YoVDO

Enforce security, privacy, and compliance in Microsoft Teams

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Teams Courses IT Compliance Courses Identity and Access Management Courses Data Loss Prevention Courses Compliance Management Courses

Course Description

Overview

  • Module 1: Understand what security capabilities are available in Microsoft Teams.
  • At the end of this module, you should be able to:

    • Describe enterprise-grade security in Teams.
    • Explain integrated security across SharePoint, OneDrive, Office, and Windows.
    • Describe security settings and policies in Teams.
  • Module 2: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Explain how to simplify access and identity provisioning in Microsoft Teams.
    • Demonstrate how to strengthen authentication in Microsoft Teams.
    • Explain how to manage Microsoft Teams endpoints.
  • Module 3: Manage security in Microsoft Teams for your organization
  • At the end of this module, you should be able to:

    • Describe the Microsoft Teams security model.
    • Explain how to manage security and compliance in Teams.
    • Demonstrate how to secure Microsoft Teams with three tiers of protection.
  • Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
  • At the end of this module, you should be able to:

    • Describe the Microsoft Defender for Endpoint features within Teams.
    • Describe how security is implemented for cloud applications.
    • Explain how to restrict and control access to Teams resources using Conditional Access.
  • Module 5: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Demonstrate how to configure data loss prevention policies.
    • Describe how to determine data residency.
    • Explain how to record access in Microsoft Teams.
    • Explain secure guest access.
  • Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
  • At the end of this module, you should be able to:

    • Explain how to configure calling policies.
    • Describe how to protect your users' voicemails.
    • Demonstrate how to block inbound calls.
    • Explain how to configure caller ID policies.
  • Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
  • At the end of this module, you should be able to:

    • Explain how your organization meets communication compliance requirements.
    • Describe how you can use eDiscovery with Teams.
    • Demonstrate how to use AppLocker control policies in Teams.
    • Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
  • Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
  • At the end of this module, you should be able to:

    • Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
    • Explain how to diagnose common problems in Teams by using logs.
    • Describe how to maintain capacity in Teams by monitoring user demand and behavior.

Syllabus

  • Module 1: Get started securing your Microsoft Teams environment
    • Introduction
    • Explore enterprise-grade security in Teams
    • Examine security across SharePoint, OneNote, Exchange, and Teams
    • Enforce security using settings and policies
    • Exercise - Configure identity, access management, and threat protection for Teams
    • Knowledge check
    • Summary
  • Module 2: Protect identity and access in Microsoft Teams
    • Introduction
    • Simplify access and identity provisioning
    • Strengthen authentication when using Teams
    • Manage endpoints in Microsoft Teams
    • Knowledge check
    • Summary
  • Module 3: Manage security in Microsoft Teams
    • Introduction
    • Investigate the Microsoft Teams security model
    • Manage security and compliance for Microsoft Teams
    • Secure Microsoft Teams with three tiers of protection
    • Knowledge check
    • Summary
  • Module 4: Defend against threats in Teams
    • Introduction
    • Explore Microsoft Defender for Endpoint
    • Examine the Defender for Cloud Apps
    • Implement Conditional Access in Teams
    • Knowledge check
    • Summary
  • Module 5: Protect information in Microsoft Teams
    • Introduction
    • Configure data loss prevention
    • Determine data residency
    • Record access
    • Secure guest access
    • Knowledge check
    • Summary
  • Module 6: Secure Microsoft Teams voice functionality
    • Introduction
    • Control calling features
    • Protect voicemail
    • Control inbound calls
    • Control caller ID information
    • Knowledge check
    • Summary
  • Module 7: Implement compliance in Teams
    • Introduction
    • Control compliance in Microsoft Teams
    • Complete a legal investigation using the Microsoft 365 Defender portal
    • Manage and secure Teams using AppLocker
    • Knowledge check
    • Summary
  • Module 8: Monitor, troubleshoot, and investigate Teams usage
    • Introduction
    • Monitor call quality in Teams
    • Troubleshoot Teams
    • Investigate Teams usage with reports
    • Knowledge check
    • Summary

Tags

Related Courses

Compliance in the Cloud Fundamentals
A Cloud Guru
Introduction to Governance and Compliance on AWS
A Cloud Guru
Introduction to Governance and Compliance on Azure
A Cloud Guru
AWS CustomerCast - Automate Risk, Compliance and Evidence
Amazon Web Services via AWS Skill Builder
AWS: Network Security, Compliance and Governance
Whizlabs via Coursera