TickYouOff
Back
🔒

Microsoft Teams Security Checklist

Hard 17 items · 4 hours
testuser's avatar
testuser Published 1 month ago

This checklist helps IT administrators and security teams harden Microsoft Teams using SCuBA/CISA guidance and best practices. Follow the actionable items to enforce policies, reduce attack surface, and maintain secure collaboration across your tenant.

Source: https://ncp.nist.gov/checklist/1087

Progress
0 / 17
  1. Enable multi-factor authentication for admins and users — Require MFA for all admin roles and high-risk accounts via Conditional Access
  2. Enforce Conditional Access policies for Teams access — Restrict access by device compliance, location, and risk signals
  3. Block legacy and basic authentication methods — Disable older protocols to prevent credential-based attacks
  4. Restrict guest access and external sharing in Teams — Limit guest permissions and set strict external sharing controls
  5. Configure Safe Links and Safe Attachments for Teams — Use Defender policies to scan links and attachments in messages
  6. Enable Safe Links policies — Apply time-of-click URL scanning to messages and files
  7. Enable Safe Attachments policies — Scan and sandbox attachments sent via Teams
  8. Deploy Data Loss Prevention (DLP) policies for sensitive data — Create DLP rules covering chats, channel messages, and file sharing
  9. Configure retention and eDiscovery policies for Teams content — Set retention periods and enable eDiscovery for compliance needs
  10. Turn on audit logging and activity reporting — Enable unified audit logs and regularly review suspicious events
  11. Review and restrict third-party apps and integrations — Approve only vetted apps and block risky/unused integrations
  12. Require device compliance and manage endpoints with Intune — Enforce device health, encryption, and patching before access
  13. Limit meeting features and external participant capabilities — Disable anonymous join and restrict screen sharing for guests
  14. Disable PSTN transcription and cloud recording if not required — Turn off recording/transcription to reduce data exposure
  15. Enforce approved client versions and block legacy clients — Require up-to-date Teams clients and block deprecated apps
  16. Assign least-privilege admin roles and use privileged access — Use role-based access and just-in-time elevation for admins
  17. Regularly review and update Teams security baselines — Reconcile settings with SCuBA/CISA guidance and update periodically
Sign in to save
📝 My Notes