MS-203T00 – Microsoft 365 Messaging
Price: Enquire Now
Code: MS-203T00
Duration: 5 days

“Staying Ahead Of The Technological Curve.”

This Microsoft course will retire on 31/10/2023

Use the “Enquire Now” button or click Contact Us to discuss a replacement course.

Introduction

This course examines the key elements of Microsoft 365 messaging administration, including message transport and mail flow, messaging security, hygiene, and compliance, messaging infrastructure, and hybrid messaging. This course is designed for persons who are aspiring to be Messaging Administrators in a Microsoft 365 deployment.

Audience Profile

The Messaging Administrator plans, deploys, configures, troubleshoots, and secures the messaging infrastructure in a hybrid and cloud enterprise environment. Responsibilities include managing recipients, mailboxes, transport, mail flow, administrative roles, threat protection, compliance, migrations, and client connectivity. To implement a secure hybrid topology that meets the business needs of a modern organization, the Messaging Administrator must collaborate with other workload administrators and the Microsoft 365 enterprise administrator. The Messaging Administrator should have a working knowledge of authentication types, licensing, and integration with Microsoft 365 applications.

Prerequisites

This course is designed for persons who are aspiring to the Microsoft 365 Messaging Administrator role.

Onsite Training?

If you need training for three or more people, ask us about training at your site. You can enjoy the convenience of reduced travel cost and time, as well as a familiar environment for your staff. Additionally, we can customise the course for your business needs.

Examines the differences between managing mail flow in Exchange Online, Exchange Server, and Exchange Hybrid deployments

 

Learning objectives

By the end of this module, you’ll be able to:

  • Manage mail flow in Exchange organizations.
  • Understand mail flow for Exchange Servers.
  • Manage mail flow for Exchange Online.
  • Describe and manage mail flow in hybrid environments.
  • Configure message transport options.
  • Configure SMTP domains (Remote and Accepted domains)
  • Configure connectors

This module examines several tools that Microsoft provides to help messaging administrators find and fix the root causes of mail flow issues most commonly experienced by organizations.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Understand how to troubleshoot SMTP mail flow issues.
  • Describe how to troubleshoot issues with a shared namespace.
  • Describe how to troubleshoot Transport Layer Security encryption issues.
  • Troubleshoot network-based issues.
  • Understand how the service health dashboard can be utilized to review active and ongoing service-related issues.
  • Understand how Alert policies can be used to troubleshoot mail flow issues.

Explores mail flow rules, examines how they work, and provides instruction on how they should be configured.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Understand what mail flow rules are.
  • Describe how mail flow rules work.
  • Configure custom mail flow rules.

Examines Exchange Online Protection features and functionality, how to plan messaging routing for this service, and the EOP reports and logs that are available to analyze message hygiene in an organization.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Explain the use and features of Exchange Online Protection.
  • Plan message routing for Exchange Online Protection.
  • Investigate the available EOP reports and logs that enable organizations to monitor message hygiene.
  • Define mail flow rules that apply encryption templates to encrypt email messages.

Reviews the anti-malware and anti-spam protection provided by Exchange Server and Exchange Online Protection, and examines how to configure spam and malware filters, policies, and settings to provide protection from phishing and spoofing.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Understand the different message header fields relevant for spam and spoofing protection.
  • Configure anti-spam and anti-malware filters in Exchange Server.
  • Manage extra features for outbound spam filtering and quarantine.
  • Implement protection features against phishing and spoofing.
  • Create transport rules for custom requirements.

Examines how Microsoft Defender for Office 365 integrates with EOP to extend the protection provided by EOP and provide the most efficient level of protection against commodity and advanced targeted attacks.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe the threat protection features of Microsoft Defender for Office 365.
  • Understand how the Configuration analyzer reviews threat protection policies and provides suggestions for improvement.
  • Describe the protection provided by Safe Attachment and Safe Links policies.
  • Understand the spoof intelligence features provided by Exchange Online Protection.
  • Describe how Microsoft Defender anti-phishing policies work.
  • Understand the process to manage the Tenant Allow/Block list in Microsoft 365 Defender.
  • Run realistic attack scenarios using Attack Simulator to help identify vulnerable users before a real attack impacts your organization.

Examines the different Microsoft 365 Purview compliance portal features that messaging administrators can use to comply with legal and regulatory requirements.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe different policy and compliance features for messaging.
  • Evaluate the different administrator roles in Microsoft 365.
  • Plan retention policies for Exchange Online mailboxes.
  • Create message traces to understand the mail flow in your Exchange Online organization.
  • Describe how sensitivity labels let you classify and protect your organization’s data.
  • Create and manage inactive mailboxes.

Examines the compliance features available in the Exchange Admin Center for Exchange Server and Exchange hybrid deployments.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe litigation and in-place holds in Exchange Server.
  • Plan retention and deletion with Message Records Management (MRM).
  • Analyze your Exchange organization’s message tracking log

Examines how archiving is maintained within Exchange, how archive storage is provided to users, how messages are automatically processed and archived, and how audit logging provides information about user actions in Exchange mailboxes.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe what in-place archiving is and how it works.
  • Understand the differences between journaling and archiving.
  • Identify how mailbox and administrator audit logs are used.

