Online Training
Resource Center

Loading...

Introduction:

Course Introduction

0:30 Minute(s)
Share This Video:

Introduction:

Getting Started - Download and Install

2 Minute(s)

There are three basic ways to access Microsoft Teams:

  • Download and install the full version for computers
  • Access the browser version of Teams
  • Download the mobile app

Each of these versions of the Teams software have their own pros and cons.

Share This Video:

Teams Chat:

Starting a Chat and Adding People to a Chat

2 Minute(s)

The chat portion of Teams allows remote workers and office employees to communicate easily and organize their efforts more efficiently. Users can simply click on the Chat tab, then click on the pen and paper logo to the left of the search bar. Click on the Add People button to create a new group chat consisting of the people you want to talk with.

Share This Video:

Teams Chat:

Adding Flair - Emojis, Gifs, and Reactions

1 Minute(s)

Microsoft Teams has a couple of ways to insert emojis into a conversation:

  • Type a colon “:” followed by the name of the emoji with another colon to close “:smile:”
  • Click on the smiley face icon in the bottom of the chat panel to select an emoji
Share This Video:

Teams Chat:

Saving and Accessing Saved Messages

0:30 Minute(s)

Click on the ellipses icon above a chat message to “save” a message for future reference.

Share This Video:

Teams Chat:

Edit and Delete Messages

1 Minute(s)

Edit or delete your messages in Teams to correct mistakes with ease.

Share This Video:

Working with Teams:

Create a Team and Invite Users

2 Minute(s)

Set up a team to encourage collaboration — Simply go to the Teams tab, click on the Join or Create a Team option at the bottom of the team list column, and click on the Create Team option that appears.

Share This Video:

Working with Teams:

Change a Team Name

1 Minute(s)

Simply click on the ellipses menu next to the team name in the Teams tab and select Edit Team.

Share This Video:

Working with Teams:

Team Member Permissions: Add, Remove, and Change

1 Minute(s)

Change team member permissions by adding, removing and updating preferences.

Share This Video:

Working with Teams:

Create and Edit Teams Channels

2 Minute(s)

By default, every newly-created team has a “General” channel, but say you want to make one channel for fun or silly things that aren’t business-relevant, and one for more productivity-oriented content. Click on the ellipses menu next to the team name, then select the Add Channel option.

Share This Video:

Working with Teams:

Files in Teams Channels

1 Minute(s)

Simply upload a file to your Teams channel so everyone can find it easily. For Office 365 software suite files (Word, Excel, PowerPoint, etc.), members of the team will be able to open the file and work on it collaboratively as well.

Share This Video:

Working with Teams:

Upload and View Files in Teams Channels

1 Minute(s)
Share This Video:

Working with Teams:

Arrange and Hide Teams

1 Minute(s)

Arrange and hide teams as needed.

Share This Video:

Working with Teams:

Teams Notifications

2 Minute(s)

Users can turn on banner and feed notifications in the Teams software so they can keep apprised of new comments in specific Teams channels.

Share This Video:

Working with Teams:

Delete a Team

1 Minute(s)

No longer need a specific team? Delete as needed.

Share This Video:

Teams Meetings:

Introduction

0:30 Minute(s)

In the Teams software, there are two ways to create a meeting:

  • Ad Hoc Meetings
  • Scheduled Meetings
Share This Video:

Teams Meetings:

Ad Hoc Meetings

1 Minute(s)

Discuss something "right now" by creating an ad hoc meeting. You can start these meetings easily by clicking on either the Video Call or Phone Call buttons.

Share This Video:

Teams Meetings:

Create a Scheduled Meeting

3 Minute(s)

Set up a meeting in advance and invite one or more people to join you in that meeting. Many users prefer to use the Microsoft Outlook app to set up meetings in Teams.

Share This Video:

Teams Meetings:

Join a Meeting

3 Minute(s)

To join an existing meeting, click on the meeting name in the Calendar tab, and then select Join.

Share This Video:

Teams Meetings:

Meetings Feature: Screen Sharing

4 Minute(s)

If you’re making a presentation during a Teams meeting, you may want to share your screen so others can see what you’re talking about.

