpacking the Defender for M365 Maze: Why Features Alone Don’t Save YouIf you’ve ever scrolled through the Defender for M365 dashboard, you know the feeling—it kind of looks like a collection of toggles and checkboxes. There’s a certain comfort in seeing all those switches flipped to “on.” But if Defender is as simple as turning everything on and calling it a day, why are so many companies still announcing, not so quietly, that another phishing attack got through last week? The truth is, Defender isn’t plug-and-play. And for most admins, that realization hits around the third or fourth incident ticket about a “strange email” in the payroll inbox.Let’s run through a scenario. Imagine it’s just another Monday morning. Someone in your org logs into Outlook and opens an email that looks routine: the sender is HR, the subject is about benefits, and there’s an Excel attachment—classic stuff. But here’s where things spiral. What started as an ordinary, boring HR notice is actually the prelude to a security headache. Suddenly, somebody’s asking why payroll details are showing up on the dark web. So, what happened? The answer isn’t as simple as “the system didn’t work.” It’s more like, “the system wasn’t used the way it was meant to be.”A lot of IT folks believe once they’ve checked off Safe Links, ATP, anti-phishing, and maybe a few transport rules, their job is done. Step two is looking up “best practice policies M365” and pasting settings found on page two of a blog from 2019. But the data doesn’t back up that confidence. According to Microsoft’s own threat reports, phishing remains the top attack vector—yes, even for tenants with Defender for M365 fully licensed. So what’s the disconnect?Defender for M365 brings together several moving parts, each with a special role. Safe Links is meant to scan URLs in emails and rewrite them so bad sites get blocked if you click at any point—even weeks after delivery. ATP, or Advanced Threat Protection, is Microsoft’s umbrella term for things like Safe Attachments and anti-phishing policies. Then you have the actual phishing detection engine, which looks at sender behavior, message patterns, and countless little red flags. And we can’t forget old-school transport rules, which allow for custom logic—block this, allow that, flag something else. All these features are layered, but the relationship is less like bricks in a wall and more like a tangled garden hose: sometimes the right things get through, sometimes they don’t, and occasionally, water sprays out the side.Here’s how it’s supposed to work: Safe Links rewrites and inspects the URLs, scanning for known-bad destinations. ATP runs through the attachments using detonation and sandboxing, looking for anything malicious hidden inside macros or embedded code. Phishing detection kicks in by examining everything from sender metadata to the style and wording of the email. Transport rules act last, usually as a kind of catch-all. It sounds air-tight until you realize these pieces aren’t always in sync. There are overlaps, like both ATP and transport rules trying to filter based on similar criteria, and then there are gaps—a cleverly crafted phishing email might pass a Safe Links check because the link wasn’t known yet, and ATP never flags the plain text because it didn’t include an attachment.A common tripwire is default policies. Many organizations leave phishing and spam control settings exactly as provided on day one. The problem? These defaults are intentionally broad. They don’t fit your organization’
Listen Now

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us