Examines how Microsoft 365 uses in-place eDiscovery to run various types of compliance searches across an organization, including content searches and eDiscovery cases.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Design content searches to search for messages in your organization.
  • Describe eDiscovery cases and in-place eDiscovery for Exchange.

Examines how messaging administrators can ensure that user accounts are well protected and secure without deploying security features that introduce unnecessary complexity in your users’ everyday work.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Configure password policy options.
  • Configure self-service password management.
  • Implement multifactor authentication.
  • Plan password policies.
  • Configure modern authentication in Exchange Online.
  • Configure conditional access policies.

Examines the Microsoft 365 organizational settings that a messaging administrator can configure, including mailbox quotas to control disk usage on the Exchange Server, and throttling policies to prioritize workloads that affect an organization.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Configure workload policies and throttling.
  • Configure quota configurations.
  • Deploy Microsoft 365 Integrated apps.

Examines federation delegation and federated sharing, which messaging admins must implement so their organizations can share information with other trusted organizations.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Provide an overview of Exchange federated delegation sharing features.
  • Describe federated sharing components.
  • Identify considerations for designing and implementing federation trusts and certificates.
  • Implement organization relationships.
  • Implement sharing policies.

Examines how messaging administrators manage the Role Based Access Control (RBAC) permissions that are used by both Exchange Server and Exchange Online.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe how RBAC is used to assign roles to users.
  • Understand management role groups and their administrative tasks.
  • Assign the built-in management roles for messaging administration.
  • Create custom management roles and assign them through role assignment policies to users.
  • Troubleshoot RBAC management roles.
  • Describe how Privileged Identity Management enables you to manage, control, and monitor access to important resources in your organization.

Examines how to manage user roles using built-in role assignment policies and management role assignment policies, and how to create new roles, role assignments, and scopes.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe the built-in end-user roles.
  • Configure role assignment policies.
  • Create new custom roles and role assignment policies.

Examines how a messaging administrator must plan and configure shared permissions and split permissions so as not to put their Exchange environment or their entire Active Directory at risk.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Identify the differences between shared permissions and split permissions.
  • Describe multi-forest permissions.
  • Identify the differences between the permission models.

Examines the different types of Exchange Server recipients, including mailboxes, Microsoft 365 groups, resources, contacts, public folders, and analyzes how they differ from each other.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe the different recipient objects in Exchange.
  • Examine how organizations use resource mailboxes.
  • Compare shared mailboxes to linked mailboxes.
  • Describe how recipients can be grouped together to improve collaboration.
  • Examine how organization us public folders.

Examines how messaging administrators create and manage Exchange recipients, including mailbox settings, resource mailboxes, shared mailboxes, mail contacts, mail users, recipient permissions, groups, and public folders.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Manage mailbox settings.
  • Manage resource mailboxes and shared mailboxes.
  • Create and manage mail contacts and mail users.
  • Manage permissions for recipients.
  • Create and manage groups.
  • Create and manage public folders.

Examines how messaging administrators can create custom address lists, address book policies, email address policies, and offline address books.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe address lists.
  • Create and manage address lists.
  • Describe address book policies.
  • Configure offline address books.
  • Describe email address policies.

Examines the requirements necessary to implement a hybrid deployment, including Azure Active Directory Connect, the options for connecting on-premises Exchange to Microsoft 365, and the Microsoft 365 identity options for Exchange hybrid.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe connection options that are available for connecting on-premises Exchange to Microsoft 365.
  • List and describe components of a hybrid deployment.
  • Describe Azure Active Directory Connect (Azure AD Connect).
  • Identify Microsoft 365 identity options for Exchange hybrid.
  • Compare Exchange delegated federation to OAuth.

Examines how to plan and implement a hybrid deployment using the Hybrid Configuration Wizard, including configuration options, Organization Configuration Transfer, the Hybrid Agent, mail flow options, and implementation best practices.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Plan for Exchange Hybrid configuration.
  • Describe Organization Configuration Transfer.
  • Explain Exchange Modern Hybrid and Hybrid Agent.
  • Plan mail flow options for a hybrid deployment.
  • Describe the prerequisites to run the Microsoft 365 Hybrid Configuration Wizard.
  • Explain best practices for implementing a hybrid deployment.

Examines the different options that are available for migrating email to Exchange Online.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe the migration and coexistence strategies with Exchange Online.
  • Describe considerations that affect which migration option to use.
  • Determine whether DNS MX records must be changed during a mailbox migration.

Examines how to plan for and run an IMAP migration, how to plan for a cross-tenant migration, and how to prepare source user objects for migration.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Describe the requirements for an IMAP migration and how it’s carried out.
  • Move mailbox data using an IMAP migration.
  • Plan for a cross-tenant mailbox migration.
  • Prepare target user objects for a cross-tenant migration.

Examines troubleshooting techniques for a hybrid deployment, including how to troubleshoot Exchange transport, directory synchronization issues with pass-through authentication and single sign-on, client access, and mailbox replication service.

 

Learning objectives

By the end of this module, you’ll be able to:

  • Troubleshoot directory synchronization.
  • Troubleshoot pass-through authentication and single sign-on.
  • Troubleshoot transport with Exchange Online.
  • Troubleshoot client access in coexistence.
  • Troubleshoot the Mailbox Replication service.

Reviews

There are no reviews yet.

Enquire now

Enquire now

    Cart
    Unfortunately, Your Cart Is Empty
    Please Add Something In Your Cart