MS.TEAMS.8.2v1 - User click tracking SHOULD be enabled.

Information

Users may click on malicious links in Teams, leading to compromise or authorized data disclosure. Enabling user click tracking lets agencies know if a malicious link may have been visited after the fact to help tailor a response to a potential incident.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Any product meeting the requirements outlined in this baseline policy may be used. If the agency uses Microsoft Defender, see the following implementation steps for [standard or strict preset security policy](defender.md#msdefender13v1-instructions) for additional guidance.

[^1]: Note that B2B guest users and all anonymous users except for external users appear in Teams calls as _John Doe (Guest)_. To avoid potential confusion, true guest users are always referred to as B2B guest users in this document.

See Also

https://github.com/cisagov/ScubaGear/tree/v1.5.0/

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-4, 800-53|AC-6, 800-53|CA-7, 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|CM-8, 800-53|IA-9, 800-53|SA-22, 800-53|SC-2, 800-53|SC-3, 800-53|SC-7, 800-53|SC-18, 800-53|SC-20, 800-53|SC-29, 800-53|SC-30, 800-53|SC-39, 800-53|SC-44, 800-53|SI-2, 800-53|SI-3, 800-53|SI-4, 800-53|SI-7, 800-53|SI-8, 800-53|SI-10

Plugin: microsoft_azure

Control ID: 241921bc2ba9d50019c3947988fea12546e5e25700cf37947067cbb356949841