{"id":6337,"date":"2021-01-29T14:57:59","date_gmt":"2021-01-29T13:57:59","guid":{"rendered":"https:\/\/nboldapp.com\/?p=6337"},"modified":"2021-04-08T11:49:58","modified_gmt":"2021-04-08T10:49:58","slug":"microsoft-teams-security-best-practices","status":"publish","type":"post","link":"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/","title":{"rendered":"Meilleures pratiques de s\u00e9curit\u00e9 pour Microsoft Teams"},"content":{"rendered":"<p>Microsoft Corporation invests huge amounts of time and money into security of their systems, including Microsoft Teams. Their engineering team constantly improves and adds new security features, making it one of the safest tools for collaboration. At the same time, there are always data security risks, no matter what platform you use for operating your business. And it\u2019s a responsibility of each organization to ensure the safest use of the tool and protection of data.<\/p>\n\n\n\n<p>In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-ub-table-of-contents-block ub_table-of-contents\" id=\"ub_table-of-contents-e7be9c27-e49f-4e2a-9049-2f1d4d5af406\" data-linktodivider=\"false\" data-showtext=\"show\" data-hidetext=\"hide\" data-scrolltype=\"auto\" data-enablesmoothscroll=\"false\" data-initiallyhideonmobile=\"false\" data-initiallyshow=\"true\"><div class=\"ub_table-of-contents-header-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-header\" style=\"text-align: left; \">\n\t\t\t\t<div class=\"ub_table-of-contents-title\">Table des mati\u00e8res<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div><div class=\"ub_table-of-contents-extra-container\" style=\"\">\n\t\t\t<div class=\"ub_table-of-contents-container ub_table-of-contents-1-column\">\n\t\t\t\t<ul style=\"\"><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#0-microsoft-teams-security-risks\" style=\"\">Microsoft Teams security risks<\/a><ul><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#1-guest-access\" style=\"\">Guest access<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#2-information-leaks\" style=\"\">Information leaks<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#3-teams-privacy\" style=\"\">Teams Privacy<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#4-user-life-cycle\" style=\"\">User life cycle<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#5-private-channels-ownership\" style=\"\">Private channels ownership<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#6-sharing-highly-sensitive-information\" style=\"\">Sharing highly sensitive information<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#7-apps-integration\" style=\"\">Apps integration<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#8-phishing-attacks\" style=\"\">Phishing attacks<\/a><\/li><\/ul><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#9-microsoft-teams-security-best-practices\" style=\"\">Microsoft Teams security best practices<\/a><ul><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#10-1-define-microsoft-teams-governance\" style=\"\">1. Define Microsoft Teams governance<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#14-2-configure-data-security-features\" style=\"\">2. Configure data security features<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#17-3-configure-guest-access-settings\" style=\"\">3. Configure guest access settings<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#21-4-use-lobby-for-meetings-with-external-users\" style=\"\">4. Use lobby for meetings with external users<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#22-5-enable-multi-factor-authentication\" style=\"\">5. Enable multi-factor authentication<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#23-6-enforce-teams-privacy\" style=\"\">6. Enforce Teams Privacy<\/a><\/li><li style=\"\"><a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/#24-7-create-activity-alerts\" style=\"\">7. Create activity alerts<\/a><\/li><\/ul><\/li><\/ul>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"0-microsoft-teams-security-risks\">Microsoft Teams security risks<\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-guest-access\">Guest access<\/h3>\n\n\n\n<p>One of the greatest capabilities of Microsoft Teams is communicating and collaborating with external users by granting them guest access to your teams, channels and meetings. This is why Teams is so widely used for conducting remote negotiations, making sales pitches, and discussing projects with partners.<\/p>\n\n\n\n<p>However, by granting guest access you\u2019re also allowing your guests to get a complete access to your team\u2019s files and other data that is shared through channels. Therefore, you risk having your guests see sensitive content, which poses potential data security risks.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-information-leaks\">Information leaks<\/h3>\n\n\n\n<p>If External Sharing is turned on in Teams, then all the documents you store in SharePoint can potentially be shared with external users through chats. This can result in leaks of sensitive data and create serious security risks.<\/p>\n\n\n\n<p>Screen sharing capability can also let you down if not used carefully. If you or your employees accidentally share the wrong page with outside users, it can cause irreversible damage.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-teams-privacy\">Teams Privacy<\/h3>\n\n\n\n<p>Teams owners can change your team privacy at any time, which is why it\u2019s important to oversee who owners of your teams are. Changing teams privacy can lead to security issues. So, you may want to choose them carefully and certainly not grant ownership to every member of the team.