2
Anti-Phishing
protection
This feature prevents users from accessing web pages known for phishing. Email messages may
contain links that lead to phishing web pages. ESET Cloud Office Security uses a sophisticated
parser that searches the message body and subject of incoming email messages to identify such
links (URLs). The URLs are compared against a phishing database that is updated continuously.
Anti-Malware
protection
An award-winning and innovative defense against malware, this leading-edge technology
prevents attacks. It eliminates all types of threats, including viruses, ransomware, rootkits,
worms, and spyware, with cloud-powered scanning for even better detection rates. Its small
footprint is light on system resources and does not compromise performance. Anti-Malware
detection uses a layered security model. Each layer, or phase, has several core technologies. The
Pre-execution phase includes the following technologies: UEFI Scanner, Network Attack
Protection, Reputation & Cache, In-product Sandbox, DNA Detections. The Execution phase
technologies are Exploit Blocker, Ransomware Shield, Advanced Memory Scanner, and Script
Scanner (AMSI). The Post-execution phase uses Botnet Protection, Cloud Malware Protection
System, and Sandboxing. This feature-rich set of core technologies provides an unrivaled level of
protection.
Policies Larger organizations usually have multiple departments and want to configure different
protection settings for each organizational unit. ESET Cloud Office Security provides policy-based
protection settings that can be assigned to selected Tenants, Users, Team groups or SharePoint
sites. You can customize each policy according to your needs.
Quarantine
manager
Inspect quarantined objects and perform an appropriate action (download, delete, or release).
This feature offers simple management of email messages, attachments, and files from Exchange
Online / OneDrive / Team groups / SharePoint sites that have been quarantined by ESET Cloud
Office Security . The download gives you the option of analyzing quarantined objects with third-
party tools, if required, to help when deciding what action to take.
Dashboard with
detection
statistics
Get a quick overview of security activities within Microsoft 365. The dashboard provides essential
information in each of the overview tabs (Exchange Online / OneDrive / Team groups / SharePoint
sites). User overview shows the number of Tenants and License usage, and statistics per each
Tenant — Number of users, Top recipients of spam/phishing/malware, and Top suspicious
OneDrive accounts, Top suspicious Team groups and SharePoint sites. You can choose a time
period and a Tenant to display the statistics for. Further detection statistics and graphs are
visible in the Exchange Online, OneDrive, Team groups and SharePoint sites overview tabs. These
are statistics such as the number of scanned emails and files and the number of detected
spam/phishing/malware. The graphs show the traffic for each detection type — spam, malware,
and phishing.
Detections with
filtering options
This feature contains all records about detections. The records include logs of every detection by
email scan in the Exchange Online tab and file scan in the OneDrive / Team groups / SharePoint
sites tabs. This makes it possible to filter and effectively find what you are looking for by using
additional information about the specific detection (for example, a name of the infiltration, file
hash).
Users The central entity that ESET Cloud Office Security protects is the user account. Find useful
information by opening the Details of a user, such as an Overview, Settings defined by Policies,
list of Policies assigned to the user, and Detections for Exchange Online and OneDrive. This
feature helps to investigate detections related to a specific user. You can also choose which users
to protect. Users are sorted into groups. Each group is an Microsoft 365 tenant containing its
users. Use multiple filtering criteria to make searching for a particular user within a group easier.
Reporting &
Machine
Learning
Protection
Advanced machine learning is now a part of the detection engine as an advanced layer of
protection, which improves detection based on machine learning. Read more about this type of
protection in the glossary . You can configure Reporting levels for the following categories:
Malware, Potentially unwanted applications (PUAs), Potentially suspicious applications, and
Potentially unsafe applications.
Reports Receive statistical data for Exchange Online and OneDrive protection via email, or generate and
download a one-off report for a chosen period. You can schedule reports to generate and get
distributed to specified email recipients regularly. Choose PDF or CSV as an output format.
Reports contain data such as a number of scanned emails, detected malware, phishing, and
spam. PDF format includes data shown in graphs. There is a graph for each — scanned emails,
malware traffic, phishing traffic, and spam traffic. It also contains separate statistics for top
recipients for each category: malware, phishing, and spam. There are several available options
for generating reports.