|

Microsoft Defender for Office 365 – Safe Attachments and Safe Links for Small Businesses in Berlin

Email is the primary attack vector for ransomware, business email compromise, and credential phishing against small businesses. Standard Exchange Online Protection (EOP) — included in all Microsoft 365 subscriptions — filters known malware and spam using signature-based detection. Microsoft Defender for Office 365 (MDO, formerly ATP) adds behavioral analysis: detonating attachments in a sandbox before delivery, scanning URLs at click-time rather than delivery time, and applying machine learning to detect impersonation attacks that bypass signature detection. For Berlin SMBs on Business Premium (which includes MDO Plan 1), these capabilities are already licensed — they need to be configured.

Microsoft Defender for Office 365 Plan Comparison

Feature EOP (Base) MDO Plan 1 MDO Plan 2
Anti-spam / Anti-malware
Safe Attachments
Safe Links
Anti-phishing (impersonation) Basic Advanced Advanced
Threat Explorer / Real-time detections Real-time detections Threat Explorer (full)
Attack Simulation Training
Automated Investigation and Response

Business Premium includes MDO Plan 1. Most Berlin SMBs will operate at Plan 1 and access the Microsoft 365 Defender portal (security.microsoft.com) to configure policies.

Safe Attachments

Safe Attachments detonates email attachments in a cloud-hosted sandbox before delivering them to the recipient’s mailbox. A malicious Office document that renders in a real environment triggers execution, behavioral analysis catches the payload, and the email is blocked or delivered with the attachment replaced by a warning.

Key policy settings:

Setting Recommended Value Notes
Safe Attachments unknown malware response Block Block detects and delivers notification instead of attachment
Enable redirect for detected attachments On — redirect to admin mailbox Allows reviewing blocked attachments without exposing recipients
Safe Attachments for SharePoint, OneDrive, Teams Enabled Extends detonation to files shared via Teams/SharePoint, not just email
Priority Apply to all recipients (no scoping) Don’t leave service accounts or shared mailboxes unprotected

The Dynamic Delivery option (deliver the email body immediately, hold the attachment during detonation, then deliver the scanned attachment separately) reduces end-user complaints about email delays at the cost of slightly more complex delivery behavior. For SMBs where email is business-critical and users complain about delays, Dynamic Delivery is a reasonable compromise over Block mode.

Safe Links

Safe Links rewrites URLs in email at delivery time and then re-checks them against a real-time threat feed at click time. This catches two categories that delivery-time URL scanning misses:

  • Time-of-click phishing: A URL is benign at delivery time (attacker has a clean site) but redirects to a phishing page after the email bypasses scanning
  • Legitimate site compromise: A URL pointing to a legitimate website is delivered safely, but the site is later compromised and starts serving malware

Key policy settings:

Setting Recommended Value
On: Safe Links checks a list of known, malicious links when users click links in email Enabled
Apply real-time URL scanning for suspicious links and links that point to files Enabled
Do not allow users to click through to original URL Enabled (block click-through)
Track user clicks Enabled (for incident investigation)
Safe Links in Microsoft Teams Enabled

Do not add internal domains to the “do not rewrite” exclusion list unless you have a specific operational reason. Every exclusion is a potential gap. The Microsoft 365 Admin Center and commonly used Microsoft domains are automatically excluded by Microsoft — you don’t need to add them manually.

Anti-Phishing Policy (Impersonation Protection)

MDO’s anti-phishing extends beyond signature-matching to detect impersonation attacks:

  • User impersonation: An email appearing to be from your CEO (typosquatting the domain or spoofing the display name) is caught even if the sender domain is different
  • Domain impersonation: Domains that look similar to yours (itexperts-berlin.de vs itexperts-ber1in.de) are flagged
  • Mailbox intelligence: ML models learn each user’s typical communication graph; an email that mimics a known contact but comes from an unusual source is flagged

Configuration: Add your executives and high-value targets (CEO, CFO, HR lead) to the user impersonation protection list, and add your primary domains and any similar-looking domains you own to the domain impersonation list. Set the action to “Move to Junk” for suspected impersonation (rather than quarantine) to reduce false-positive impact on legitimate email.

Threat Explorer (Real-Time Detections)

Under the Microsoft 365 Defender portal → Email & collaboration → Explorer (or Real-time detections for Plan 1), you can investigate:

  • Which emails were delivered vs. quarantined vs. blocked in the last 30 days
  • Specific URL clicks by user and time
  • Attachment detonation results
  • The full message trace for a specific email including all applied detections

When a user reports a suspicious email, Threat Explorer is the starting point: look up the sender domain, check if similar emails were sent to others in the organization, and determine whether the URL or attachment was flagged by Safe Attachments/Links or only caught after click.

Preset Security Policies

For SMBs that want to skip manual policy tuning, Microsoft provides two preset security policies that apply Microsoft-recommended settings automatically: Standard Protection and Strict Protection. These are accessible under Threat Policies → Preset security policies and apply consistent settings across EOP + MDO.

Standard Protection is the appropriate starting point for most Berlin SMBs. Apply it to all users as a baseline, then layer custom policies on top for specific groups (e.g., Strict Protection for executives).

Defender for Office 365 does not eliminate the need for security awareness training — it reduces the blast radius when a user does click something malicious. The combination of MDO filtering, Entra ID Protection for risk-based access, and Conditional Access gives Berlin SMBs a layered email security posture that matches what much larger organizations deploy.

Similar Posts