EX-2102 : Microsoft Exchange Online Administration

AI-3024: Design a dream destination with AI
04/01/2025
DP-700T00 : Microsoft Fabric Data Engineer
05/15/2025
τεστ

EX-2102 : Microsoft Exchange Online Administration

This course is designed to provide participants with the knowledge and practical skills needed to efficiently manage and secure Exchange Online within Microsoft 365. The program emphasizes strengthening email security through advanced protection features in Microsoft Defender for Office 365, maintaining regulatory compliance, and performing effective threat detection and investigation.

 

The duration  of the program :

Classroom
Instructor Led : 16 h

Live Online
Instructor Led  : 16 h

 

This seminar is designed for: IT Administrators responsible for managing Microsoft 365 and Exchange Online, Messaging and Collaboration Specialists, Security and Compliance Officers, System Engineers and Technical Consultants

Manage your security services in Microsoft Defender XDR

This learning path examines how to manage the Microsoft 365 security services, with a special focus on security reporting and managing the Safe Attachments and Safe Links features in Microsoft Defender for Office 365.

·       Examine email protection in Microsoft 365

Introduction

Implement anti-malware policies

Implement anti-spam policies

Detect messages with spam or malware using Zero-hour auto purge

Explore anti-spoofing protection provided by Exchange Online Protection

Explore other anti-spoofing protection

Examine outbound spam filtering

·       Enhance your email protection using Microsoft Defender for Office 365

Introduction
Climb the security ladder from EOP to Microsoft Defender for Office 3657
Expand EOP protections by using Safe Attachments and Safe Links
Manage spoofed intelligence
Configure outbound spam filtering policies
Manage email access in Microsoft 365
Submit messages, URLs, files, and attachments to Microsoft for analysis

·       Manage Safe Attachments

Introduction
Protect users from malicious attachments by using Safe Attachments
Create Safe Attachment policies using Microsoft Defender for Office 365
Create Safe Attachments policies using PowerShell
Modify an existing Safe Attachments policy
Create a transport rule to bypass a Safe Attachments policy4
Examine the end-user experience with Safe Attachments

·       Manage Safe Links

Introduction
Protect users from malicious URLs by using Safe Links
Create Safe Links policies using Microsoft 365 Defender
Create Safe Links policies using PowerShell
Modify an existing Safe Links policy
Create a transport rule to bypass a Safe Links policy
Examine the end-user experience with Safe Links

Manage compliance in Microsoft 365 and Exchange Online

Learn how compliance works in an Exchange Online environment. Learn how to use retention and data loss prevention policies to keep the data and communications you’re required to maintain, how to find that data and communications, and how to ensure you’re ready for an audit.

Introduction to managing compliance
Configure retention policies
Configure data loss prevention policies
Configure and analyze audit logs
Manage journal rules
Manage content search
Summary and knowledge check5 min

Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium)

This module explores the differences between Microsoft Purview Audit (Standard) and Audit (Premium), plus the key functionality in Audit (Premium), including setup requirements, enabling audit logging, creating audit log retention policies, and performing forensics investigations.

Introduction to threat investigation with Microsoft Purview Audit (Premium)
Explore Microsoft Purview Audit (Premium)
Implement Microsoft Purview Audit (Premium)
Manage audit log retention policies
Investigate compromised email accounts using Purview Audit (Premium)

Implement threat protection by using Microsoft Defender for Office 365

This module examines the Microsoft Defender for Office 365 protection stack and its corresponding threat intelligence features, including Threat Explorer, Threat Trackers, and Attack simulation training.

Introduction
Explore the Microsoft Defender for Office 365 protection stack
Examine the security policies and rules used in Microsoft Defender for Office 365
Investigate security attacks by using Threat Explorer
Identify cybersecurity issues by using Threat Trackers
Prepare for attacks with Attack simulation training

This course is designed for persons who are aspiring to the Microsoft 365 Messaging Administrator role.

Location Dates Time (UTC+2 ) Delivery Format Language
Live Online* 20,22,23,29-Oct 17:30-20:45 Instructor Led Greek

* Σύγχρονη εξ αποστάσεως εκπαίδευση με εισηγητή – Virtual Class




    Με την συμπλήρωση της φόρμας αποδέχεστε την Πολιτική
    Προσωπικών Δεδομένων της Infolab και συγκατατίθεστε όπως η εταιρεία χρησιμοποιήσει
    τα προσωπικά σας δεδομένα για τη διαχείριση του αιτήματός σας
    και την επικοινωνία μαζί σας προς το σκοπό αυτό. Μπορείτε να
    ανακαλέσετε ανά πάσα στιγμή τη συγκατάθεσή σας σύμφωνα με
    όσα καθορίζονται στη Πολιτική Προσωπικών Δεδομένων της
    εταιρείας.

    Last Update : 31/08/2023 (MS-203T00)