You are responsible for securing your organizations Exchange online environment.
To help prevent impersonation attacks, you wish to enable artificial intelligence (AI) as a policy for all users.
What should you configure?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: C.
Option A is incorrect.
This is a notification sent from an organization's legal team to employees instructing them not to delete electronically stored information that may be relevant to a legal case.
Option B is incorrect.
This is a free security baseline offered by Microsoft.
Option D is incorrect.
This is a policy to protect against malicious attachments.
To know more about Mailbox Intelligence and other anti-phishing methods, please refer to the link below:
The correct answer is C. Mailbox intelligence.
Explanation:
Impersonation attacks are becoming increasingly common in today's digital world. To prevent these attacks, you can use artificial intelligence (AI) to monitor email communications and detect suspicious behavior.
One way to do this is by configuring Mailbox intelligence in Exchange Online. This feature uses machine learning to analyze email messages and identify potential threats. It can also detect anomalies in user behavior, such as unusual login activity or email forwarding patterns.
By enabling Mailbox intelligence, you can help prevent impersonation attacks by detecting and blocking suspicious emails before they reach users' inboxes. Additionally, you can configure custom policies and alerts to notify you when potential threats are detected.
Option A, Litigation Hold, is a feature that allows you to preserve email data for legal or compliance purposes. It does not provide any protection against impersonation attacks.
Option B, Security defaults, is a set of preconfigured security settings that can help protect your organization's data. However, it does not include any AI-based protection against impersonation attacks.
Option D, Safe attachment policy, is a feature that scans email attachments for known malware and viruses. While this can help protect against some types of threats, it does not provide any protection against impersonation attacks.
Therefore, the correct answer is C. Mailbox intelligence.