Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Enforce security, privacy, and compliance in Microsoft Teams

Microsoft via Microsoft Learn

Overview

Prepare for a new career with $100 off Coursera Plus
Gear up for jobs in high-demand fields: data analytics, digital marketing, and more.
  • Module 1: Understand what security capabilities are available in Microsoft Teams.
  • At the end of this module, you should be able to:

    • Describe enterprise-grade security in Teams.
    • Explain integrated security across SharePoint, OneDrive, Office, and Windows.
    • Describe security settings and policies in Teams.
  • Module 2: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Explain how to simplify access and identity provisioning in Microsoft Teams.
    • Demonstrate how to strengthen authentication in Microsoft Teams.
    • Explain how to manage Microsoft Teams endpoints.
  • Module 3: Manage security in Microsoft Teams for your organization
  • At the end of this module, you should be able to:

    • Describe the Microsoft Teams security model.
    • Explain how to manage security and compliance in Teams.
    • Demonstrate how to secure Microsoft Teams with three tiers of protection.
  • Module 4: Learn about the powerful tools that can help identify and protect your cloud-based services using Microsoft Defender for Endpoint, Defender for Cloud Apps, and Conditional Access.
  • At the end of this module, you should be able to:

    • Describe the Microsoft Defender for Endpoint features within Teams.
    • Describe how security is implemented for cloud applications.
    • Explain how to restrict and control access to Teams resources using Conditional Access.
  • Module 5: Protect identity and access in Microsoft Teams across your organization.
  • At the end of this module, you should be able to:

    • Demonstrate how to configure data loss prevention policies.
    • Describe how to determine data residency.
    • Explain how to record access in Microsoft Teams.
    • Explain secure guest access.
  • Module 6: Learn about calling policies, protected voicemail, and caller ID policies in Microsoft Teams and how you can use them to protect your users.
  • At the end of this module, you should be able to:

    • Explain how to configure calling policies.
    • Describe how to protect your users' voicemails.
    • Demonstrate how to block inbound calls.
    • Explain how to configure caller ID policies.
  • Module 7: Learn how you can extend your organization's compliance and regulatory requirements into Teams.
  • At the end of this module, you should be able to:

    • Explain how your organization meets communication compliance requirements.
    • Describe how you can use eDiscovery with Teams.
    • Demonstrate how to use AppLocker control policies in Teams.
    • Demonstrate how to use the audit log, content search, and legal hold functions in Teams.
  • Module 8: Learn how to ensure your Teams users have an optimal experience by monitoring call quality, troubleshooting problems, and investigating usage reports.
  • At the end of this module, you should be able to:

    • Demonstrate how to monitor the quality of Teams calls and meetings and eliminate any with poor sound or unreliable connections.
    • Explain how to diagnose common problems in Teams by using logs.
    • Describe how to maintain capacity in Teams by monitoring user demand and behavior.

Syllabus

  • Module 1: Get started securing your Microsoft Teams environment
    • Introduction
    • Explore enterprise-grade security in Teams
    • Examine security across SharePoint, OneNote, Exchange, and Teams
    • Enforce security using settings and policies
    • Exercise - Configure identity, access management, and threat protection for Teams
    • Knowledge check
    • Summary
  • Module 2: Protect identity and access in Microsoft Teams
    • Introduction
    • Simplify access and identity provisioning
    • Strengthen authentication when using Teams
    • Manage endpoints in Microsoft Teams
    • Knowledge check
    • Summary
  • Module 3: Manage security in Microsoft Teams
    • Introduction
    • Investigate the Microsoft Teams security model
    • Manage security and compliance for Microsoft Teams
    • Secure Microsoft Teams with three tiers of protection
    • Knowledge check
    • Summary
  • Module 4: Defend against threats in Teams
    • Introduction
    • Explore Microsoft Defender for Endpoint
    • Examine the Defender for Cloud Apps
    • Implement Conditional Access in Teams
    • Knowledge check
    • Summary
  • Module 5: Protect information in Microsoft Teams
    • Introduction
    • Configure data loss prevention
    • Determine data residency
    • Record access
    • Secure guest access
    • Knowledge check
    • Summary
  • Module 6: Secure Microsoft Teams voice functionality
    • Introduction
    • Control calling features
    • Protect voicemail
    • Control inbound calls
    • Control caller ID information
    • Knowledge check
    • Summary
  • Module 7: Implement compliance in Teams
    • Introduction
    • Control compliance in Microsoft Teams
    • Complete a legal investigation using the Microsoft 365 Defender portal
    • Manage and secure Teams using AppLocker
    • Knowledge check
    • Summary
  • Module 8: Monitor, troubleshoot, and investigate Teams usage
    • Introduction
    • Monitor call quality in Teams
    • Troubleshoot Teams
    • Investigate Teams usage with reports
    • Knowledge check
    • Summary

Reviews

Start your review of Enforce security, privacy, and compliance in Microsoft Teams

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.