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-user-life-cycle\">User life cycle<\/h3>\n\n\n\n<p>If your team has only one owner and this person, for example, leaves the company, this can become a problem. A team cannot be without an owner, so potentially any user can become one. This may sabotage your team\u2019s privacy since the owner can change settings of the team.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-private-channels-ownership\">Private channels ownership<\/h3>\n\n\n\n<p>Private channels are a great way to discuss sensitive matters with a few members from the team (and even guest users) without having to create a whole new team. However, if the owner of the private channel is removed, any member can become a new owner. This can be risky as they could invite anyone to the private channel and, therefore, give access to confidential information to other users.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6-sharing-highly-sensitive-information\">Sharing highly sensitive information<\/h3>\n\n\n\n<p>It\u2019s against the law to share certain very sensitive data. That, for example, is true for social security numbers. Sharing this kind of data in Teams with external users is illegal. Enabling data loss prevention policies makes sure users do not accidentally slip sensitive information. &nbsp;<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"7-apps-integration\">Apps integration<\/h3>\n\n\n\n<p>When integrating a third-party app into Teams you may give it permission to access your team\u2019s data. Some apps can transfer data among their services, which can cause data loss and GDPR compliance violations.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"8-phishing-attacks\">Phishing attacks<\/h3>\n\n\n\n<p>Microsoft Teams users receive email notifications about activities in their teams. Knowing that, cyber-attackers started targeting Teams users for getting their credentials and accessing companies\u2019 intellectual property and strategies.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"9-microsoft-teams-security-best-practices\">Microsoft Teams security best practices<\/h2>\n\n\n\n<p>There are ways to increase your teams\u2019 security and minimize security risks. Below we list some of Microsoft Teams security best practices.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"10-1-define-microsoft-teams-governance\">1. Define Microsoft Teams governance<\/h3>\n\n\n\n<p>One of the most reliable ways to enforce security in Teams is by setting up governance policies. Teams governance determines how the organization will function internally, how end-users can use the app, who can create teams, what information users can share, etc.<\/p>\n\n\n\n<p>If you\u2019d like to learn Teams governance best practices, we recommend checking out <a href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-governance-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">cet article<\/a>. There are many points to consider, and they revolve not only around security, but also the organizational structure.<\/p>\n\n\n\n<p>When it comes to security, you may want to consider the following points:<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"11-who-can-create-teams-\"><em>Who can create teams<\/em><\/h4>\n\n\n\n<p>The first thing you need to do is to decide who can create teams. This will allow you to minimize teams sprawl and all the security issues it arises.<\/p>\n\n\n\n<p>There are a few ways to do that:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>You can create a security group of people who will be allowed to create Office 365 groups. You can find the instructions <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/solutions\/manage-creation-of-groups?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>. However, this can limit other users as besides Microsoft Teams, they won\u2019t be able to create groups in Planner, Outlook and other Office 365 apps.<\/li><li>By establishing <a href=\"https:\/\/www.salestim.com\/microsoft-teams\/governance\/targeting-audience\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ciblage de l'audience<\/a> with Microsoft Teams Collaboration templates you limit templates\u2019 visibility to only certain groups of people. It allows you to set up targeting rules based on your users\u2019 profile data such as geolocation, spoken language, business department, email address or any Active Directory Attributes to target the right users with the templates available.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/q_lossy+ret_img\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/12\/66794842-7496-435B-9007-240D4EC6DE5A.jpeg\" alt=\"Microsoft Teams Security Best Practices: who can create teams - audience targeting\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"12-teams-ownership-and-membership-\"><em>Teams ownership and membership<\/em><\/h4>\n\n\n\n<p>Setting up the right ownership and membership policies will allow you to better monitor teams and private channels and control what information is being shared. Team owners can remove members, add guests, change settings, and perform some administrative tasks. So, you may want to make sure you have a few owners in each team so that in case one of them is removed from the team, the ownership will not go to a random member.<\/p>\n\n\n\n<p>Here are a few ways to do it:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Build guidelines for adding owners and members that you users will follow when creating a new team.<\/li><li>Do it manually in each team.