You have a Microsoft 365 subscription and Microsoft 365 E5 licenses assigned to your users.
You are using Microsoft Defender for Office 365, and you configure a safe attachment policy for your Sales department.
Tom is a member of the Marketing department, Lisa is a member of the Sales department.
Tom receives an email with an attachment from an external user.
He forwards the email and the attachment to Lisa.
Who is protected by the Safe attachment policy?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: B
Since the Safe attachment policy is applied to only the Sales department, only Lisa will be protected by the policy.
Option A is incorrect.
Tom is not protected by the policy.
When he forwards the mail and attachment to Lisa, the attachment will be handled by the policy before being delivered to Lisa.
Option C is incorrect.
Only Lisa is protected by the policy.
Option D is incorrect.
Lisa is protected by the policy.
To know more about Safe attachment policy, please refer to the link below:
In this scenario, the Safe attachment policy has been configured for the Sales department. This policy is designed to provide additional protection for email attachments by checking them for malicious content before allowing them to be delivered to the intended recipient.
When Tom receives an email with an attachment from an external user and forwards it to Lisa, the email and attachment will be processed by the Safe attachment policy. Since Lisa is a member of the Sales department, the Safe attachment policy will be applied to her email and attachment.
Therefore, the correct answer is B. Lisa is the one who is protected by the Safe attachment policy, as the policy is specifically configured for the Sales department to which she belongs.
Tom, on the other hand, is not protected by the Safe attachment policy in this scenario, as he is a member of the Marketing department and the policy has not been configured for that department.
It's important to note that while the Safe attachment policy provides an additional layer of protection against malicious attachments, it is not foolproof and may not catch all threats. It's always a good practice to be cautious when opening email attachments, even if they appear to be from a trusted source.