Outlook Cognizant 365
1. Who has access to my information stored on Office 365?
Answer: We take strong measures to help protect customer data from inappropriate access or use by unauthorized persons, either external or internal and to prevent customers from gaining access to one another’s data. See Who can access your data and on what terms for more details. (Microsoft Office 365 Interview Questions and Answers)
Office 365 Pro Plus and enterprise management and security users, settings, and preferences. Security features within Microsoft 365 are highly beneficial for businesses achieving IS0 27001 compliance as well as GDPR compliance. The Cognizant-Microsoft partnership. Focuses on digital transformation with multiple tracks. Leverage the latest Microsoft solutions to increase agility and rein in costs. Cognizant is one of the 10 global integrators for Microsoft, with thousands of consultants. Through our partnership, we have delivered thousands of projects to Global 1000 clients. No wonder we are often first to release toolkits for Microsoft's newest solutions. Cognizant - Connecting.
2. What are the levels of Office 365 Administration and what functionality does each level provide or limit?
Answer:
- Global Admin: has access to all admin features
- Billing Admin: makes purchases, manages subscriptions, manages support tickets, monitors service health
- Password Admin: resets passwords
- Service Admin: manages service requests and monitors service health
- User Management Admin: resets passwords, manages user accounts, user groups, and service requests
- Exchange Admin: has administrative access to Exchange Online through the Exchange admin center
- SharePoint Admin: has administrative access to SharePoint Online through the SharePoint Online admin center
- Skype for Business Admin: has administrative access to Skype for Business through Skype for the Business admin center
*Ask them what Administrator experience they have, and at what Office 365 Administrator role.
3. To What Extent Are Different Mobile Devices Supported With The New Office 365?
Answer: You’ll find more details on support for various types of devices here. (MJF: As my CNET colleague Jay Greene noted yesterday, Microsoft still isn’t saying anything new/more about plans to make Office available on the iPad.)
4. Is it possible to mix and match different O365 subscriptions? IE. Having some users on an E1 plan and others on the E2/Midsize business plan?
Answer: You can mix plans within a plan family so yes you can mix Enterprise E1, E3, E4, K1 plans. You can also mix Small Business plans P1 and P2 plans. M plans cannot be mixed with any others.
5. Will organizations using Live@edu be able to move their SkyDrive files directly to Office 365 for Education, now that SkyDrive is part of the offering?
Answer: Students and teachers who have been using SkyDrive with Live@edu will continue to have access to their documents and files stored on SkyDrive. They can easily move files between their consumer SkyDrive and SkyDrive Pro provided by the organizations with Office 365. There is no way for an organization to move these files on behalf of the user.
6. Is the cost of the Project Online service on top of an Office 365 E(n) plan?
Answer: Project Online is an additional service to Office 365 E Plans which delivers enterprise Project, Program and Portfolio Management. (MJF: The same is true of Visio Online).
7. What about pricing for the new Office 365 for business offerings?
Answer: Microsoft’s Office site has comparison information for small business users and midsize/enterprise users.
8. If you are in a hybrid environment and want to create a new mailbox – how and where would you do that?
Answer: Create the mailbox in the on-premises mailbox, then move it to Office 365 using the move request. For details, please refer to Move Mailboxes Between On-Premises and Exchange Online Organizations in 2013 Hybrid Deployments.
9. How does the mail client know where to send mail once the mailbox has been moved to the cloud?
Answer: In a hybrid deployment, once the user is migrated, the migration will set a TargetAddress attribute to the on-premises user. The message will be delivered to Office 365 based on the attribute.
10. What is Active Directory?
Answer: It is a directory that stores data pertaining to the users within a network as well as the objects within the network.
Outlook 365 Cognizant Sign In
11. What is Content-type?
Answer: According to Microsoft, A content type is a reusable collection of metadata (columns), workflow, behavior, and other settings for a category of items or documents in a SharePoint list or document library. Content types enable you to manage the settings for a category of information in a centralized, reusable way.
12. Name some actions used in SharePoint Designer workflow?
Answer: Assign a task: is used to create a SharePoint task and assign it to a single participant.
- Start a task process: is used to assign a task to multiple participants.
- Wait for Event in List Item: Used to wait for a new item to be created or an item to be changed.
- Wait for Project Event: Used to wait for a project to be checked in, committed, or submitted.
