Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.

By configuring the Strict preset security policy, Microsoft Defender for Office 365 will manage and maintain these security controls for you, ensuring robust protection against threats.

To assign Strict preset security policies to users using the Microsoft Defender Security Center portal, you can follow these general steps:

1.Login to the Microsoft Defender portal using your organization’s credentials.

https://security.microsoft.com/

2.Expand the Email & collaboration on the Microsoft Defender page and select Policies & rules.

3.Select Threat policies on the Policies & rules page.

4.Select Preset Security Policies on the Threat policies.

5.On the Preset security policies page, click Manage protection settings of Strict protection.

6. On the Apply Exchange Online Protection page, select All recipients and click Next. You can also select the Exclude these recipients option and configure the recipient exceptions.

7. Select All recipients on the Apply Defender for Office 365 Protection page and click Next. You can also select the Exclude these recipients option and configure the recipient exceptions.

8.Click Next on the Impersonation protection page and define protect against impersonation techniques.

9.On the Add email addresses to flag when impersonated by attackers page, add internal and external senders protected by user impersonation protection and click Next.

Note:

In the Strict preset security policy, you can specify 350 users for user impersonation protection.

10.On the Add domains to flag when impersonated by attackers page, add internal and external domains protected by domain impersonation protection and click Next.

Note:

In the Strict preset security policy, you can specify a maximum of 50 custom domains for domain impersonation protection.

11. On the Add trusted email addresses and domains to not flag as impersonation page, enter the sender email addresses and domains you want to exclude from impersonation protection and click Next. To ensure that emails from trusted sources are not mistakenly flagged as impersonation attempts in Microsoft Defender for Office 365, you can add these trusted email addresses and domains to the Safe Senders and Safe Domains lists.

Note:

Trusted domain entries don’t include subdomains of the specified domain. You need to add an entry for each subdomain.

12.Select Turn on the policy when finished on the Policy mode page and click Next.

13.Click Confirm on the Review page.

14.Ensure Strict protection updated and click Done.

15.Ensure Standard protection is on.

I hope you enjoy this post.

Cary Sun

X: @SifuSun

Web Site: carysun.com

Blog Site: checkyourlogs.net

Blog Site: gooddealmart.com

Amazon Author: Amazon.com/author/carysun