Back
This checklist helps IT administrators and security teams harden Microsoft Teams using SCuBA/CISA guidance and best practices. Follow the actionable items to enforce policies, reduce attack surface, and maintain secure collaboration across your tenant.
Progress
0 / 17
- Enable multi-factor authentication for admins and users — Require MFA for all admin roles and high-risk accounts via Conditional Access
- Enforce Conditional Access policies for Teams access — Restrict access by device compliance, location, and risk signals
- Block legacy and basic authentication methods — Disable older protocols to prevent credential-based attacks
- Restrict guest access and external sharing in Teams — Limit guest permissions and set strict external sharing controls
- Configure Safe Links and Safe Attachments for Teams — Use Defender policies to scan links and attachments in messages
- Enable Safe Links policies — Apply time-of-click URL scanning to messages and files
- Enable Safe Attachments policies — Scan and sandbox attachments sent via Teams
- Deploy Data Loss Prevention (DLP) policies for sensitive data — Create DLP rules covering chats, channel messages, and file sharing
- Configure retention and eDiscovery policies for Teams content — Set retention periods and enable eDiscovery for compliance needs
- Turn on audit logging and activity reporting — Enable unified audit logs and regularly review suspicious events
- Review and restrict third-party apps and integrations — Approve only vetted apps and block risky/unused integrations
- Require device compliance and manage endpoints with Intune — Enforce device health, encryption, and patching before access
- Limit meeting features and external participant capabilities — Disable anonymous join and restrict screen sharing for guests
- Disable PSTN transcription and cloud recording if not required — Turn off recording/transcription to reduce data exposure
- Enforce approved client versions and block legacy clients — Require up-to-date Teams clients and block deprecated apps
- Assign least-privilege admin roles and use privileged access — Use role-based access and just-in-time elevation for admins
- Regularly review and update Teams security baselines — Reconcile settings with SCuBA/CISA guidance and update periodically
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes