Please wait while the virtual machine loads. Once loaded, youmay proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome ofperforming the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password

Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@
[email protected]Microsoft 365 Password:#HSP.ug?$p6un
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support only:
Lab instance:11122308









You need to protect against phishing attacks. The solution must meet the following requirements:
Phishing email messages must be quarantined if the messages are sent from a spoofed domain.
As many phishing emailmessages as possible must be identified.
The solution must apply to the current SMTP domain names and any domain names added later.
To complete this task, sign in to the Microsoft 365 admin center.
Correct Answer:
See explanation below.
Explanation
1. After signing in to the Microsoft 365 admin center, selectSecurity,Threat Management, Policy, thenATP Anti-phishing.
2. SelectDefault Policyto refine it.
3. In theImpersonationsection, selectEdit.
4. Go toAdd domains to protectand select the toggle to automatically include the domains you own.
5. Go toActions, open the drop-downIf email is sent by an impersonated user, and choose theQuarantine messageaction.
Open the drop-downIf email is sent by an impersonated domainand choose theQuarantine message action.
6. SelectTurn on impersonation safety tips. Choose whether tips should be provided to users when the system detects impersonated users, domains, or unusual characters. SelectSave.
7. SelectMailbox intelligenceand verify that it's turned on. This allows your email to be more efficient by learning usage patterns.
8. ChooseAdd trusted senders and domains. Here you can add email addresses or domains that shouldn't be classified as an impersonation.
9. ChooseReview your settings, make sure everything is correct, select , thenClose.
Reference:
https://support.office.com/en-us/article/protect-against-phishing-attempts-in-microsoft-365-86c425e1-1686-430
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view