Wait for Field Change in Current Item: Used to wait for a field to be changed in the current item. (Microsoft office 365 interview questions and answers)
13. What is the visual web parts?
Answer: Microsoft SharePoint 2010 introduced Visual Web Parts. Visual Web Parts are similar to user controls in that you can simply drag and drop items from the Toolbox onto your custom controls to create a Web Part UI. You also get the code-behind file where you implement the UI logic. Technically, the SharePoint 2010 Visual Web Part is an ASCX web user control that is hosted inside a standard Web Part.
A Visual Web Part is simply a classic Web Part that automatically loads the web user control with it. The advantage of this approach is that you can use Visual Web Developer to design the web user control. Traditional Web Parts differ from Visual Web Parts in several ways.
14. What is the difference between Content Editor & Script Editor Web part in SharePoint?
Answer: Content editor web parts can be exported while Script Editors cannot be exported by default.
In Script Editor Web Part we can paste HTML and JavaScript only. In Content Editor web part we can add HTML, JavaScript, formatted text, tables, hyperlinks, and images also.
In the Content Editor web part, we can give a link to the file uploaded in a document library. In Script editor web part we do not have such an option.
15. When Is A Switch Statement Better Than Multiple If Statements?
Answer: A switch statement is best to use in the case when one has more than two conditional expressions which are based on a single numeric type variable.
16. What’s Rich Text Format?
Answer: Rich Text Format (RTF) is a specification for encoding formatted text and graphics. The principal benefit of RTF is that it’s supported by a number of word processors on a number of different platforms. For instance, if Joe uses Word on a PC to create RTF files, he could share them with Jane, who uses an entirely different word processor on a Macintosh. All versions of Word dating back to Word 1.0 natively support RTF.
Word can open and process RTF documents, and Word documents can be saved in RTF if desired. However, there is a security vulnerability involving the way Word opens such files, and this could allow macros to run without the user’s permission.
17. What’s An “include” File?
Answer: “include” files are ones that contain information that will be incorporated into a program file when it executes. Typically, these files contain parameters or commonly used code. However, they should never contain sensitive information like passwords. If this recommendation has been followed, even an attacker who could read the files would gain nothing from them.
18. Mention what is recommended when you are using an exchange account for your work when you are offline?
Answer: It is suggested that you use Cached Exchange Mode when you are using an exchange account for your work, as it eliminates all the reason to work offline. With Cache Exchange Mode, you can keep continuing working even if you are disconnected with the network. Cached Exchange Mode uses a folder file (.ost) and manages a synchronized copy of the items in all folder in the mailbox when you are offline. As soon as you are connected to the network, it syncs your data automatically to the server without losing any data.
19. Explain what are the important features of Transport Pipeline?
Answer: Transport pipeline is made up of three different services:
Front end transport service: It does basic message filtering based on domains, connectors, senders and recipients. It only connects with the transport service on a mailbox server and does not backlog any messages locally
Transport service: It runs on all mailbox servers, and it handles SMTP mail flow. It helps in message categorization and content inspection. The transport services routes messages between the Mailbox Transport service, the Transport Service and Front End Transport service. This service does not queue messages locally
Mailbox Transport: This system includes receiving and sending SMTP to the transport service from mailbox using RPC (Remote Procedure Call).
20. Explain what is the role of categorizer?
Answer: Categorizer performs the following functions
Recipient Resolution: The e-mail address of the recipient is resolved to decide whether the recipient has got a mailbox in the Exchange Organization or an external e-mail address. Routing Resolution: Once the information regarding the recipient is resolved, the ultimate destination for the mail is routed, and the next hop is determined. Content Conversion: Once the mail has reached its determined address, the SMTP is converted into a readable format like HTML, rich text format or plain text.
21. How to create Birthday wishes workflow in SharePoint designer?
Answer: You basically need 2 workflows that will end up triggering each other to create a loop.
The workflows would check to see if the date the workflow is being executed is the same as the birthday. If it is, email the user, if it doesn’t wait 24 hours, update a trigger field in your list and end. This updating of the trigger will cause the other workflow to start and do the same thing.
In SP 2013, there will be loop actions, so this should finally be easier to accomplish.
22. What Does The Patch Do?
Answer: The patch eliminates the vulnerability by causing the correct macro checking to be performed even when opening an RTF file linked to a Word template.
23. Explain the term DAG (Data Availability Group)?
Answer: DAG or Data Availability Group is a framework build is MS Exchange 2013. It is a group of up to 16 mailbox server that hosts a set of databases and provides automatic database-level recovery due to failure of servers or databases.
