Book Image

Expert Microsoft Teams Solutions

By : Aaron Guilmette, Yura Lee, Grant Oliasani, Angel Aviles
Book Image

Expert Microsoft Teams Solutions

By: Aaron Guilmette, Yura Lee, Grant Oliasani, Angel Aviles

Overview of this book

Microsoft Teams is an invaluable tool that can integrate various Microsoft products into a single convenient hub. But making the most of it often requires expert help and hours spent on calls and live chats. If you’d rather have all the information you need to make the most of Teams in one place, then this book is for you. Written by two Microsoft technical specialists who have spent years helping clients find the best way to utilize Teams, this book will help you understand Teams as a whole — from architecture and collaboration through to apps and voice. You’ll study the platform from the perspective of the end user as well as the administrator, gaining insights and learning from real-life examples. You’ll tackle adopting, implementing, and administering Teams efficiently, which will help you realize its full potential. From setup and deployment to modernizing your organization’s chat and voice infrastructure, you’ll get plenty of useful and actionable tips as you progress. By the end of your journey through this book, you’ll be able to design and implement the most important and exciting aspects of Microsoft Teams help your organization work more efficiently.
Table of Contents (27 chapters)
1
Part 1: Collaboration and Apps
Free Chapter
2
Chapter 1: Taking a Tour of Microsoft Teams
6
Part 2: Meetings
10
Part 3: Bots and Development
14
Part 4: Voice
19
Part 5: Administration

Conditional Access

Through the years, many organizations have implemented policies that determine how and from where users can access applications and data. The most common policies and restrictions have focused on using network location as the primary criterion to determine whether a user or device was allowed to access a resource.

In traditional security trust models, organizations generally trust users, devices, applications, and data on networks that they either directly own or manage. In Azure AD, these "known" networks are referred to as network locations.

This model worked well when most of the applications and resources that a company used were inside its own network boundaries. However, as more organizations have adopted cloud technology, allowed users to work remotely, or permitted the use of personal devices, this constraint doesn't always align with business goals.

That's where Conditional Access fits in. Conditional Access is a set of rules...