<\/li><li>Mise en place <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/dynamic-memberships\" target=\"_blank\" rel=\"noreferrer noopener\">Dynamic membership<\/a> for teams. This means the membership of a team can be defined by one or more rules that correspond to certain user attributes in Azure AD. As a result, users are automatically added or removed to the right teams if their attributes change.<\/li><li>Establish <a href=\"https:\/\/www.salestim.com\/microsoft-teams\/governance\/security-setup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Permanent membership and ownership<\/a> at the template level with Collaboration templates by SalesTim. When you build a template, you can assign permanent owners and members that will be automatically added to new teams created from this template.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/w_990+q_lossy+ret_img+to_webp\/https:\/\/cdn.shortpixel.ai\/spai\/w_546+q_lossless+ret_img+to_webp\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/03\/A761461C-3C08-4ACA-8A86-2A6F400DEEA9.png\" alt=\"Microsoft Teams Security Best Practices: permanet owners and members\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"13-third-party-apps-\"><em>Third-party apps<\/em><\/h4>\n\n\n\n<p>Open access to third-party apps for end-users puts at risks the security of your sensitive content. Managing third-party apps, therefore, is vital in ensuring effective collaboration while keeping confidential information safe.<\/p>\n\n\n\n<p>You can oversee third-party apps by:<\/p>\n\n\n\n<p>1. Managing&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/teams-app-setup-policies\" target=\"_blank\" rel=\"noreferrer noopener\">app setup policies<\/a>.<\/p>\n\n\n\n<p>You can highlight and pin the most important apps in teams and install apps on behalf of users.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/w_990+q_lossy+ret_img+to_webp\/https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/media\/app-setup-policies-add.png\" alt=\"Microsoft Teams Security Best Practices: third-party apps management\"\/><\/figure>\n\n\n\n<p>2. Managing&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/teams-app-permission-policies#:~:text=On%20the%20Permission%20policies%20page,can%20use%20third%2Dparty%20apps.\" target=\"_blank\" rel=\"noreferrer noopener\">app permission policies<\/a>.<\/p>\n\n\n\n<p>You can control what apps are available for users in admin center:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Autoriser toutes les applications<\/li><li>Autoriser des applications sp\u00e9cifiques et bloquer toutes les autres<\/li><li>Bloquer certaines applications et autoriser toutes les autres<\/li><li>Bloquer toutes les applications<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/q_lossy+ret_img\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/10\/MicrosoftTeams-image.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/q_lossy+ret_img\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/12\/63F92371-4DA5-4ACF-9928-B18B50401467-1024x308.jpeg\" alt=\"\" width=\"256\" height=\"77\"\/><\/figure><\/div>\n\n\n\n<p>There&#8217;s also a possibility to filter apps by restricting them to only those certified by Microsoft. <\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"14-2-configure-data-security-features\">2. Configure data security features<\/h3>\n\n\n\n<p>Office 365 provides additional features to secure your data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"15-data-loss-prevention-dlp-\"><em>Data loss prevention (DLP)<\/em><\/h4>\n\n\n\n<p>DLP feature identifies very sensitive data, such as Social Security and credit card numbers, and prevents from sharing it with external and guest users.<\/p>\n\n\n\n<p>For example, if sensitive information is shared with an external user through a message, it will be automatically deleted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/media\/dlp-teams-blockedmessage-notification.png?view=o365-worldwide\" alt=\"Microsoft Teams Security Best Practices: data loss prevention\"\/><\/figure>\n\n\n\n<p>In case a document that contain such information is shared with an external users, the document won\u2019t open for those users.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/media\/dlp-teams-blockedmessage-possibleactions.png?view=o365-worldwide\" alt=\"\"\/><\/figure>\n\n\n\n<p>You can learn more about DLP and how to enable it <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/dlp-microsoft-teams?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"16-sensitivity-labels-for-information-protection-\"><em>Sensitivity labels for information protection<\/em><\/h4>\n\n\n\n<p>To get the job done your staff collaborates both internally and externally, posing potential data security risks if a highly confidential document accidentally falls into wrong hands.<\/p>\n\n\n\n<p>Sensitivity labels let you classify and protect your company\u2019s data, while making sure that user productivity and their ability to collaborate isn&#8217;t impeded.<\/p>\n\n\n\n<p>Sensitivity labels can encrypt emails and documents, mark the content when you use Office 365 apps, protect content in containers such as sites and groups, and Apply the label automatically to files and emails, or recommend a label.<\/p>\n\n\n\n<p>En savoir plus sur les \u00e9tiquettes de sensibilit\u00e9 <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/media\/sensitivity-label-grouped-labels2.png?view=o365-worldwide\" alt=\"Microsoft Teams Security Best Practices: sensitivity labels\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"17-3-configure-guest-access-settings\">3. Configure guest access settings<\/h3>\n\n\n\n<p>With Microsoft Teams you can invite external guest to your teams, which might raise some data security concerns. Which is why it\u2019s essential set up the right guest access rules.