MS-203 Manage message security in Microsoft 365
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Plan for message hygiene
- Explain the use and features of Exchange Online Protection.
- Plan message routing for Exchange Online Protection.
- Investigate the available EOP reports and logs that enable organizations to monitor message hygiene.
- Module 2: Manage anti-malware and anti-spam policies
- Understand the different message header fields relevant for spam and spoofing protection.
- Configure anti-spam and anti-malware filters in Exchange Server.
- Manage extra features for outbound spam filtering and quarantine.
- Implement protection features against phishing and spoofing.
- Create transport rules for custom requirements.
- Module 3: Explore threat protection in Microsoft 365 Defender
- Describe the threat protection features of Microsoft Defender for Office 365.
- Understand how the Configuration analyzer reviews threat protection policies and provides suggestions for improvement.
- Describe the protection provided by Safe Attachment and Safe Links policies.
- Understand the spoof intelligence features provided by Exchange Online Protection.
- Describe how Microsoft Defender anti-phishing policies work.
By the end of this module, you'll be able to:
By the end of this module, you'll be able to:
By the end of this module, you'll be able to:
Syllabus
- Module 1: Plan for message hygiene
- Introduction
- Explore Exchange Online Protection
- Plan message routing for Exchange Online Protection
- Examine message hygiene monitoring and reporting
- Knowledge check
- Summary
- Module 2: Manage anti-malware and anti-spam policies
- Introduction
- Examine message headers and spam confidence levels
- Examine anti-spam and anti-malware protection
- Manage anti-spam protection
- Manage anti-malware protection
- Examine advanced anti-spam features
- Manage spoofing protection
- Manage phishing protection
- Configure transport rules
- Knowledge check
- Summary
- Module 3: Explore threat protection in Microsoft 365 Defender
- Introduction
- Examine threat protection in Microsoft 365 Defender
- Explore using Configuration Analyzer to improve security policies
- Examine how Safe Attachments protects against malicious attachments
- Examine how Safe Links protects against malicious URLs
- Manage spoof intelligence
- Manage anti-phishing policies
- Knowledge check
- Summary
Tags
Related Courses
Manage Office 365 IdentitiesMicrosoft via edX Windows Server 2012 System Administration: Get an IT Job!
Udemy Windows Server 2016 Administration
Udemy Windows 10: Configure Storage
LinkedIn Learning Windows 10: Deploy and Manage Virtual Applications
LinkedIn Learning