24. What action does Front End Transport service do?
Answer: Front end transport service does one of the following actions based on the number and type of the recipients
For the message with a single mailbox recipient, choose a mailbox server in the target delivery group and based on the proximity of the AD site, give preference to the mailbox server
For the message with multiple or several mailbox recipients, it uses the first 20 recipients to select a mailbox in a closest proximity or delivery group, based on the AD site proximity
If the message has no mailbox recipients, it chooses a random mailbox server in the local AD site.
25. Mention what is the function of mailbox Transport Submission service?
Answer: Mailbox Transport Submission service does one of the following actions based on the number and type of recipients.
For the message having only one mailbox recipient, it chooses a mailbox server in the target delivery group and gives priority to the mailbox server based on the AD site proximity
With multiple mailbox recipients, it uses first 20 recipients to choose a Mailbox server in the closest delivery group, based on the AD site proximity
If there is no mailbox recipient, select a mailbox server in the local delivery group.
26. What is the purpose of DAC?
Answer: DAC mode is used to control the startup database mount behavior of a DAG. When DAC mode isn’t enabled and a failure occurs that affects multiple servers in the DAG, and then when a majority of the DAG members are restored after the failure, the DAG will restart and attempt to mount databases. In a multi-datacenter configuration, this behavior could cause the split-brain syndrome, a condition that occurs when all networks fail, and DAG members can’t receive heartbeat signals from each other. The split-brain syndrome can also occur when network connectivity is severed between datacenters. Split-brain syndrome is prevented by always requiring a majority of the DAG members (and in the case of DAGs with an even number of members, the DAG’s witness server) to be available and interacting for the DAG to be operational. When a majority of the members are communicating, the DAG is said to have a quorum.
27. What is the purpose of File Share Witness?
Answer: A witness server is a server outside a DAG that’s used to achieve and maintain quorum when the DAG has an even number of members. DAGs with an odd number of members don’t use a witness server. All DAGs with an even number of members must use a witness server. The witness server can be any computer running Windows Server. There is no requirement that the version of the Windows Server operating system of the witness server matches the operating system used by the DAG members.
28. What is the purpose of safety-net and transport dumpster?
Answer: Transport dumpster helps to protect against data loss by maintaining a queue of successfully delivered messages that hadn’t replicated to the passive mailbox database copies in the DAG. When a mailbox database or server failure required the promotion of an out-of-date copy of the mailbox database, the messages in the transport dumpster were automatically resubmitted to the new active copy of the mailbox database.
The transport dumpster has been improved in Exchange 2013 and is now called Safety Net.
The similarity between Safety Net and transport dumpster in Exchange 2010:
Safety Net is a queue that’s associated with the Transport service on a Mailbox server. This queue stores copies of messages that were successfully processed by the server. You can specify how long Safety Net stores copies of the successfully processed messages before they expire and are automatically deleted. The default is 2 days.
29. What is Exchange Server?
Answer: Exchange Server is a Microsoft’s Messaging system which provides Industry leading Email, calendaring and unified Messaging.
30. Why not install Exchange on the same machine as a DC?
Answer: The main reason behind not to install Exchange Server is when we used to restart the Exchange server for any reason it will take a lot of time to shut down the Exchange Server services.
31. What is ForestPrep?
Answer: Forest prep updates the schema and configuration partition in Active directory. Extend the schema to include Exchange server 2003 specific classes and attributes.
32. What is DomainPrep?
Answer: Domain Prep prepares the Domain partition in Active Directory. Forest prep should be run only once in the forest where Domain Prep should be run in following Servers. The Forest root Domain.
33. What is the Exchange Admin Center?
Answer: Exchange Admin Center is the new web-based Exchange Management Console for Exchange Server 2013, it allows for ease of use and is optimized for management of On-Premises, Online, and hybrid Exchange deployments. EAC replaces Exchange Management Console and Exchange Control Panel, but ECP is still the URL for Exchange Admin Center.
34. Why Exchange 2013 architecture has been changed with two server roles?
Answer: Exchange 2007 and 2010 were an architect with certain technology constraint that existed at that time, where CPU performance was the Key constraint when Exchange 2007 was released and to alleviate the situation Server roles were introduced. However, server roles in Exchange 2007 and Exchange 2010 are tightly coupled.
Nowadays, CPU horsepower is less expensive and it is not a constraining factor, with that constraint lifted, the primary goal for Exchange 2013 is the simplicity of scale, hardware utilization, and failure isolation. So Microsoft reduced the number of server roles to two as Client Access Server Role and Mailbox Server Role.
