Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Exchange Online»How to protect against ransomware?
    Exchange Online

    How to protect against ransomware?

    Peter KlapwijkBy Peter KlapwijkSeptember 15, 2016Updated:December 3, 201913 Mins Read

    ransomwareRansomware is shaping up to be the most important threat from the hacker community this year. Ransomware is malware, often received via a malicious email, which encrypts your files and making them inaccessible by for example opening the email attachment you thought it was an invoice from one of your suppliers. To decrypt your files you have to pay an amount of money to the hacker, usually by bitcoins.

    After paying the amount of money it is not guaranteed your files will be decrypted. So you have to restore your files from backup (I hope you do have a good backup solution) or use previous versions when using a Windows file share or SharePoint library (but I have seen examples of ransomware which encrypted the previous versions as well). What ever solution you have to restore your data file, it will cost you and your company a lot of time and money to get access to your files.

    You try hard to avoid a situation being infected by ransomware, viruses etc. by running an anti-virus solution to scan inbound email and running anti-virus software on the users computers. You instruct employees not to open malicious emails, but one moment of not paying attention and an employee may activate ransomware on your network. Known ransomware will be noticed and deleted by the anti-virus software, but zero-day exploits won`t and may cause a lot of damage on your network. Microsoft provides a great solution against these zero-day exploits received via email with Exchange Online Advanced Threat Protection.

    Exchange Online Advanced Threat Protection (ATP) provides users additional protection against specific types of advanced threats. ATP will protect against unsafe attachments even if their signatures are unknown with Safe Attachments. exchange-online-advanced-threat-protectionAll suspicious content goes through a real-time behavioral malware analysis that uses machine learning techniques to evaluate the content. Unsafe attachments are sandboxed in a detonation chamber before being send to the recipient.
    But ATP will not only protect the emails against malicious attachments, it will also protect against malicious links in your emails. Safe Links examines the url`s and rewrites the url`s. At the time a user clicks on an unsafe url he is warned not to visit the site or the site is blocked. This real-time scan of the url is done every time the url is clicked on, so you will be protected even if the destination of the url is changed since receiving the email.
    For you as an administrator you get rich reporting tools as part of ATP to get insights into who is being targeted in your organization.

    Exchange Online Advanced Threat Protection is available for every company who uses Exchange Online Protection (EOP) to filter inbound email. Office 365 users are using EOP by default  and on-premises can also purchase EOP and ATP for scanning their inbound email.

    If you are interested how ATP works, watch this video in which Shobhit Sahay and Jeremy Chapman show you the capabilities of ATP in more depth.

    https://www.youtube.com/watch?v=Of-ZH1Z0QbE

    Exchange Online Microsoft 365 Office 365 Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    March 29, 2019

    Azure AD Pass-Through Authentication and Seamless Single Sign-on

    December 12, 2016

    Welcome to my blog!

    September 10, 2016
    View 1 Comment

    1 Comment

    1. Hildegarde on March 22, 2018 07:13

      I visit day-to-day a few web pages and websites
      to read posts, however this blog gives quality based articles.

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Nathalie on How to update win32 applications with Microsoft Intune
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}