Description
Introduction
This course describes the tools and configuration required to
configure and maintain a secure implementation of Exchange Online.
An understanding of tools such as Forefront Protection for
Microsoft Exchange (FOPE), Exchange Online data encryption, and
secure Unified Communications is important for protecting both your
organization's intellectual property and your users. The course
also explains how to apply compliance configurations to your Office
365 environment. In addition, it explains how to implement and
manage features such as Information Rights Management (IRM)
policies, retention tags, holds, and policies; audit logging; and
mailbox archiving. Your understanding of compl…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction This course describes the tools and configuration
required to configure and maintain a secure implementation of
Exchange Online. An understanding of tools such as Forefront
Protection for Microsoft Exchange (FOPE), Exchange Online data
encryption, and secure Unified Communications is important for
protecting both your organization's intellectual property and your
users. The course also explains how to apply compliance
configurations to your Office 365 environment. In addition, it
explains how to implement and manage features such as Information
Rights Management (IRM) policies, retention tags, holds, and
policies; audit logging; and mailbox archiving. Your understanding
of compliance configurations and how these can be applied to your
organization is important for your organization's legal and
regulatory compliance. Objectives At the end of the course,
students will be able to:
- In this course, you will implement Exchange Online security and
manage Exchange Online compliance.
Modules & Lessons Managing Exchange Online Security Module
Introduction Managing Forefront Protection for Microsoft Exchange
Implementing Exchange Hosted Encryption Implementing Unified
Communications Certificates Managing Journaling Managing Mobile
Devices Module Follow Up Managing Exchange Compliance Module
Introduction Configuring Information Rights Management Provisioning
and Managing Retention Policies, Tags, and Holds Enabling Audit
Logging Archiving Mailboxes and Configuring Exchange MailTips
Module Follow Up System Requirements To view this course, you
need:
- Browser Microsoft Internet Explorer 7 (or higher)
- Browser Mozilla Firefox 2 (or higher)
- Browser Apple Safari 2 (or higher)
- Operating System Apple Mac OS X 10.4 (or higher)
- Processor Pentium III 1 GHz (or better)
- Processor Macintosh Intel-based or PowerPC G4 (or better)
- RAM 512 MB (1 GB or more recommended)
- Internet connection 256K (broadband recommended)
- Adobe Flash Player 8 (current version recommended)
- Adobe Reader 7 (or higher)
- Operating System Microsoft Windows 2000, XP, Vista, or Windows
7
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.