Important
Important: If you have a Microsoft Microsoft 365 account, and you use Outlook and Outlook on the web or Outlook on the web for business, you need to create a signature in both products. To create and use email signatures in Outlook on the web, see Create.
The improved Microsoft 365 security center is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 security center. Learn what's new.
Applies to
Important
- There are many different types of email accounts you can add to Outlook, including Microsoft 365, Gmail, Yahoo, iCloud, and Exchange accounts. Some third-party email providers, like Gmail, Yahoo, and iCloud, require you to change some settings on their websites before you can add these accounts to Outlook.
- Microsoft 365 with Office apps Microsoft 365 Introducing Microsoft Viva, the new employee experience platform designed to help people connect, focus, learn, and thrive at work.
Log Into Outlook Mail 365
This article is intended for business customers who have Microsoft Defender for Office 365. If you are using Outlook.com, Microsoft 365 Family, or Microsoft 365 Personal, and you're looking for information about Safe Links or Safe Attachments in Outlook, see Advanced Outlook.com security for Microsoft 365 subscribers.

Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools. Defender for Office 365 includes:
Threat protection policies: Define threat-protection policies to set the appropriate level of protection for your organization.
Reports: View real-time reports to monitor Defender for Office 365 performance in your organization.
Threat investigation and response capabilities: Use leading-edge tools to investigate, understand, simulate, and prevent threats.
Automated investigation and response capabilities: Save time and effort investigating and mitigating threats.
Interactive guide to Microsoft Defender for Office 365
In this interactive guide you'll learn how to safeguard your organization with Microsoft Defender for Office 365. You'll see how Defender for Office 365 can help you define protection policies, analyze threats to your organization, and respond to attacks.
Getting Started
If you're new to Microsoft Defender for Office 365 or learn best by doing, you may benefit from breaking initial Defender for Office 365 configuration into chunks, investigating, and viewing reports using this article as a reference. Here are logical early configuration chunks:
- Configure everything with 'anti' in the name.
- anti-malware
- anti-phishing
- anti-spam
- Set up everything with 'safe' in the name.
- Safe Links
- Safe Attachments
- Defend the workloads (ex. SharePoint Online, OneDrive, and Teams)
- Protect with Zero-Hour auto purge
To learn by doing, click this link.
Note
Microsoft Defender for Office 365 comes in two different Plan types. You can tell if you have Plan 1 if you have 'Real-time Detections', and Plan 2, if you have Threat Explorer. The Plan you have influences the tools you will see, so be certain that you're aware of your Plan as you learn.

Microsoft Defender for Office 365 Plan 1 and Plan 2
The following table summarizes what's included in each plan.
Microsoft Defender for Office 365 Plan 1 | Microsoft Defender for Office 365 Plan 2 |
---|---|
Configuration, protection, and detection capabilities: | Microsoft Defender for Office 365 Plan 1 capabilities --- plus --- Automation, investigation, remediation, and education capabilities: |
Microsoft Defender for Office 365 Plan 2 is included in Office 365 E5, Office 365 A5, Microsoft 365 E5 Security, and Microsoft 365 E5.
Microsoft Defender for Office 365 Plan 1 is included in Microsoft 365 Business Premium.
Microsoft Defender for Office 365 Plan 1 and Microsoft Defender for Office 365 Plan 2 are each available as an add-on for certain subscriptions. To learn more, see Feature availability across Microsoft Defender for Office 365 plans.
The Safe Documents feature is only available to users with the Microsoft 365 E5 or Microsoft 365 E5 Security licenses (not included in Microsoft Defender for Office 365 plans).
If your current subscription does not include Microsoft Defender for Office 365, contact sales to start a trial, and see how Defender for Office 365 can work for your organization.
Configure Microsoft Defender for Office 365 policies
With Microsoft Defender for Office 365, your organization's security team can configure protection by defining policies in the Security & Compliance Center (Go to https://protection.office.com > Threat management > Policy.)
Learn more by watching this video.
Tip
For a quick list of policies to define, see Protect against threats.
Defender for Office 365 Policies
The policies that are defined for your organization determine the behavior and protection level for predefined threats. Policy options are extremely flexible. For example, your organization's security team can set fine-grained threat protection at the user, organization, recipient, and domain level. It is important to review your policies regularly because new threats and challenges emerge daily.
Safe Attachments: Provides zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox. To learn more, see Set up Safe Attachments policies.
Safe Links: Provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked. To learn more, see Set up Safe Links policies.
Safe Attachments for SharePoint, OneDrive, and Microsoft Teams: Protects your organization when users collaborate and share files, by identifying and blocking malicious files in team sites and document libraries. To learn more, see Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams.
Anti-phishing protection in Defender for Office 365: Detects attempts to impersonate your users and internal or custom domains. It applies machine learning models and advanced impersonation-detection algorithms to avert phishing attacks. To learn more, see Configure anti-phishing policies in Microsoft Defender for Office 365.
View Microsoft Defender for Office 365 reports
Microsoft Defender for Office 365 includes an advanced reporting dashboard to monitor your Defender for Office 365 performance. You can access it at Reports > Dashboard in the Security & Compliance Center.
Reports update in real-time, providing you with the latest insights. These reports also provide recommendations and alert you to imminent threats. Predefined reports include the following:
... and several more.
Use threat investigation and response capabilities
Microsoft Defender for Office 365 Plan 2 includes best-of-class threat investigation and response tools that enable your organization's security team to anticipate, understand, and prevent malicious attacks.
Threat trackers provide the latest intelligence on prevailing cybersecurity issues. For example, you can view information about the latest malware, and take countermeasures before it becomes an actual threat to your organization. Available trackers include Noteworthy trackers, Trending trackers, Tracked queries, and Saved queries.
Threat Explorer (or real-time detections) (also referred to as Explorer) is a real-time report that allows you to identify and analyze recent threats. You can configure Explorer to show data for custom periods.
Attack Simulator allows you to run realistic attack scenarios in your organization to identify vulnerabilities. Simulations of current types of attacks are available, including spear phishing credential harvest and attachment attacks, and password spray and brute force password attacks.
Outlook 3665 Mail
Save time with automated investigation and response
(NEW!) When you are investigating a potential cyberattack, time is of the essence. The sooner you can identify and mitigate threats, the better off your organization will be. Automated investigation and response (AIR) capabilities include a set of security playbooks that can be launched automatically, such as when an alert is triggered, or manually, such as from a view in Explorer. AIR can save your security operations team time and effort in mitigating threats effectively and efficiently. To learn more, see AIR in Office 365.
Permissions required to use Microsoft Defender for Office 365 features
To access Microsoft Defender for Office 365 features in the Security & Compliance Center, you must be assigned an appropriate role. The following table includes some examples:
Outlook 3660
Role or role group | Resources to learn more |
---|---|
global administrator (this can be assigned in either Azure Active Directory or in the Security & Compliance Center) | About Microsoft 365 admin roles |
Security Administrator (this can be assigned in either Azure Active Directory or the Security & Compliance Center) | Administrator role permissions in Azure Active Directory |
Exchange Online Organization Management (this is assigned in Exchange Online) | Permissions in Exchange Online |
Search and Purge (this is assigned only in the Security & Compliance Center) | Permissions in the Security & Compliance Center |
For more information, see Permissions in the Security & Compliance Center.

