Please share with the community what you think needs improvement with Microsoft Defender for Office 365.
What are its weaknesses? What would you like to see changed in a future version?
In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement.
There needs to be an improvement in having the product work across multiple operating systems and have better support for non-Microsoft file types. Defender for Office 365 handles the Microsoft supported file types, but MIP is limited. This solution does what it needs to do, but it does not go to the depth of if it was working with MIP, a holistic information protection system. It does not support all the file types an organization might use. For example, AutoCAD B1 for manufacturing or defence-oriented companies, they have to add a third-party add-on, or you would have to create the extensibility. In an upcoming release, there should be business continuity features added. Proofpoint solution addresses what happens if you have an outage. If your tenant or your SaaS application is not available, there is no continuity right now with this solution.
We are waiting for better software to block viruses. The feedback that we receive is that it is weaker when compared with other products such as Cisco and Palo Alto. The only concern that we have is that this product is user-based, but we have requirements to run separate PCs or servers that are not on the same subscription. We need a separate license and we don't know how to get the license that is required. We also wonder if it can prevent attacks from new types of viruses such as Widefire.
Hi, I'm currently comparing the following products to enhance email spam filtering:
Sophos Advance Email ThreatTrend Micro Cloud App SecurityMicrosoft Defender for Office 365Check Point CloudGuard SaaS
What do you recommend?
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?