You need to ensure that Allan Deyoung can create a new public folder for the sales department. Which two actions should you perform first? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Add Allan Deyoung to the Organization Management role group
B. Create a new public folder mailbox
C. Add Allan Deyoung to the Recipient Management role group
Allan Deyoung must perform a message trace of the email messages sent by Isaiah Langer and provide a report that contains all the messages sent during the last 30 days.
You need to ensure that Allan Deyoung can perform the message trace.
What should you do?
A. Add Allan Deyoung to the Organization Management role group
B. Add Allan Deyoung to the Security Administrator role group
C. For Allan Deyoung, set ElcProcessingDisabled to true
D. For Isaiah Langer, set ElcProcessingDisabled to true
You need to email a list of configuration changes to the Exchange Online environment that were recently performed by Allan Deyoung. What should you do?
You have a Microsoft 365 subscription that contains a verified domain named contoso.com.
You have an app named App1 that sends meeting invitations on behalf of users. The invitations are sent from a Microsoft Exchange Online mailbox that has a sender address of [email protected] and a reply-to address of the user
scheduling the meeting.
You create an anti-phishing policy named Policy1 that includes all the users in contoso.com. Policy1 is configured to protect the domain against impersonation.
You discover that email messages sent from App1 are quarantined.
You need to ensure that App1 can send messages that impersonate any contoso.com user.
Configure anti-phishing policies in Microsoft Defender for Office 365
Exclude these users, groups, and domains: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
Note: Use the Set-AntiPhishPolicy cmdlet to modify antiphish policies in your cloud-based organization.
Parameters include: -ExcludedSenders
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
The ExcludedSenders parameter specifies an exception for impersonation protection that looks for the specified message sender. You can specify multiple email addresses separated by commas.
You have a Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365.
You have a Safe Attachments policy named Policy1.
You have a partner company that has an email domain named fabrikam.com.
You need to prevent email messages received from fabrikam.com from being scanned by Policy1.
What should you do?
A. Add the fabrikam.com domain to the Tenant Allow/Block List.
B. Create a mail flow rule and set the X-MS-Exchange-Organization-SkipSafeAttachmentProcessing header to 0.
C. Create a new Safe Attachments policy and exclude the fabrikam.com domain.
D. Create a mail flow rule and set the X-MS-Exchange-Organization-SkipSafeAttachmentProcessing header to 1.
Correct Answer: C
Explanation:
Use the Microsoft 365 Defender portal to create Safe Attachments policies
On the Users and domains page that appears, identify the internal recipients that the policy applies to.
Exclude these users, groups, and domains: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
You have a Microsoft 365 E3 subscription that uses Microsoft Exchange Online.
You need to ensure that Safe Links and Safe Attachments protection is enabled for users.
What should you do?
A. Enable the Strict protection preset security policy.
B. Assign a Microsoft 365 E5 license to each user.
C. Create an Enhanced Filtering for Connectors rule.
D. Create an anti-malware policy and enable the common attachments filter.
Correct Answer: A
Explanation:
Preset security policies in EOP and Microsoft Defender for Office 365
Preset security policies provide a centralized location for applying all of the recommended spam, malware, and phishing policies to users at once. The policy settings are not configurable. Instead, they are set by us and are based on our
observations and experiences in the datacenters for a balance between keeping harmful content away from users and avoiding unnecessary disruptions.
Policies in preset security policies
Preset security policies use the corresponding policies from the various protection features in EOP and Microsoft Defender for Office 365. These policies are created after you assign the Standard protection or Strict protection preset security
policies to users. You can't modify the settings in these policies.
Microsoft Defender for Office 365 policies: These policies are in organizations with Microsoft 365 E5 or Defender for Office 365 add-on subscriptions:
*
Safe Links policies named Standard Preset Security Policy, Strict Preset Security Policy, and Built-in Protection Policy.
*
Safe Attachments policies named Standard Preset Security Policy, Strict Preset Security Policy, and Built-in Protection Policy.
*
Anti-phishing policies in Defender for Office 365 named Standard Preset Security Policy and Strict Preset Security Policy, which include:
The same spoof settings that are available in the EOP anti-phishing policies.
Impersonation settings
Note also:
Exchange Online Protection (EOP) policies: These policies are in all Microsoft 365 organizations with Exchange Online mailboxes and standalone EOP organizations without Exchange Online mailboxes:
Anti-spam policies named Standard Preset Security Policy and Strict Preset Security Policy.
Anti-malware policies named Standard Preset Security Policy and Strict Preset Security Policy.
Anti-phishing policies (spoofing protection) named Standard Preset Security Policy and Strict Preset Security Policy (spoof settings).
Incorrect:
Not B: To use Safe Links and Safe Attachments, one must have Microsoft 365 Advanced Threat Protection Plan 1 or 2.
You have a Microsoft Exchange Online tenant that contains a mailbox named Sales.
You need to create a copy of all the external email sent from the Sales mailbox to an alternate location.
What should you create?
A. a journaling rule
B. a retention policy
C. a records management file plan
D. a data loss prevention (DLP) policy
Correct Answer: A
Explanation:
Journaling in Exchange Online
When possible, we recommend that you use Microsoft 365 retention to archive and manage data in-place to meet your compliance requirements. However, some organizations might need to use a third-party solution to receive a copy of
emails for storage or other scenarios. Configure journaling to store that data outside Exchange.
Journal rules
The following are key aspects of journal rules:
Journal rule scope: Defines which messages are journaled by the Journaling agent.
Journal recipient: Specifies the SMTP address of the recipient you want to journal.
Journaling mailbox: Specifies one or more mailboxes used for collecting journal reports.
Incorrect:
*
a retention policy
Managing content commonly requires two actions:
*
Retain content
Prevent permanent deletion and remain available for eDiscovery
*
Delete content
Permanently delete content from your organization
With these two retention actions, you can configure retention settings for the following outcomes:
Retain-only: Retain content forever or for a specified period of time.
Delete-only: Permanently delete content after a specified period of time.
Retain and then delete: Retain content for a specified period of time and then permanently delete it.
These retention settings work with content in place that saves you the additional overheads of creating and configuring additional storage when you need to retain content for compliance reasons. In addition, you don't need to implement
customized processes to copy and synchronize this data.
A safe attachments policy that uses Dynamic Delivery is applied to all recipients who match your SMTP domains.
You need to prevent attachments from being scanned when internal users send email to one another.
What should you do?
A. From the Exchange admin center, create a transport rule.
B. From the Exchange admin center, modify the malware filter.
C. From Microsoft 365 Defender, modify the safe attachments policy.
D. From the Microsoft Purview compliance portal, modify the Compliance Manager settings.
Correct Answer: A
Explanation:
Create a transport rule (or mail flow rule as they are called nowadays) to configure the message header: X-MS-Exchange-Organization-SkipSafeAttachmentProcessing.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MS-203 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.