Get Microsoft Defender for Office 365
Microsoft Defender for Office 365 is included in certain subscriptions, such as Microsoft 365 E5, Office 365 E5, Office 365 A5, and Microsoft 365 Business Premium. If your subscription does not include Defender for Office 365, you can purchase Defender for Office 365 Plan 1 or Defender for Office 365 Plan 2 as an add-on to certain subscriptions. To learn more, see the following resources:
Microsoft Defender for Office 365 availability for a list of subscriptions that include Defender for Office 365 plans.
Feature availability across Microsoft Defender for Office 365 plans for a list of features included in Plan 1 and 2.
Get the right Microsoft Defender for Office 365 to compare plans and purchase Defender for Office 365.
New features in Microsoft Defender for Office 365
New features are added to Microsoft Defender for Office 365 continually. To learn more, see the following resources:
Microsoft 365 Roadmap provides a list of new features in development and rolling out.
Microsoft Defender for Office 365 Service Description describes features and availability across Defender for Office 365 plans.
See also
Automated investigation and response (AIR) in Microsoft 365 Defender1
Microsoft Office 365 at CCU
Microsoft Office 365 is a cloud-based service that provides a single platform for Coastal Carolina University email, and for students, faculty and staff to access the latest versions of Microsoft Office (Word, Excel, PowerPoint, OneNote) for Windows and OS X, and to get cloud-based mobile apps to access and edit files online including PC, Mac, iPad, iPhone and Android.
All official university communications are sent and received through Office 365 Outlook email. Select your user group to learn more.
CHANGE YOUR PASSWORD

If you have not changed your password in the last 90 days, please use CCU's new Self-Service Password Reset to register and change your password: www.coastal.edu/app/its/passwordreset.
For Alumni

For Faculty and Staff
For Students
Office 365 features, timeline
Outlook 365 Sign In
AVAILABLE SERVICES | Timeline | ||
Outlook/Mail gives you access to your CCU email, contacts and calendars on all of your devices, including your cell phone. | Summer 2017 | ||
OneDrive allows you to access your files from your desktop, mobile device and the web and facilitates sharing and collaboration through 1 TB of personal cloud storage. | Summer 2017 | ||
Office Online (Word, PowerPoint, Excel and OneNote) allows you to create and edit Word, OneNote, PowerPoint, and Excel documents from a browser. | Summer 2017 | ||
Office 365 Mobile Apps allows you to enjoy a fully installed Office experience across PCs, Macs, Windows tablets, iPad® and Android™ tablets, and most mobile devices. Each user can install Office on five devices: PCs or Macs, tablets (Windows, iPad, Android), and phones. | Summer 2017 | ||
Skype for Business (Teams is preferred as Skype for Business Online will be retired in July 2021, per Microsoft.) | May 2018 | ||
Teams provides chat-based collaboration, meetings, calling, and full enterprise voice features. | 2019 | ||
BENEFITS AND FEATURES | Alumni | Students | Faculty/Staff |
50GB Email | |||
1TB of Storage in OneDrive | |||
Office 365 for Windows and Mac | |||
Office 365 for Tablets | |||
Office 365 for Phones | |||
Office 365 Web Apps |