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"18-admin-center-\"><em>Admin center<\/em><\/h4>\n\n\n\n<p>&nbsp;You can configure guest access settings in the Teams admin center. You can disable it completely, although if you use Teams to communicate with clients and partners you might want to keep this capability. Instead, you can grant them with the least privileges, just enough to discuss matters of mutual interest.<\/p>\n\n\n\n<p>If you\u2019re concerned about accidental leaks of information during video meetings, you may choose to disable the screensharing capability.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/q_lossy+ret_img\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/10\/guest-access-1.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/img.salestim.com\/spai\/q_lossy+ret_img\/https:\/\/www.salestim.com\/wp-content\/uploads\/2020\/10\/guest-access-2.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"19-privacy-labels-for-teams-\"><em>Privacy labels for teams<\/em><\/h4>\n\n\n\n<p>You can create and configure <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/sensitivity-labels\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e9tiquettes de sensibilit\u00e9<\/a> that, when applied during teams creation, enable users to choose privacy settings for a new team. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/media\/sensitivity-labels-confidential-example.png\" alt=\"Screenshot of Confidential sensitivity label\"\/><\/figure>\n\n\n\n<p>Teams created with a highly confidential label won\u2019t allow guest access and will only be available to your employees. People outside your organization can&#8217;t join the team.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"20-build-your-own-app-with-azure-logics-apps-\"><em>Build your own app with Azure logics apps<\/em><\/h4>\n\n\n\n<p>There\u2019s also a way to enable guest access only for select authorized teams by creating a new Azure AD App Registration that allows to utilize Microsoft Graph for creating teams and set its priorities. You can find a step-by-step guide <a href=\"https:\/\/michael-mukalian.medium.com\/automating-the-provisioning-of-selective-teams-with-guest-access-part-1-azure-ad-app-ef1498ebf8f9\" target=\"_blank\" rel=\"noreferrer noopener\">ici<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/michael-mukalian.medium.com\/automating-the-provisioning-of-selective-teams-with-guest-access-part-1-azure-ad-app-ef1498ebf8f9\"><img decoding=\"async\" src=\"https:\/\/miro.medium.com\/max\/1050\/1*6pbFZZMo6PfDnj8qf526FA.png\" alt=\"\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"21-4-use-lobby-for-meetings-with-external-users\">4. Use lobby for meetings with external users<\/h3>\n\n\n\n<p>To prevent external users from accessing your meetings in Microsoft Teams, you can leverage Lobby capability. You can enable\/disable it in Microsoft Teams admin center.<\/p>\n\n\n\n<p>Your external users will be redirected to a virtual lobby where they will need to wait for admission. This can be useful, for example, if you\u2019re having a negotiation meeting with your team and a client and wish to have a talk with your team members before the official meeting starts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/media\/meeting-policies-lobby.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"22-5-enable-multi-factor-authentication\">5. Enable multi-factor authentication<\/h3>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication?view=o365-worldwide#:~:text=In%20the%20Azure%20Active%20Directory,defaults%2C%20and%20then%20choose%20Save.\">Multi-factor authentication<\/a> greatly increases the security of users logins. It\u2019s definitely one of the Microsoft Teams security best practices if you want to protect your system from phishing attacks that steal you employees\u2019 credentials.<\/p>\n\n\n\n<p>Aside from entering username and password to log in, users must verify their credentials with a multi-authentication factor, by receiving a phone call, text message or a notification.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/user-help\/media\/multi-factor-authentication-end-user-manage-settings\/mfa-security-verification-page.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"23-6-enforce-teams-privacy\">6. Enforce Teams Privacy<\/h3>\n\n\n\n<p>If you would like to enable privacy for certain teams, you can do that at the template level with SalesTim <a href=\"https:\/\/www.salestim.com\/microsoft-teams-governance-salestim-automation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mod\u00e8les de collaboration<\/a>.<\/p>\n\n\n\n<p>You can decide if new teams created from the template will be <em>Private<\/em> ou <em>Public<\/em>. Private teams will only allow team owners to add members, while in public teams anyone from the organization will be able to join without validation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/salestim.intercom-attachments-1.com\/i\/o\/165306841\/f961885dd925e94114232305\/securityPolicy.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"24-7-create-activity-alerts\">7. Create activity alerts<\/h3>\n\n\n\n<p>You can leverage Office 365 Audit Log to monitor potential security issues. After creating an <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/create-activity-alerts?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">activity alert<\/a> you will receive email notification each time users perform specific activities in Office 365.<\/p>\n\n\n\n<p>You may set activity alerts for external sharing, creating of sharing invitation, uploading\/downloading files, site permissions modifications, and so on.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/media\/53888bd5-9fa2-4398-8ccc-1a9dc72517ac.png?view=o365-worldwide\" alt=\"\"\/><\/figure>\n\n\n\n<p>This way you\u2019ll be able to oversee any potential security risks from user activity.