Enforce security, privacy, and compliance in Microsoft Teams
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Understand what security capabilities are available in Microsoft Teams.
- Describe enterprise-grade security in Teams.
- Explain integrated security across SharePoint, OneDrive, Office, and Windows.
- Describe security settings and policies in Teams.
- Module 2: Protect identity and access in Microsoft Teams across your organization.
- Explain how to simplify access and identity provisioning in Microsoft Teams.
- Demonstrate how to strengthen authentication in Microsoft Teams.
- Explain how to manage Microsoft Teams endpoints.
- Module 3: Manage security in Microsoft Teams for your organization
- Describe the Microsoft Teams security model.
- Explain how to manage security and compliance in Teams.
- Demonstrate how to secure Microsoft Teams with three tiers of protection.
- Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
- Describe the Microsoft Defender for Endpoint features within Teams.
- Describe how security is implemented for cloud applications.
- Explain how to restrict and control access to Teams resources using Conditional Access.
- Module 5: Protect identity and access in Microsoft Teams across your organization.
- Demonstrate how to configure data loss prevention policies.
- Describe how to determine data residency.
- Explain how to record access in Microsoft Teams.
- Explain secure guest access.
- Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
- Explain how to configure calling policies.
- Describe how to protect your users' voicemails.
- Demonstrate how to block inbound calls.
- Explain how to configure caller ID policies.
- Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
- Explain how your organization meets communication compliance requirements.
- Describe how you can use eDiscovery with Teams.
- Demonstrate how to use AppLocker control policies in Teams.
- Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
- Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
- Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
- Explain how to diagnose common problems in Teams by using logs.
- Describe how to maintain capacity in Teams by monitoring user demand and behavior.
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
Syllabus
- Module 1: Get started securing your Microsoft Teams environment
- Introduction
- Explore enterprise-grade security in Teams
- Examine security across SharePoint, OneNote, Exchange, and Teams
- Enforce security using settings and policies
- Exercise - Configure identity, access management, and threat protection for Teams
- Knowledge check
- Summary
- Module 2: Protect identity and access in Microsoft Teams
- Introduction
- Simplify access and identity provisioning
- Strengthen authentication when using Teams
- Manage endpoints in Microsoft Teams
- Knowledge check
- Summary
- Module 3: Manage security in Microsoft Teams
- Introduction
- Investigate the Microsoft Teams security model
- Manage security and compliance for Microsoft Teams
- Secure Microsoft Teams with three tiers of protection
- Knowledge check
- Summary
- Module 4: Defend against threats in Teams
- Introduction
- Explore Microsoft Defender for Endpoint
- Examine the Defender for Cloud Apps
- Implement Conditional Access in Teams
- Knowledge check
- Summary
- Module 5: Protect information in Microsoft Teams
- Introduction
- Configure data loss prevention
- Determine data residency
- Record access
- Secure guest access
- Knowledge check
- Summary
- Module 6: Secure Microsoft Teams voice functionality
- Introduction
- Control calling features
- Protect voicemail
- Control inbound calls
- Control caller ID information
- Knowledge check
- Summary
- Module 7: Implement compliance in Teams
- Introduction
- Control compliance in Microsoft Teams
- Complete a legal investigation using the Microsoft 365 Defender portal
- Manage and secure Teams using AppLocker
- Knowledge check
- Summary
- Module 8: Monitor, troubleshoot, and investigate Teams usage
- Introduction
- Monitor call quality in Teams
- Troubleshoot Teams
- Investigate Teams usage with reports
- Knowledge check
- Summary
Tags
Related Courses
Building a Team in Microsoft TeamsCoursera Project Network via Coursera Dynamics 365: Implementing Power Platform Integrations
Cloudswyft via FutureLearn Creating and Managing Teams Sites and Channels
Coursera Project Network via Coursera Enabling Teamwork with Microsoft Teams
Microsoft via edX Get Started with Microsoft Teams
Coursera Project Network via Coursera