DP-203 Data Engineering on Microsoft Azure – Design and Develop Data Processing – Azure Databricks Part 2

4. Lab – Creating a cluster Now in the last chapter, we have gone ahead and create our workspace. In this chapter, we are going to now create a cluster. So the cluster will have the underlying machines that is going to have Spark installed. So as part of the data bricks implementation, you have… Read More »

DP-203 Data Engineering on Microsoft Azure – Design and Develop Data Processing – Azure Databricks

1. What is Azure Databricks Now, before we actually go into Azure data bricks, let me go ahead and first explain the need for Data Bricks itself. So, Databricks is a company that was actually founded by the original creators of Apache Spark. So Data Bricks itself, the service actually makes use of Apache Spark… Read More »

MS-203 Microsoft 365 Messaging – Troubleshoot Mail Flow Problem Part 3

5. Analyze Message Headers with the Remote Connectivity Analyzer Let’s take some time now and talk about a really great web based tool that Microsoft provides us. This tool is called the remote connectivity analyzer, okay. Also known as RCA. We can get to this tool by typing test connectivity Microsoft. com. So we’re going… Read More »

MS-203 Microsoft 365 Messaging – Troubleshoot Mail Flow Problem Part 2

3. Configuring Message Tracking Okay. And we’re going to be using a command called get Message Tracking log. Now if I type that command, let in right now, get message tracking log, hit Enter, it’s just going to show me everything, okay, everything that’s been happening and I’m going to hit control C to break… Read More »

MS-203 Microsoft 365 Messaging – Troubleshoot Mail Flow Problem

1. Examining Message Trace in Exchange Online We’re now going to take a look at something called message Trace in Exchange Online. Now Message Trace is a feature that is going to allow us to see email that’s been flowing within our Exchange Online organization, okay? They’ve made this really simple to use, real easy… Read More »

MS-203 Microsoft 365 Messaging – Planning and Implementing Migrations Part 2

4. PST, IMAP, and Third Party Migrations So the first one is called a PST Migration. Now. PST stands for personal storage table. Okay? Now a PST file is what Microsoft Outlook will use. If you have Microsoft Outlook installed, it really doesn’t matter what kind of email product you communicate with. With Outlook, if… Read More »

MS-203 Microsoft 365 Messaging – Planning and Implementing Migrations

1. Cutover Migrations Okay? So a cutover migration is going to allow you to migrate all of your user mailboxes from your on premise Exchange into your Microsoft 365 Exchange Online environment. Okay? The goal here with performing a cut over migration is you’re just wanting to move everything all at once. So imagine you’re… Read More »

MS-203 Microsoft 365 Messaging – Manage message hygiene using Exchange Online and Office 365 Part 3

6. Managing Protection For Phishing with ATP Anti-Phishing Let’s now look at Microsoft’s anti phishing capabilities that we’ve got in the Security and Compliance Center. Okay, so here we are on Microsoft 365 Admin Center. This is Portal, Microsoft. com. We’re going to click show. All Then we’re going to click Security. That’s going to… Read More »

MS-203 Microsoft 365 Messaging – Manage message hygiene using Exchange Online and Office 365 Part 2

3. Connection Filters Now I want to jump into Exchange online. We’re going to take a look at the EOP Exchange Online protection and look at Connection filters. So we’re going to click here on Portal Microsoft. com. I’m going to click Show All and we’re going to go down to Exchange, all right? And… Read More »

MS-203 Microsoft 365 Messaging – Manage message hygiene using Exchange Online and Office 365

1. Advanced Threat Protection (ATP) Safe Attachments and Safe Links Is ATP advanced Threat Protection. So this is a feature that is tied to your organizational assets in Microsoft 365 that is going to be monitoring your email, monitoring for malicious links, monitoring for malicious documents, and it’s going to use various different systems to… Read More »

img