Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
Best Practices
5 posts
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.
entities. Two of them are particularly good ideas to limit how a domain can be accessed and will create significant hurdles for criminals
Remember when people stood on their soapbox and said that Microsoft should make things secure by default for everyone? That’s device encryption.
For the October demo I covered the four SCORE portals that can assist you in configuring to best practices as Microsoft sees them