Share This Video:

Teams Calls:

Introduction

1 Minute(s)
Share This Video:

Teams Calls:

Receiving a Call

1 Minute(s)
Share This Video:

Teams Calls:

Dialing Out

1 Minute(s)
Share This Video:

Teams Calls:

Parking and Transferring Calls

2 Minute(s)
Share This Video:

Teams Calls:

Teams Voicemail

2 Minute(s)
Share This Video:

Welcome:

Introduction

1 Minute(s)

Welcome to the Online Course for Office 365 Security Roadmap. This course is designed for Security and Global Administrators in Office 365.  We will instruct and demonstrate how to configure different security policies in your Office 365 tenant.

If you are signed into your tenant and do not see some of the features displayed in this video, please confirm that you have the proper security licensing before proceeding.  

For questions about security licensing in Office 365, please reach out to our support team at support@protectedtrust.com.

Share This Video:

Advanced Threat Protection:

Configuring Notifications for Admins and End Users

4 Minute(s)

Before we get started on setting up security policies, first we will show you how to configure notifications.  Whether your organization wishes to have admins alerted for messages quarantined or end-users (or both), we recommend this as the first step.

Share This Video:

Advanced Threat Protection:

Anti-Phishing Policy

12 Minute(s)

Microsoft has just released their Security Intelligence Report (SIR), its annual cybersecurity summary, and it reveals phishing is still the most popular way for cyber-criminals to attack, giving security experts everywhere headaches.

In this video we will show you how to prevent phishing attempts inside your organization.

Share This Video:

Advanced Threat Protection:

Anti-Malware Policy

4 Minute(s)

Malware is comprised of viruses and spyware. Viruses infect other programs and data, and they spread throughout your computer looking for programs to infect. Spyware refers to malware that gathers your personal information, such as sign-in information and personal data, and sends it back to the malware author.

Office 365 has built-in malware and spam filtering capabilities that help protect inbound and outbound messages from malicious software and help protect you from spam. Admins don't need to set up or maintain the filtering technologies, which are enabled by default. However, they can make company-specific filtering customizations in the Exchange admin center (EAC).

Share This Video:

Advanced Threat Protection:

Safe Attachments Policy

2 Minute(s)

You can train your employees to be extra vigilant when opening email attachments, but the fact of the matter remains that it only takes one person to mess up once to allow malicious agents into your organization.

In this video, we will show you how to setup an additional layer of protection to prevent employees who open malicious attachments from infecting their systems.

Share This Video:

Advanced Threat Protection:

Safe-Links Policy

5 Minute(s)

Phishing emails have become very convincing. No longer are we sent emails from a Nigerian Prince begging us to take his money, but rather we are sent very convincing emails from our banks, restaurants, online media companies, and from the people we work with. As we stated in our Safe-Attachments section, there is only so much training can do to prevent employees from opening malicious attachments and the same goes for employees clicking on a malicious link.

In this video, we demonstrate how to turn on Safe-Links, so that your employees are protected when they click on a link in an email that may not be legitimate.

Share This Video:

Advanced Threat Protection:

Anti-Spam Policy

16 Minute(s)

Are you concerned about too much spam in Office 365? Though multiple spam filters are built into your Office 365 service, you may want to change a protection setting to deal with a specific issue in your organization—say you're receiving a lot of spam from a particular sender, for example—or to simply fine tune your settings so that they're tailored to best meet the needs of your organization.

Share This Video:

SPF - Sender Policy Framework:

Introduction

1 Minute(s)

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email impersonation. The purpose of an SPF record is to prevent spammer from sending messages with forged ‘From’ addresses at your domain. This gives you, as an email sender, the ability to specify which email servers are permitted to send email on behalf of your domain.

Share This Video:

SPF - Sender Policy Framework:

Implementing SPF

1 Minute(s)

Protect your customer, your brand, and your business from spoofing and phishing attacks by authenticating your email with SPF. Ready to create an SPF record? Follow these steps to get started.

Share This Video:

SPF - Sender Policy Framework:

Collecting Email Services

1 Minute(s)

The first step in implementing SPF is to gather a list of mail servers you use to send email from your domain. Normally organizations send mail from many places. Be sure to include all mail servers used to send mail on your behalf.

Some examples include:

  • Office 365
  • MailChimp, Constant Contact
  • Salesforce, MS Dynamics, HubSpot
Share This Video:

SPF - Sender Policy Framework:

Compile Sources into an SPF Record

1 Minute(s)

Once all domains that send mail on your behalf are gathered, you'll need to find each domain's unique IP address or IP range. These addresses will be added as "includes" in your SPF record. Most third party mail services will offer a help article with information regarding mail server IP ranges.