<\/p>\n\n\n\n<p>By following these Microsoft Teams security best practices you will ensure a high level of protection of your organization\u00b4s system and its data.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>","protected":false},"excerpt":{"rendered":"<p>Microsoft Corporation invests huge amounts of time and money into security of their systems, including Microsoft Teams. Their engineering team constantly improves and adds new security features, making it one of the safest tools for collaboration. At the same time, there are always data security risks, no matter what platform you use for operating your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[161],"tags":[71,120],"class_list":["post-6337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-governance","tag-microsoft-teams-security","tag-microsoft-teams-security-best-practices"],"featured_image_src":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","author_info":{"display_name":"Alexandre Cipriani","author_link":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Microsoft Teams Security Best Practices - nBold<\/title>\n<meta name=\"description\" content=\"In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Teams Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"nBold\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-29T13:57:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T10:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1387\" \/>\n\t<meta property=\"og:image:height\" content=\"924\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Cipriani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:site\" content=\"@nboldhq\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Cipriani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft Teams Security Best Practices - nBold","description":"In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/","og_locale":"fr_FR","og_type":"article","og_title":"Microsoft Teams Security Best Practices","og_description":"In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.","og_url":"https:\/\/nboldapp.com\/fr\/microsoft-teams-security-best-practices\/","og_site_name":"nBold","article_published_time":"2021-01-29T13:57:59+00:00","article_modified_time":"2021-04-08T10:49:58+00:00","og_image":[{"width":1387,"height":924,"url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Alexandre Cipriani","twitter_card":"summary_large_image","twitter_creator":"@nboldhq","twitter_site":"@nboldhq","twitter_misc":{"\u00c9crit par":"Alexandre Cipriani","Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/"},"author":{"name":"Alexandre Cipriani","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c"},"headline":"Microsoft Teams Security Best Practices","datePublished":"2021-01-29T13:57:59+00:00","dateModified":"2021-04-08T10:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/"},"wordCount":1856,"publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"image":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","keywords":["Microsoft Teams Security","Microsoft Teams Security Best Practices"],"articleSection":["Governance"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/","url":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/","name":"Microsoft Teams Security Best Practices - nBold","isPartOf":{"@id":"https:\/\/nboldapp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","datePublished":"2021-01-29T13:57:59+00:00","dateModified":"2021-04-08T10:49:58+00:00","description":"In this article we will outline the most common security risks in Microsoft Teams and best practices to help minimize them.","breadcrumb":{"@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#primaryimage","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2021\/01\/freestocks-I_pOqP6kCOI-unsplash-scaled.jpg","width":1387,"height":924},{"@type":"BreadcrumbList","@id":"https:\/\/nboldapp.com\/microsoft-teams-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nboldapp.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Teams Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/nboldapp.com\/#website","url":"https:\/\/nboldapp.com\/","name":"nBold","description":"The Collaboration Process Technology.","publisher":{"@id":"https:\/\/nboldapp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nboldapp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nboldapp.com\/#organization","name":"nBold","url":"https:\/\/nboldapp.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/","url":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","contentUrl":"https:\/\/nboldapp.com\/wp-content\/uploads\/2022\/02\/Logo.svg","width":74,"height":21,"caption":"nBold"},"image":{"@id":"https:\/\/nboldapp.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/nboldhq","https:\/\/www.linkedin.com\/company\/nboldhq"]},{"@type":"Person","@id":"https:\/\/nboldapp.com\/#\/schema\/person\/1a692fc52f6b8879fc00501f21c4109c","name":"Alexandre Cipriani","url":"https:\/\/nboldapp.com\/fr\/author\/acipriani\/"}]}},"_links":{"self":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/6337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/comments?post=6337"}],"version-history":[{"count":0,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/posts\/6337\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media\/6340"}],"wp:attachment":[{"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/media?parent=6337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/categories?post=6337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nboldapp.com\/fr\/wp-json\/wp\/v2\/tags?post=6337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}