🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901 aws-saa-c03 aws-aif-c01
Guided MS-700 Domain 1
Domain 1 — Module 4 of 13 31%
4 of 27 overall

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting
Domain 1: Configure and manage a Teams environment Premium ⏱ ~12 min read

DLP & Conditional Access

Prevent sensitive data from leaking through Teams messages and control who can access Teams and under what conditions. Two powerful protection layers for the Teams admin.

Two layers of Teams protection

☕ Simple explanation

Think of DLP and Conditional Access as two different security checkpoints.

DLP is like a mail scanner at the office exit. It checks what’s leaving — if someone tries to send a credit card number or client SSN in a Teams message, DLP catches it, blocks it, or warns the sender.

Conditional Access is like the building entrance. Before you even get to your desk (Teams), it checks: Are you on a company device? Are you on a trusted network? Did you use MFA? If the conditions aren’t met, you’re turned away at the door.

Data Loss Prevention (DLP) policies in Microsoft Purview scan Teams chat and channel messages in real-time for sensitive information types (credit card numbers, SSNs, medical records, custom patterns). Actions range from user notification (tooltip warning) to message blocking. DLP for Teams requires at least Microsoft 365 E5 Compliance or the Information Protection add-on.

Conditional Access (CA) policies in Microsoft Entra ID control access to Teams based on signals: user identity, device compliance, location, sign-in risk, and client app. CA is the Zero Trust gateway — it evaluates every access attempt against your defined conditions before granting or denying access.

Data Loss Prevention for Teams

How DLP works in Teams

DLP policies for Teams scan messages in real-time as they’re sent. When a message matches a DLP rule:

  1. The message is sent (briefly visible)
  2. DLP evaluates the message against policy rules
  3. Action is taken within seconds — message can be blocked, user warned, or admin notified
  4. Blocked messages show a “This message was blocked” notice to other participants

DLP locations for Teams

LocationWhat It ScansNotes
Teams chat and channel messagesText in 1:1 chats, group chats, and channel postsScans message body text in real-time
Teams channel filesFiles shared in channels (stored in SharePoint)Covered by SharePoint DLP location
Teams chat filesFiles shared in chats (stored in OneDrive)Covered by OneDrive DLP location

Exam point: To fully protect Teams, you need DLP policies targeting both the “Teams chat and channel messages” location (for message text) and SharePoint/OneDrive locations (for shared files). A single policy can include multiple locations.

Creating a DLP policy for Teams

  1. Microsoft Purview → Data loss prevention → Policies → Create policy
  2. Choose a template (e.g., “Financial — Credit Card Number”) or create custom
  3. Select locations: enable Teams chat and channel messages
  4. Define rules:
    • Condition: Content contains sensitive info type (e.g., credit card number, confidence level high)
    • Action: Block the message, or allow but notify user with a policy tip
    • Override: Optionally allow users to override with business justification
  5. Set notifications: alert sender, alert admin, or both
  6. Enable the policy (test mode first recommended)

DLP actions in Teams

DLP actions for Teams messages
FeatureUser ExperienceWhen to UseConfiguration
Policy tip (warn)User sees a warning tooltip: 'This message may contain sensitive info'Low-risk scenarios — educate users without disrupting workAction: Notify user with policy tip
Block messageMessage is blocked — recipients see 'This message was blocked.' Sender can override with justification (if allowed)High-risk scenarios — credit cards, patient data, classified infoAction: Block content, optionally allow override
Block with no overrideMessage is blocked permanently — no override optionMaximum protection — regulatory requirementsAction: Block content, do not allow override
Scenario: Nadia configures DLP at Sterling Financial

Sterling Financial processes credit card payments and must comply with PCI-DSS. Nadia creates a DLP policy:

Policy: “Block credit card numbers in Teams”

  • Location: Teams chat and channel messages + SharePoint + OneDrive
  • Rule 1: Content contains credit card number (high confidence, 1+ instance)
    • Action: Block message with override allowed (business justification required)
    • Notify: sender sees policy tip, compliance team gets email alert
  • Rule 2: Content contains 5+ credit card numbers (any confidence)
    • Action: Block message, no override (mass data leak = zero tolerance)
    • Notify: sender + compliance team + Nadia (incident response)

When a customer service agent accidentally pastes a client’s credit card number in a Teams chat, the message is blocked within seconds. The agent sees: “This message was blocked because it contains sensitive information. You can override this block by providing a business justification.” The compliance team is notified regardless.

Conditional Access for Teams

How CA works with Teams

Conditional Access policies in Microsoft Entra ID evaluate access attempts based on signals:

SignalExamplesHow It Applies to Teams
User/groupAll users, specific groups, guest usersApply stricter policies to guests or external users
Cloud appMicrosoft TeamsTarget Teams specifically (or all M365 apps)
Device platformiOS, Android, Windows, macOSBlock Teams on unmanaged mobile devices
Device complianceIntune-managed, compliant, hybrid Entra-joinedRequire managed devices for desktop Teams
LocationNamed locations (office IP ranges), countriesBlock Teams access from specific countries
Sign-in riskLow, medium, high (Entra ID Protection)Require MFA for risky sign-ins to Teams
Client appBrowser, mobile app, desktop appBlock legacy auth clients

Common CA policies for Teams

PolicySignalsGrant ControlScenario
Require MFA for TeamsAll users + Teams appGrant: require MFABaseline protection
Block Teams on unmanaged devicesAll users + Teams + non-compliant devicesBlockPrevent data on personal devices
App protection on mobileMobile platforms + TeamsGrant: require approved client app or app protection policyAllow mobile Teams but with data protection
Block guest access from risky locationsGuest users + Teams + non-trusted locationsBlockPrevent external access from untrusted countries
Require compliant device for downloadsAll users + Teams + device filterGrant: require compliant deviceAllow browser Teams but block downloads on unmanaged devices
💡 Exam tip: CA targets Teams as a cloud app

When creating a CA policy for Teams, you select Microsoft Teams as the cloud app. But be aware:

  • Teams relies on SharePoint Online and Exchange Online for files and calendar. If you block Teams access but not SharePoint, files shared in Teams may still be accessible via SharePoint directly.
  • For comprehensive protection, consider targeting Office 365 (all apps) instead of just Teams.
  • Report-only mode is recommended before enforcing — run the policy in audit mode for 7-14 days to check impact.
Scenario: Nadia's Conditional Access at Sterling Financial

Sterling Financial’s compliance team requires:

  1. All users must use MFA for Teams access (baseline)
  2. Traders can only access Teams from compliant, Intune-managed Windows devices (no personal devices)
  3. Guest users (auditors) can access Teams from any device but only from approved IP ranges (Sterling’s partner offices)
  4. High-risk sign-ins require re-authentication and password change

Nadia creates four CA policies targeting Microsoft Teams as the cloud app:

  • Policy 1: All users → Require MFA → Grant
  • Policy 2: Traders security group → Require device compliance → Grant (block non-compliant)
  • Policy 3: Guest users → Non-trusted locations → Block
  • Policy 4: All users → High sign-in risk → Require MFA + password change → Grant

Result: When a trader tries to access Teams from a personal laptop, they’re blocked. When an auditor tries to access Teams from a hotel Wi-Fi (untrusted location), they’re blocked. When a legitimate user signs in from a new country, they must re-authenticate.

DLP + CA: working together

DLP and Conditional Access complement each other:

LayerWhat It ProtectsWhen It Acts
Conditional AccessControls who can access Teams and howBefore the user gets in
DLPControls what can be shared inside TeamsAfter the user is in, when they send messages

Both layers together = defence in depth. CA prevents untrusted access. DLP prevents data leaks from trusted users.

🎬 Video walkthrough

🎬 Video coming soon

DLP & Conditional Access — MS-700 Module 4

DLP & Conditional Access — MS-700 Module 4

~10 min

Flashcards

Question

What Teams locations should a DLP policy target for comprehensive protection?

Click or press Enter to reveal answer

Answer

1. Teams chat and channel messages (text scanning), 2. SharePoint (channel files), 3. OneDrive (chat files). All three are needed because message text and shared files are stored differently.

Click to flip back

Question

What happens when DLP blocks a Teams message?

Click or press Enter to reveal answer

Answer

The message is briefly sent, then blocked within seconds. Recipients see 'This message was blocked.' The sender sees a policy tip and can optionally override with business justification (if the policy allows overrides).

Click to flip back

Question

When creating a CA policy for Teams, which cloud app should you select?

Click or press Enter to reveal answer

Answer

Select Microsoft Teams as the cloud app. For comprehensive protection, consider targeting Office 365 (all apps) since Teams relies on SharePoint and Exchange for files and calendar.

Click to flip back

Question

What's the difference between DLP and Conditional Access for Teams?

Click or press Enter to reveal answer

Answer

CA controls WHO can access Teams and HOW (before they get in). DLP controls WHAT can be shared inside Teams (after they're in). CA = gate at the entrance. DLP = scanner inside the building.

Click to flip back

Knowledge Check

Knowledge Check

A DLP policy at Sterling Financial blocks credit card numbers in Teams messages but allows users to override with business justification. An agent sends a credit card number in a Teams chat. What happens FIRST?

Knowledge Check

Nadia needs to ensure traders at Sterling Financial can ONLY access Teams from Intune-compliant Windows devices. Which Conditional Access configuration is correct?

Knowledge Check

A Teams admin wants to prevent sensitive data leaks from both Teams messages AND files shared in Teams channels. How many DLP policy locations are needed?


Next up: Information Barriers & Insider Risk — how to prevent specific groups from communicating in Teams and detect risky behaviour patterns.

← Previous

Retention & Sensitivity Labels

Next →

Information Barriers & Insider Risk

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.