You are evaluating solutions for a company that has been experiencing unauthorized access to their Microsoft 365 services. Which Microsoft Defender solution would you recommend to enhance their security, and how would you configure it to prevent future unauthorized access?