35. Explain the New Transport Pipeline in Short?
Answer: Front End Transport Service in Client Access Server acts as a stateless proxy for all inbound and outbound external SMTP traffic for Exchange 2013 organization. It won’t inspect message content, only communicates with the Transport Service on a Mailbox Server, and doesn’t queue any messages locally.
Transport Service in Mailbox server is identical to Hub Transport server, it handles all SMTP mail flow for the organization, perform message categorization, and performs a content inspection. It won’t communicate directly with Mailbox Database that task will be handled by Mailbox Transport Service. So the Transport Service routes messages between the mailbox transport service, the transport service and the front end transport service.
- Mailbox Transport Service running on Mailbox server consists of two separate services: the Mailbox Transport Submission Service and Mailbox Transport Delivery Service.
- Mailbox Transport Delivery Service receives emails from Transport Service on the local or different mailbox server and connects to the local mailbox databases using Exchange RPC to deliver the message.
- Mailbox Transport Submission service connects to the local mailbox database using RPC to retrieve messages and submits the messages over SMTP to the Transport Service on the local Mailbox server or other Mailbox Servers.
36. What will happen to Exchange 2013 RTM version when 120 days trial period expires?
Answer: Exchange 2013 functionality will not lose when the trial period expires, so you can maintain lab without having to reinstall the trial version.
37. What is the Exchange Control Panel?
Answer: ECP it’s a new and simplified web-based management console and it’s a browser-based management
client for the end-user, administrators and specialist, ECP can be accessed via URL, browsers and outlook 2010, ECP deployed as part of the client access server role, Simplified user administration for management tasks and it’s RBAC aware.
38. What is the Microsoft Federation Gateway?
Answer: Exchange Server 2010 uses Microsoft Federation Gateway (MFG), an identity service that runs in the cloud, as the trust broker. Exchange organizations wanting to use Federation establish a Federation Trust with MFG, allowing it to become a federation partner to the Exchange organization. The trust allows users authenticated by Active Directory, known as the identity provider (IP), to be issued Security Assertion Markup Language (SAML) delegation tokens by MFG. The delegation tokens allow users from one federated organization to be trusted by another federated organization. With MFG acting as the trust broker, organizations are not required to establish multiple individual trust relationships with other organizations. Users can access external resources using a single sign-on (SSO) experience.
39. Explain the Client Access Server Role?
Answer: The role that handles client requests for OWA, Outlook Anywhere, ActiveSync, OVA, and offline address book distribution. This role must be installed after the hub transport role and before the mailbox server role. You can install the mailbox server role at the same time as the client access role, but not before.
40. What can I use it on?
Answer: The good thing about the Office 365 subscription is that it’s one payment that covers whichever device on whichever platform you want to use it on.
The office now has a presence on every major platform. There are desktop apps for Windows and Mac, there are mobile apps for iOS and Android as well as Windows Phone.
We also now have the touch office apps that are available on Windows 10 which will, in some cases (like on 10+inch devices), require Office 365. Likewise, to get full functionality out of the Android and iOS Office Mobile apps you’ll need a subscription.
Note: Browse Latest Office 365 Interview Questions and office 365 Tutorials Here you can check Office 365 training online details and office 365 Training videos for self learning. Contact +91 988 502 2027 for more information.
-->A key task of any Administrator is to protect and secure an organization’s resources and data on devices in their organization. This task is device management. Users receive and send email from personal accounts, browse websites from home and from restaurants, and install apps and games. These users are also employees and students. On their devices, they want to access work and school resources, such as email and OneNote, and access them quickly. As an administrator, your goal is to protect these resources, and provide easy access for users across their many devices, all at the same time.
Device management enables organizations to protect and secure their resources and data, and from different devices.
Using a device management provider, organization can make sure that only authorized people and devices get access to proprietary information. Similarly, device users can feel at ease accessing work data from their phone, because they know their device meet their organization's security requirements. As an organization, you might ask - What should we use to protect our resources?
The answer is Microsoft Intune. Intune offers mobile device management (MDM) and mobile application management (MAM). Some key tasks of any MDM or MAM solution are to:
- Support a diverse mobile environment and manage iOS/iPadOS, Android, Windows, and macOS devices securely.
- Make sure devices and apps are compliant with your organization's security requirements.
- Create policies that help keep your organization data safe on organization-owned and personal devices.
- Use a single, unified mobile solution to enforce these policies, and help manage devices, apps, users, and groups.
- Protect your company information by helping to control the way your workforce accesses and shares its data.
Intune is included with Microsoft Azure, Microsoft 365, and integrates with Azure Active Directory (Azure AD). Azure AD helps control who has access, and what they have access to.
Microsoft Intune
Many organizations, including Microsoft, use Intune to secure proprietary data that users access from their company-owned and personally owned devices. Intune includes device and app configuration policies, software update policies, and installation statuses (charts, tables, and reports). These resources help you secure and monitor data access.
It's common for people to have multiple devices that use different platforms. For example, an employee might use Surface Pro for work, and an Android mobile device in their personal life. And, it's common for a person to access organizational resources, such as Microsoft Outlook and SharePoint, from these multiple devices.
With Intune, you can manage multiple devices per person, and the different platforms that run on each device, including iOS/iPadOS, macOS, Android, and Windows. Intune separates policies and settings by device platform. So it's easy to manage and view devices of a specific platform.
Common scenarios is a great resource to see how Intune answers common questions when working with mobile devices. You'll find scenarios about:
- Protecting email with on-premises Exchange
- Accessing Microsoft 365 safely and securely
- Using personal devices to access organizational resources
For more information about Intune, see What is Intune.
Co-management and tenant attach
Many organizations use on-premises Configuration Manager to manage devices, including desktops and servers. You can cloud-attach your on-premises Configuration Manager to Microsoft Intune. When you cloud-attach, you get the benefits of Intune and the cloud, including conditional access, running remote actions, using Windows Autopilot, and more.
Microsoft Endpoint Manager is a solution platform that unifies several services. It includes Microsoft Intune for cloud-based device management, and Configuration Manager + Intune for cloud-attach device management.
If you use Configuration Manager, and you're ready to move some tasks to the cloud, then co-management is your answer. For more information about cloud-attaching your Configuration Manager, see What is co-management.
Endpoint Manager tenant attach is also an option. You upload your devices to the Endpoint Manager admin center, without enabling automatic enrollment for co-management or switching workloads to Intune. You can see your devices, and run actions on Configuration Manager managed devices. For more information, see Microsoft Endpoint Manager tenant attach.
Integration with secure-and-protect services
A key task of any device management solution is to provide security and protection. Intune does a great job of integrating with other services to achieve this task. For example:
Microsoft 365 is a key component to simplifying common IT tasks. In the Microsoft 365 admin center, you create users, and manage groups. You also get access to other services, such as Intune, Azure AD, and more.
For example, create an iOS/iPadOS devices group in Microsoft 365. Then, use Intune to push policies to the iOS/iPadOS devices group that focus on iOS/iPadOS features, such as access to the app store, using AirDrop, backing up to iCloud, using Apple's web filter, and more.
Windows Defender includes many security features to help protect Windows 10 devices. For example, using Intune and Windows Defender together, you can:
- Enable Windows Defender SmartScreen to look for suspicious activity in files and apps on mobile devices.
- Use Microsoft Defender for Endpoint) to help prevent security breaches on mobile devices. And, help limit the impact of a security breach by blocking a user from corporate resources.
Conditional Access is a feature of Azure Active Directory, and integrates nicely with Intune. Using Conditional Access, make sure only compliant devices are allowed access to email, SharePoint, and other apps.
Choose the device management solution that's right for you
There are a couple of ways to approach device management. First, you can manage different aspects of devices using the features built in to Intune. This approach is called Mobile device management (MDM). Users 'enroll' their devices, and use certificates to communicate with Intune. As an IT administrator, you push apps on devices, restrict devices to a specific operating system, block personal devices, and more. If a device is ever lost or stolen, you can also remove all data from the device.
Outlook Email
In the second approach, you manage apps on devices. This approach is called Mobile application management (MAM). Users can use their personal devices to access organizational resources. When opening an app, such as email or SharePoint, users can be prompted to authenticate. If a device is ever lost or stolen, you can remove all organization data from the Intune managed applications.
Office 365
You can also use a combination of MDM and MAM together.
Simplify IT tasks using the Device Management admin center
The Microsoft Endpoint Manager admin center is a one-stop shop to manage and complete tasks for your mobile devices. This admin center includes the services used for device management, including Intune and Azure Active Directory, and to also manage client apps.
On the Device Management admin center, you can:
- Manage software updates
Next steps
When you're ready to get started with an MDM or MAM solution, walk through the different steps to set up Intune, enroll devices, and start creating policies. The Microsoft Intune planning guide is a good resource.
Microsoft IT case study: Migrating mobile device management to Intune in the Azure portal