EX-2102 : Microsoft Exchange Online Administration
This course is designed to provide participants with the knowledge and practical skills needed to efficiently manage and secure Exchange Online within Microsoft 365. The program emphasizes strengthening email security through advanced protection features in Microsoft Defender for Office 365, maintaining regulatory compliance, and performing effective threat detection and investigation.
The duration of the program :
Classroom |
Live Online |
This seminar is designed for: IT Administrators responsible for managing Microsoft 365 and Exchange Online, Messaging and Collaboration Specialists, Security and Compliance Officers, System Engineers and Technical Consultants
Manage your security services in Microsoft Defender XDR
This learning path examines how to manage the Microsoft 365 security services, with a special focus on security reporting and managing the Safe Attachments and Safe Links features in Microsoft Defender for Office 365.
· Examine email protection in Microsoft 365
Introduction
Implement anti-malware policies
Implement anti-spam policies
Detect messages with spam or malware using Zero-hour auto purge
Explore anti-spoofing protection provided by Exchange Online Protection
Explore other anti-spoofing protection
Examine outbound spam filtering
· Enhance your email protection using Microsoft Defender for Office 365
Introduction
Climb the security ladder from EOP to Microsoft Defender for Office 3657
Expand EOP protections by using Safe Attachments and Safe Links
Manage spoofed intelligence
Configure outbound spam filtering policies
Manage email access in Microsoft 365
Submit messages, URLs, files, and attachments to Microsoft for analysis
· Manage Safe Attachments
Introduction
Protect users from malicious attachments by using Safe Attachments
Create Safe Attachment policies using Microsoft Defender for Office 365
Create Safe Attachments policies using PowerShell
Modify an existing Safe Attachments policy
Create a transport rule to bypass a Safe Attachments policy4
Examine the end-user experience with Safe Attachments
· Manage Safe Links
Introduction
Protect users from malicious URLs by using Safe Links
Create Safe Links policies using Microsoft 365 Defender
Create Safe Links policies using PowerShell
Modify an existing Safe Links policy
Create a transport rule to bypass a Safe Links policy
Examine the end-user experience with Safe Links
Manage compliance in Microsoft 365 and Exchange Online
Learn how compliance works in an Exchange Online environment. Learn how to use retention and data loss prevention policies to keep the data and communications you’re required to maintain, how to find that data and communications, and how to ensure you’re ready for an audit.
Introduction to managing compliance
Configure retention policies
Configure data loss prevention policies
Configure and analyze audit logs
Manage journal rules
Manage content search
Summary and knowledge check5 min
Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium)
This module explores the differences between Microsoft Purview Audit (Standard) and Audit (Premium), plus the key functionality in Audit (Premium), including setup requirements, enabling audit logging, creating audit log retention policies, and performing forensics investigations.
Introduction to threat investigation with Microsoft Purview Audit (Premium)
Explore Microsoft Purview Audit (Premium)
Implement Microsoft Purview Audit (Premium)
Manage audit log retention policies
Investigate compromised email accounts using Purview Audit (Premium)
Implement threat protection by using Microsoft Defender for Office 365
This module examines the Microsoft Defender for Office 365 protection stack and its corresponding threat intelligence features, including Threat Explorer, Threat Trackers, and Attack simulation training.
Introduction
Explore the Microsoft Defender for Office 365 protection stack
Examine the security policies and rules used in Microsoft Defender for Office 365
Investigate security attacks by using Threat Explorer
Identify cybersecurity issues by using Threat Trackers
Prepare for attacks with Attack simulation training
None
This course is designed for persons who are aspiring to the Microsoft 365 Messaging Administrator role.
| Location | Dates | Time (UTC+2 ) | Delivery Format | Language |
|---|---|---|---|---|
| Live Online* | 20,22,23,29-Oct | 17:30-20:45 | Instructor Led | Greek |
* Σύγχρονη εξ αποστάσεως εκπαίδευση με εισηγητή – Virtual Class
Last Update : 31/08/2023 (MS-203T00)


