Enforce security, privacy, and compliance in Microsoft Teams

Go to class
Write Review

Free Online Course: Enforce security, privacy, and compliance in Microsoft Teams provided by Microsoft Learn is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Understand what security capabilities are available in Microsoft Teams.
    • At the end of this module, you should be able to:

      • Describe enterprise-grade security in Teams.
      • Explain integrated security across SharePoint, OneDrive, Office, and Windows.
      • Describe security settings and policies in Teams.
    • Module 2: Protect identity and access in Microsoft Teams across your organization.
    • At the end of this module, you should be able to:

      • Explain how to simplify access and identity provisioning in Microsoft Teams.
      • Demonstrate how to strengthen authentication in Microsoft Teams.
      • Explain how to manage Microsoft Teams endpoints.
    • Module 3: Manage security in Microsoft Teams for your organization
    • At the end of this module, you should be able to:

      • Describe the Microsoft Teams security model.
      • Explain how to manage security and compliance in Teams.
      • Demonstrate how to secure Microsoft Teams with three tiers of protection.
    • Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
    • At the end of this module, you should be able to:

      • Describe the Microsoft Defender for Endpoint features within Teams.
      • Describe how security is implemented for cloud applications.
      • Explain how to restrict and control access to Teams resources using Conditional Access.
    • Module 5: Protect identity and access in Microsoft Teams across your organization.
    • At the end of this module, you should be able to:

      • Demonstrate how to configure data loss prevention policies.
      • Describe how to determine data residency.
      • Explain how to record access in Microsoft Teams.
      • Explain secure guest access.
    • Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
    • At the end of this module, you should be able to:

      • Explain how to configure calling policies.
      • Describe how to protect your users' voicemails.
      • Demonstrate how to block inbound calls.
      • Explain how to configure caller ID policies.
    • Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
    • At the end of this module, you should be able to:

      • Explain how your organization meets communication compliance requirements.
      • Describe how you can use eDiscovery with Teams.
      • Demonstrate how to use AppLocker control policies in Teams.
      • Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
    • Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
    • At the end of this module, you should be able to:

      • Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
      • Explain how to diagnose common problems in Teams by using logs.
      • Describe how to maintain capacity in Teams by monitoring user demand and behavior.

Syllabus
    • Module 1: Get started securing your Microsoft Teams environment
      • Introduction
      • Explore enterprise-grade security in Teams
      • Examine security across SharePoint, OneNote, Exchange, and Teams
      • Enforce security using settings and policies
      • Exercise - Configure identity, access management, and threat protection for Teams
      • Knowledge check
      • Summary
    • Module 2: Protect identity and access in Microsoft Teams
      • Introduction
      • Simplify access and identity provisioning
      • Strengthen authentication when using Teams
      • Manage endpoints in Microsoft Teams
      • Knowledge check
      • Summary
    • Module 3: Manage security in Microsoft Teams
      • Introduction
      • Investigate the Microsoft Teams security model
      • Manage security and compliance for Microsoft Teams
      • Secure Microsoft Teams with three tiers of protection
      • Knowledge check
      • Summary
    • Module 4: Defend against threats in Teams
      • Introduction
      • Explore Microsoft Defender for Endpoint
      • Examine the Defender for Cloud Apps
      • Implement Conditional Access in Teams
      • Knowledge check
      • Summary
    • Module 5: Protect information in Microsoft Teams
      • Introduction
      • Configure data loss prevention
      • Determine data residency
      • Record access
      • Secure guest access
      • Knowledge check
      • Summary
    • Module 6: Secure Microsoft Teams voice functionality
      • Introduction
      • Control calling features
      • Protect voicemail
      • Control inbound calls
      • Control caller ID information
      • Knowledge check
      • Summary
    • Module 7: Implement compliance in Teams
      • Introduction
      • Control compliance in Microsoft Teams
      • Complete a legal investigation using the Microsoft 365 Defender portal
      • Manage and secure Teams using AppLocker
      • Knowledge check
      • Summary
    • Module 8: Monitor, troubleshoot, and investigate Teams usage
      • Introduction
      • Monitor call quality in Teams
      • Troubleshoot Teams
      • Investigate Teams usage with reports
      • Knowledge check
      • Summary