ASD's Blueprint for Secure Cloud

Teams clients

This section describes the design decisions associated with Teams clients according to guidance in ASD's Blueprint for Secure Cloud.

Estimated reading time: 8 minutes

The Microsoft Teams client operates across multiple platforms and devices, necessitating distinct security and management approaches. Configuration spans both local client settings and integrations with Entra ID, Intune, Defender for Office 365, and Purview.

These approaches are shaped by the two primary contexts in which Teams clients are used:

  • User clients: This includes desktop clients (Windows, macOS, VDI), mobile clients (iOS, Android), and web clients. These are used by individual users signing in interactively. This context supports security controls such as Multi-Factor Authentication (MFA), as well as Intune compliance and data protection policies.

  • Device clients: This includes Microsoft Teams Rooms (MTRs) and panels, and Teams Phones. These are typically communal, appliance-like devices that sign in automatically using non-interactive resource accounts. As such, they do not support MFA. Instead, they rely on Intune device compliance policies and other foundational security measures to reduce the attack surface.

User client configuration

Teams client configurations are managed through a combination of Entra ID, Intune, and the Teams admin center. Together, these platforms control access, enforce compliance, and govern in-app functionality:

  • Entra ID evaluates Conditional Access policies to enforce user authentication and session prerequisites.
  • Intune secures endpoints by applying device compliance rules and application data protection policies.
  • The Teams admin center manages in-app functionality through service-side, user-centric policies for meetings, messaging, and calling.

User client deployment

User clients are managed differently depending on their platform. The Teams desktop client is typically deployed as part of the Microsoft 365 Apps for Enterprise suite but follows its own update lifecycle. Mobile clients are distributed via public app stores or managed through Intune.

Device security and management

Shared Teams devices should be managed separately from user clients because they use non-interactive resource accounts, which do not support user-based security controls like multi-factor authentication (MFA).

A layered security model is required to manage sign-in, compliance, platform hardening, and updates. Intune enforces device-level configuration and compliance, while the Teams admin centre manages application settings and certified firmware updates.

Virtual desktop infrastructure (VDI)

Running Teams in VDI introduces unique requirements not present on physical clients:

  • The VDI platform should support media optimisation to offload AV processing from the session host to the user’s local endpoint, which is required to prevent high latency and server load.
  • The client should be installed per-machine on the golden image. For the VDI 2.0 architecture, this is a slim client that requires periodic image updates, even though its PWA components auto-update.
  • A solution like FSLogix is required for non-persistent sessions to roam user-specific data and prevent Teams from re-installing or re-syncing at every sign-in.
  • The user’s local device (thin client or PC) should be certified for optimisation and have a direct network path to Microsoft 365 media relays, bypassing the VDI connection.

End-to-end encryption (E2EE)

Teams supports E2EE for one-to-one calls and, with Teams Premium, for scheduled meetings of up to 200 participants. E2EE ensures only the communicating endpoints can decrypt content, providing maximum confidentiality.

E2EE disables features such as recording, transcription, live captions, call transfer, and compliance auditing. It can be used in scenarios where confidentiality requirements take precedence over collaboration features and oversight capabilities.

Network optimisation

A high-quality Teams experience requires an optimised network that provides a direct path to the Microsoft 365 service endpoints and prioritises real-time media traffic. Bandwidth needs can be estimated using the Network Planner tool, and ongoing network health is monitored using the Teams Call Quality Dashboard (CQD).

This network prioritisation can be implemented using Quality of Service (QoS) by applying Differentiated Services Code Point (DSCP) markings to packets and configuring clients and network infrastructure to respect those markings.

Microsoft Defender for Office 365 (MDO) integration

Teams is integrated with Defender for Office 365 which provides both Teams-specific features and broader security services that enable specific features within the Teams client.

Purview integration

The Teams client enforces data governance policies configured in Purview. This integration is essential for protecting information in real time. Organisations should consider implementing Data Loss Prevention (DLP) policies using Sensitive Information Types (SITs) to automatically detect and block sensitive and security-classified information from being shared in chats and channels.

Additionally, Purview sensitivity labels can be applied to Teams meetings to enforce security controls and, with Teams Premium, these controls can include advanced protections such as applying watermarks to shared content or video feeds and blocking meeting recording.

Using Purview for Teams containers, chats, and channels is discussed in more detail in the labelling and classification design page.

Security and governance

  • None identified

Design

Configuration

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra