DiscoverM365 Show PodcastTeams Channels Are Not Secure By Default: The Admin Lie
Teams Channels Are Not Secure By Default: The Admin Lie

Teams Channels Are Not Secure By Default: The Admin Lie

Update: 2025-12-03
Share

Description

Teams is not secure by default—especially in hybrid environments full of guests, private channels, and synced libraries. In this episode, we walk through two real-world style incidents where “set and forget” Teams defaults quietly exposed data, then build a five-layer hardening plan: Conditional Access that actually bites, Purview DLP on chat and channels, Entra ID guest governance, audit & forensics you can prove in court, and retention that survives scrutiny. You’ll leave with exact policy patterns you can copy, test, and measure in your own tenant.

Opening – The Hook & Value Promise The night’s loud with static. Teams channels hum like open vents. Guests linger. Files sync to places no one watches. One careless paste away from a bleed you can’t stop. This episode gives you a concrete Teams security blueprint:
  • Enforce MFA for everyone, including guests
  • Kill legacy authentication
  • Require compliant or protected devices for Teams / SharePoint / Exchange
  • Wire Purview DLP into chat and channels
  • Govern guests with expirations, reviews, and access packages
  • Prove it all in logs, holds, and audits
You’ll see two incidents that show how defaults burn tenants—and then we’ll build the five layers that would have stopped them. Segment 1 – Incident Proof: How Defaults Burned Two Tenants We open with two Teams failure stories: Incident 1 – The Guest That Never Left
  • A project ends. Champagne’s gone. One guest remains in the team.
  • Private channel = separate SharePoint site; the guest’s sync client still points to that library.
  • Weeks later, guest opens their laptop → the private channel library syncs fresh sensitive files down automatically.
What failed:
  • No guest expiration
  • No Entra ID access reviews for the team
  • External sharing too loose for private-channel SharePoint sites
  • Owners assumed “project over” = “access over.” It wasn’t.
Blast radius:
  • Sensitive docs in the private channel site
  • Meeting recordings, Loop components, and thread-linked files
  • All delivered via SharePoint sync—no need to open Teams at all
Incident 2 – PII Paste and the Data Fork
  • A tired internal user pastes SSNs and bank details into a Teams channel.
  • Someone copies it to email for a vendor. Another exports the thread.
  • PII now lives in Teams, Exchange, local drives, and third-party systems. Cleanup becomes a scavenger hunt.
What failed:
  • No Purview DLP for Teams chat & channels
  • No policy tips, no block-with-override, no compliance alert
  • Teams treated like a front-end; core controls (Purview, Entra, SharePoint) were never tuned
Key takeaway: Teams isn’t the vault. It’s the lobby.
The vault lives in Conditional Access, Purview DLP, Entra ID Governance, and SharePoint sharing policies. From here, we build the five layers that would have shut both incidents down. Layer 1 – Conditional Access Baseline That Actually Bites Goal: Identity is the lock. Make it hurt to be misconfigured. You’ll hear a complete Conditional Access baseline:
  1. MFA for Everyone (Including Guests)
    • Entra policy: All users (including Guests and external) → All cloud apps.
    • Grant: Require MFA.
    • Exclude only two break-glass accounts with long random passwords, monitored and stored offline.
  2. Kill Legacy Authentication
    • New policy targeting Exchange ActiveSync and Other clients.
    • Grant: Block access.
    • Starves phish and breaks old clients that can’t do MFA.
  3. Require Device Compliance for Crown Apps
    • Scope: internal users (and guests where feasible).
    • Apps: Teams, SharePoint Online, Exchange Online.
    • Grant: Require compliant device (Intune)
    • For BYOD/mobile: cloned policy using “approved client app” + app protection instead.
  4. Session Controls & Risk-Based Policies
    • Short sign-in frequency (e.g., 8 hours) and weekly reauth for sensitive apps.
    • Enable Continuous Access Evaluation (CAE) so password changes and account disables kill live sessions.
    • Extra policies for high-risk sign-ins/users → block or force password change and investigation.
  5. Guest & Service Account Edge Cases
    • Ensure guests hit MFA at first sign-in.
    • Disable interactive sign-in for service accounts; move to workload or managed identities.
    • Regularly test break-glass accounts and CAE behavior.
The point: MFA enforced, legacy auth dead, only trusted devices, short sessions, and real risk-based gates. Layer 2 – Purview DLP for Teams Chat & Channels Goal: Sensitive data should trip a wire the second it hits chat. Configuration you’ll walk through:
  • Purview DLP Policy targeted specifically to:
    • Teams chat and Teams channel messages
  • Sensitive Info Types:
    • SSNs, credit cards, bank accounts, health data, and custom IDs (employee/customer IDs, etc.).
  • Rules:
    1. High-confidence block with override
      • Match = 1 for crown jewels (SSN, PAN with Luhn, etc.).
      • Block message; allow override with typed justification.
      • Real-time policy tip to user + high-severity alert to compliance.
    2. Medium-confidence educate & alert
      • Allow message but warn user and notify compliance for tuning and behavior change.
Extras:
  • Mirror policies to SharePoint/OneDrive so files + links are both covered.
  • Tune confidence and match counts to kill noise.
  • Use policy tips that explain in plain language, not legalese.
  • Pilot, tune, then roll out by department → finally org-wide.


Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

Follow us on:
LInkedIn
Substack
Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Teams Channels Are Not Secure By Default: The Admin Lie

Teams Channels Are Not Secure By Default: The Admin Lie

Mirko Peters