Share This Video:

SPF - Sender Policy Framework:

Understanding SPF Record

1 Minute(s)

Understanding the format of SPF records is crucial to ensuring you’re getting the most out of your spam and phishing safeguards. Let’s take a closer look at how SPF records are constructed.

Share This Video:

SPF - Sender Policy Framework:

SPF Mechanisms

1 Minute(s)

An SPF record contains multiple mechanisms, or parameters, that dictate it’s behavior. These parameters include:

  • Defining the DNS A record of the target domain.
  • Defining the DNS MX record of the target domain.
  • Defining the IPv4 range of addresses.
  • And much more.
Share This Video:

SPF - Sender Policy Framework:

Good SPF Records - Examples

1 Minute(s)

A carefully tailored SPF record will reduce the likelihood of your domain name getting fraudulently spoofed and keep your messages from being flagged as spam before reaching their destination. Here are a few examples of effective, validated SPF records.

Share This Video:

SPF - Sender Policy Framework:

Common Mistakes

2 Minute(s)

SPF records can appear fairly simple, but including a multitude of different server configurations can quickly become complicated. Let’s look at a few common mistakes for SPF records.

Share This Video:

SPF - Sender Policy Framework:

Validate SPF Record

1 Minute(s)

Validating an SPF record is an essential part is implementing SPF to prevent possible spam and phishing attacks. This video explains how to properly validate your SPF record with various tools available.

Share This Video:

SPF - Sender Policy Framework:

Publishing an SPF Record

2 Minute(s)

Once you created and validated your SPF record, it’s time to begin the publishing process. Once published, mailbox providers will be able to reference the record.

Share This Video:

SPF - Sender Policy Framework:

Enforcing an SPF Record

1 Minute(s)

With your SPF record now validated and published, it’s time to ensure that the record is being enforced. This will help your SPF record work in conjunction with DKIM to create the most secure mail environment possible.

Share This Video:

SPF - Sender Policy Framework:

Next: DKIM

1 Minute(s)

In this section, we’ve demonstrated how to properly engineer and implement an SPF record to safeguard against spam and phishing attacks. In the next section, we’ll discover how SPF works with DKIM (DomainKeys Identified Mail) to further bolster your secure mail environment.

Share This Video:

DKIM DomainKeys Identified Mail:

Introduction

2 Minute(s)

DKIM, or DomainKeys Identified Mail, adds yet another layer of security to your organization's email ecosystem. In this section we'll explain the value of DKIM, along with steps to implement DKIM for your organization.

Share This Video:

DKIM DomainKeys Identified Mail:

Implementing DKIM

1 Minute(s)

Implementing DKIM in Office 365 is a fairly straightforward process. Follow these simple steps to get started.

Share This Video:

DKIM DomainKeys Identified Mail:

Collecting your Domains

4 Minute(s)

Let's take a closer look at inventorying all of our relevant domains.

NOTE: Be sure to consider ALL domains your organization may send mail from, as this is a commonly overlooked step.

Share This Video:

DKIM DomainKeys Identified Mail:

Compiling Sources into a DKIM Record

2 Minute(s)

In this lesson, we’ll take the data that we’ve collected and, using the provided format, create our custom DKIM record.

Share This Video:

DKIM DomainKeys Identified Mail:

Publish your DKIM Records

2 Minute(s)

Once our DKIM record has been created, we'll next log into our DNS provider and publish the record for testing and deployment.

Share This Video:

DKIM DomainKeys Identified Mail:

Testing your DKIM Records

1 Minute(s)

An important step to enabling DKIM is to ensure that the record has been created correctly and is valid. Follow along as we do a DNS lookup to do so.

Share This Video:

DKIM DomainKeys Identified Mail:

Enable DKIM Signing

1 Minute(s)

Once our records have been published and tested to be valid, we will enable DKIM Signing in Office 365.

