YoVDO

Enforce security, privacy, and compliance in Microsoft Teams

Offered By: Microsoft via Microsoft Learn

Tags

Microsoft Teams Courses IT Compliance Courses Identity and Access Management Courses Data Loss Prevention Courses Compliance Management Courses

Course Description

Overview

  • Module 1: Understand what security capabilities are available in Microsoft Teams.
  • At the end of this module, you should be able to:

    • Describe enterprise-grade security in Teams.
    • Explain integrated security across SharePoint, OneDrive, Office, and Windows.
    • Describe security settings and policies in Teams.
  • Module 2: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Explain how to simplify access and identity provisioning in Microsoft Teams.
    • Demonstrate how to strengthen authentication in Microsoft Teams.
    • Explain how to manage Microsoft Teams endpoints.
  • Module 3: Manage security in Microsoft Teams for your organization
  • At the end of this module, you should be able to:

    • Describe the Microsoft Teams security model.
    • Explain how to manage security and compliance in Teams.
    • Demonstrate how to secure Microsoft Teams with three tiers of protection.
  • Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
  • At the end of this module, you should be able to:

    • Describe the Microsoft Defender for Endpoint features within Teams.
    • Describe how security is implemented for cloud applications.
    • Explain how to restrict and control access to Teams resources using Conditional Access.
  • Module 5: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Demonstrate how to configure data loss prevention policies.
    • Describe how to determine data residency.
    • Explain how to record access in Microsoft Teams.
    • Explain secure guest access.
  • Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
  • At the end of this module, you should be able to:

    • Explain how to configure calling policies.
    • Describe how to protect your users' voicemails.
    • Demonstrate how to block inbound calls.
    • Explain how to configure caller ID policies.
  • Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
  • At the end of this module, you should be able to:

    • Explain how your organization meets communication compliance requirements.
    • Describe how you can use eDiscovery with Teams.
    • Demonstrate how to use AppLocker control policies in Teams.
    • Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
  • Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
  • At the end of this module, you should be able to:

    • Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
    • Explain how to diagnose common problems in Teams by using logs.
    • Describe how to maintain capacity in Teams by monitoring user demand and behavior.

Syllabus

  • Module 1: Get started securing your Microsoft Teams environment
    • Introduction
    • Explore enterprise-grade security in Teams
    • Examine security across SharePoint, OneNote, Exchange, and Teams
    • Enforce security using settings and policies
    • Exercise - Configure identity, access management, and threat protection for Teams
    • Knowledge check
    • Summary
  • Module 2: Protect identity and access in Microsoft Teams
    • Introduction
    • Simplify access and identity provisioning
    • Strengthen authentication when using Teams
    • Manage endpoints in Microsoft Teams
    • Knowledge check
    • Summary
  • Module 3: Manage security in Microsoft Teams
    • Introduction
    • Investigate the Microsoft Teams security model
    • Manage security and compliance for Microsoft Teams
    • Secure Microsoft Teams with three tiers of protection
    • Knowledge check
    • Summary
  • Module 4: Defend against threats in Teams
    • Introduction
    • Explore Microsoft Defender for Endpoint
    • Examine the Defender for Cloud Apps
    • Implement Conditional Access in Teams
    • Knowledge check
    • Summary
  • Module 5: Protect information in Microsoft Teams
    • Introduction
    • Configure data loss prevention
    • Determine data residency
    • Record access
    • Secure guest access
    • Knowledge check
    • Summary
  • Module 6: Secure Microsoft Teams voice functionality
    • Introduction
    • Control calling features
    • Protect voicemail
    • Control inbound calls
    • Control caller ID information
    • Knowledge check
    • Summary
  • Module 7: Implement compliance in Teams
    • Introduction
    • Control compliance in Microsoft Teams
    • Complete a legal investigation using the Microsoft 365 Defender portal
    • Manage and secure Teams using AppLocker
    • Knowledge check
    • Summary
  • Module 8: Monitor, troubleshoot, and investigate Teams usage
    • Introduction
    • Monitor call quality in Teams
    • Troubleshoot Teams
    • Investigate Teams usage with reports
    • Knowledge check
    • Summary

Tags

Related Courses

Building a Team in Microsoft Teams
Coursera Project Network via Coursera
Dynamics 365: Implementing Power Platform Integrations
Cloudswyft via FutureLearn
Creating and Managing Teams Sites and Channels
Coursera Project Network via Coursera
Enabling Teamwork with Microsoft Teams
Microsoft via edX
Get Started with Microsoft Teams
Coursera Project Network via Coursera