![Step-by-step threat protection stack in Microsoft Defender for Office 365 - Office 365 | Microsoft Docs Step-by-step threat protection stack in Microsoft Defender for Office 365 - Office 365 | Microsoft Docs](https://docs.microsoft.com/en-us/microsoft-365/media/mdo-filtering-stack/mdo-filter-stack-phase5.png?view=o365-worldwide)
Step-by-step threat protection stack in Microsoft Defender for Office 365 - Office 365 | Microsoft Docs
![Review architecture requirements and planning concepts for Microsoft Defender for Office 365 | Microsoft Docs Review architecture requirements and planning concepts for Microsoft Defender for Office 365 | Microsoft Docs](https://docs.microsoft.com/en-us/microsoft-365/media/defender/m365-defender-office-architecture.png?view=o365-worldwide)
Review architecture requirements and planning concepts for Microsoft Defender for Office 365 | Microsoft Docs
![Bypassing Windows Defender with Environmental Decryption Keys - Secarma: Penetration Testing and Cybersecurity Company Bypassing Windows Defender with Environmental Decryption Keys - Secarma: Penetration Testing and Cybersecurity Company](https://www.secarma.com/wp-content/uploads/2021/05/MicrosoftTeams-image-6-600x474.png)
Bypassing Windows Defender with Environmental Decryption Keys - Secarma: Penetration Testing and Cybersecurity Company
![Quarantine notifications (end-user spam notifications) in Microsoft 365 - Office 365 | Microsoft Docs Quarantine notifications (end-user spam notifications) in Microsoft 365 - Office 365 | Microsoft Docs](https://docs.microsoft.com/en-us/microsoft-365/media/end-user-spam-notification.png?view=o365-worldwide)