Share This Video:

DKIM DomainKeys Identified Mail:

DKIM - Final Thoughts

1 Minute(s)

That's it! DKIM signing for your emails is now enabled. Most organization's email environments are unique, so ensure that you've followed the proper steps for every domain and third-party service that you utilize to send emails.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Introduction

1 Minute(s)

Our final safeguard for defending against potential threats is called DMARC. DMARC uses both SPF and DKIM to validate the "alignment" of a message to control what happens with the result from both tests. This offers an added layer of protection.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

How DMARC Works

1 Minute(s)

How exactly does DMARC work? Essentially, a sender’s DMARC record instructs a recipient of next steps (e.g., do nothing, quarantine the message, or reject it) if suspicious email claiming to come from a specific sender is received.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Why Do We Need DMARC

2 Minute(s)

As SPF may not protect from any and all potential email threats, DMARC offers an additional layer of security by using SPF and DKIM together.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Implementing DMARC - An Overview

2 Minute(s)

Let's look at a brief overview of how to implement DMARC in our environment.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Review - Deploy Both SPF and DKIM

1 Minute(s)

SPF and DKIM MUST be deployed in our environment to enable DMARC. These steps are provided in previous lessons of this course.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Ensuring SPF and DKIM Alignment

1 Minute(s)

Before enabling DMARC signing, we must ensure that SPF and DKIM are properly configured and published.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Publish a DMARC Record

3 Minute(s)

To publish a DMARC record, we must create a new DNS record. Use our example provided as your guideline.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Reviewing DMARC Reports

2 Minute(s)

A great feature of DMARC is the ability to view activity through reports of delivery information. This includes details on SPF and DKIM statuses of related email messages.

Share This Video:

DMARC - Domain-based Message Authentication, Reporting & Conformance:

Change Record Flag to Quarantine Messages

1 Minute(s)

Once you're confident that DMARC is properly configured, you can now change the DMARC record flag to enable proper reporting of future email messages.

Share This Video:

Multi-factor Authentication:

Introduction

1 Minute(s)

Multi-factor Authentication offers an additional layer of security for your users. While using their password to log in, users must additional provide an approval from a personal registered device to further verify their identity.

Share This Video:

Multi-factor Authentication:

Getting Started - Modern Authentication

2 Minute(s)

Before setting your users up with Multi-factor Authentication, 'Modern Authentication' must first be enabled in the Office 365 admin center. Modern Authentication offers access to additional security features such as Single Sign-on.

Share This Video:

Multi-factor Authentication:

Enable MFA for Individual Users

2 Minute(s)

In this lesson, we'll be manually enabling Multi-factor Authentication for individual users.

Note: Once activated, affected users will be prompted to to begin their setup of Multi-factor Authentication on next login to any Office 365 services.

Link to register your Multi-factor Authentication: https://aka.ms/setupmfa

Share This Video:

Multi-factor Authentication:

Set up and Sign in as an End User with MFA

7 Minute(s)

Once enabled, end users with Multi-factor Authentication will be prompted on next login to Office 365 to begin the setup process. This includes downloading and setting up the mobile authenticator app.

Share This Video:

Multi-factor Authentication:

Enable and Enforce MFA with a Custom Policy

3 Minute(s)

Set up a custom policy to automatically enable Multi-factor Authentication for new users in your organization.

Various settings for MFA users: https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx

Security Defaults: https://aka.ms/securitydefaults

Share This Video:

Multi-factor Authentication:

Enforce MFA for Administrators via Policy

6 Minute(s)

In this lesson we'll be creating a custom conditional access policy which enforces Multi-factor Authentication for only our organization administrators. These policies can be created for any type of user roles in Office 365.

Azure Portal: https://portal.azure.com

More details: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa

Share This Video:

Advanced Tips:

Custom Company Branding

3 Minute(s)

Let's take a look at using Office 365's custom branding for your environment. Creating a customized login page in Office 365 can help ensure that your users avoid losing login information to potential phishing attacks.

Share This Video:

Advanced Tips:

Conditional Access

15 Minute(s)

Yet another must have safeguard, conditional access can help secure the identity of your users by preventing them from logging in from suspicious locations and devices.

Share This Video:

Advanced Tips:

Enable Audit Logging

2 Minute(s)

Audit logging in the Office 365 Security & Compliance Center allows you to track most activities of your users such as:

  • Viewing a specific document
  • Deleting items from their mailbox
  • Activities in nearly all Office 365 suites
  • Much more

Follow along to enable your Office 365 audit log.

To enable audit logging: https://protection.office.com

Share This Video:

Advanced Tips:

Audit Log - Examples

4 Minute(s)

Let's take a look at a few examples of audit log searches. Search criteria can range anywhere from file history to any administrative changes within Office 365.

Share This Video:

Course Wrap Up:

Wrap Up

1 Minute(s)
Share This Video: