Enforce security, privacy, and compliance in Microsoft Teams
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Understand what security capabilities are available in Microsoft Teams.
- Describe enterprise-grade security in Teams.
- Explain integrated security across SharePoint, OneDrive, Office, and Windows.
- Describe security settings and policies in Teams.
- Module 2: Protect identity and access in Microsoft Teams across your organization.
- Explain how to simplify access and identity provisioning in Microsoft Teams.
- Demonstrate how to strengthen authentication in Microsoft Teams.
- Explain how to manage Microsoft Teams endpoints.
- Module 3: Manage security in Microsoft Teams for your organization
- Describe the Microsoft Teams security model.
- Explain how to manage security and compliance in Teams.
- Demonstrate how to secure Microsoft Teams with three tiers of protection.
- Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
- Describe the Microsoft Defender for Endpoint features within Teams.
- Describe how security is implemented for cloud applications.
- Explain how to restrict and control access to Teams resources using Conditional Access.
- Module 5: Protect identity and access in Microsoft Teams across your organization.
- Demonstrate how to configure data loss prevention policies.
- Describe how to determine data residency.
- Explain how to record access in Microsoft Teams.
- Explain secure guest access.
- Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
- Explain how to configure calling policies.
- Describe how to protect your users' voicemails.
- Demonstrate how to block inbound calls.
- Explain how to configure caller ID policies.
- Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
- Explain how your organization meets communication compliance requirements.
- Describe how you can use eDiscovery with Teams.
- Demonstrate how to use AppLocker control policies in Teams.
- Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
- Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
- Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
- Explain how to diagnose common problems in Teams by using logs.
- Describe how to maintain capacity in Teams by monitoring user demand and behavior.
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
At the end of this module, you should be able to:
Syllabus
- Module 1: Get started securing your Microsoft Teams environment
- Introduction
- Explore enterprise-grade security in Teams
- Examine security across SharePoint, OneNote, Exchange, and Teams
- Enforce security using settings and policies
- Exercise - Configure identity, access management, and threat protection for Teams
- Knowledge check
- Summary
- Module 2: Protect identity and access in Microsoft Teams
- Introduction
- Simplify access and identity provisioning
- Strengthen authentication when using Teams
- Manage endpoints in Microsoft Teams
- Knowledge check
- Summary
- Module 3: Manage security in Microsoft Teams
- Introduction
- Investigate the Microsoft Teams security model
- Manage security and compliance for Microsoft Teams
- Secure Microsoft Teams with three tiers of protection
- Knowledge check
- Summary
- Module 4: Defend against threats in Teams
- Introduction
- Explore Microsoft Defender for Endpoint
- Examine the Defender for Cloud Apps
- Implement Conditional Access in Teams
- Knowledge check
- Summary
- Module 5: Protect information in Microsoft Teams
- Introduction
- Configure data loss prevention
- Determine data residency
- Record access
- Secure guest access
- Knowledge check
- Summary
- Module 6: Secure Microsoft Teams voice functionality
- Introduction
- Control calling features
- Protect voicemail
- Control inbound calls
- Control caller ID information
- Knowledge check
- Summary
- Module 7: Implement compliance in Teams
- Introduction
- Control compliance in Microsoft Teams
- Complete a legal investigation using the Microsoft 365 Defender portal
- Manage and secure Teams using AppLocker
- Knowledge check
- Summary
- Module 8: Monitor, troubleshoot, and investigate Teams usage
- Introduction
- Monitor call quality in Teams
- Troubleshoot Teams
- Investigate Teams usage with reports
- Knowledge check
- Summary
Tags
Related Courses
Compliance in the Cloud FundamentalsA Cloud Guru Introduction to Governance and Compliance on AWS
A Cloud Guru Introduction to Governance and Compliance on Azure
A Cloud Guru AWS CustomerCast - Automate Risk, Compliance and Evidence
Amazon Web Services via AWS Skill Builder AWS: Network Security, Compliance and Governance
Whizlabs via Coursera