Contact us

Microsoft Teams

In a series of modularized lectures and hands-on labs, our expert consultants help you understand the tools and best practices you can use to secure your Microsoft Teams platform. We ensure that you are maximizing your security investment, show you how you can use compliance in teams, demonstrate how you can secure your devices as they connect to the platform, and more.

Aditionally learn how to make collaboration easier and more secure with Microsoft Teams in this event where our architects demonstrate how to provide the best end-to-end secure collaboration environment focused on productivity and an optimized end user experience, while maintaining strict privacy and security controls.  We show you how you can leverage controls within the Teams platform and integrate with additional Microsoft 365 services to accomplish your security goals.


LecturesLab Exercises
Security and Compliance within Teams.Securing Guest Access in Teams.
Safeguarding the DeviceExamining Security in Teams.
Protecting Teams Against Advance ThreatsUnderstanding Compliance and Retention
Protecting the DataTeams & Advanced Threat Protection.
Reporting & Responding to ThreatsPreventing Data Loss of the DLP.
Securing the User’s IdentityReviewing Files & Activities with MCAS.
  • Explore how you can leverage the security features built in to Microsoft Teams to enforce compliance, secure access, and prevent the overpopulation of Teams channels.
  • Learn how you can use conditional access policies and guest access controls to ensure that external and BYOD users can securely use Teams in a controlled manner.
  • Discover how you can integrate Teams with Microsoft information protection solutions to discover sensitive information and protect it against unauthorized access or misuse.
  • Experience how Microsoft Teams and supporting services can provide the best end-to-end secure collaboration environment to achieve your organization’s security, compliance, and privacy goals.
  • Hands-on experience in a pre-built lab environment helps you quickly assess the impact of a security feature on the end user, as well as estimate the administrative workload required.
  • Engage with our architects about how best to achieve your unique security and compliance requirements according to best practices while avoiding common deployment pitfalls


50% Core Collaboration Capabilities

35% Security Capabilities [M365 E3]​

15% Advanced Security Capabilities [M365 E5]​

After the event is finished, Synergy will provide you with lecture presentations in PDF format for future reference.

After these workshop Synergy will provide to you the following documentes for future references:
  • Lecture Presentations in PDF
  • Teams Security Hands-on Lab
  • Findings in compliance and Retention with Teams.