MS Teams
Connecting MS Teams to LightBeam
Last updated
Connecting MS Teams to LightBeam
Last updated
Overview
LightBeam Spectra users can connect various data sources to the LightBeam application and these data sources will be continuously monitored for PII, PHI data.
Example: MS Teams, MS Outlook, Gmail, Slack, etc.
Log in to your LightBeam Instance.
Click on DATASOURCES on the Top Navigation Bar.
Click on Add a Data Source.
Search for “Teams
”.
Click on Teams.
Fill in the details as shown below and click on Next:
Data Source Name: This is the unique name given to the data source.
Description: This is an optional field needed to describe the use of this data source.
Primary Owner: Email address of the person responsible for this data source which will get alerts by default.
Entity Creation: LightBeam Spectra detects and associates attributes based on the context and identifies whose data it is; these are called entities. Example: Jane Doe is an entity for whom LightBeam Spectra might have detected Name and SSN in a monitored data source.
Source of Truth: LightBeam Spectra would have monitored data sources that contain data acting as a single point of truth and that can be used for looking up entities/attributes that help to identify if the other attributes/entities found in any other data source are accurate or not. A Source of Truth data set would create entities based on the attributes found in the data.
Location: The location of the data source.
Purpose: The purpose of the data being collected/processed.
Stage: The stage of the data source. Example: Source, Processing, Archival, etc.
Provide the credentials as shown below and click on Test Connection.
Client Id: It refers to the unique identifier assigned to the Azure portal application that is used for integrating LightBeam with the Teams data source. It is generated when you register an application in the Azure portal.
Client Secret value: It is a confidential key or password associated with the Azure portal application. It is used to authenticate and authorize the application when accessing Teams resources. The Client Secret value is generated when you create a new client secret in the Azure portal.
Tenant Id: It is a unique identifier assigned to the Azure Active Directory (AAD) tenant associated with the organization. It represents the organization's directory or identity store in Azure AD. The Tenant Id is obtained from the Azure portal.
Event Hub Name: Name of the Azure EventHub entity. It can be found under Azure EventHub Namespace's entity tab.
Event Hub Notification URL: URL of the Azure Vault secret where we stored the Event Hub Notification connection string primary key as value.
Verify that you get the message “Connection Success!”. Click on Next.
In this step, you can choose :
Domain which you want to scan for: This is an optional field where you specify the domain name that you want to scan from total detected domains.
Scan selected members and groups: Email address of members and groups which you want to include or exclude from scanning.
i) Scan all channels.
ii) Scan selected channels
To choose option (i), select Scan all channels, and click on Save.
Under EXCLUSION LIST FOR SCANNING, you can select the channel names you want to exclude from the scan.
To choose option (ii), select Scan selected channels. You can select the channels in the drop-down menu.
Select the inputs by ticking the checkboxes next to them.
Click on Save.
Now, we are ready to browse through the onboarded Teams datasource dashboard.
Click on Portal.
Click on the Search box on the Top Navigation bar. Type and search for “App Registrations”.
Click on App Registrations.
Click on New Registration. Add details as shown below and click Register.
Click on Certificates and secrets.
Click on New client secret.
Fill in the client secret details in the Description and Expires fields.
Click on Add.
Copy the Client Secret value and keep it secure for future use as you will not be able to retrieve it later.
Example: x_sWncr4m~.2lFeKlWR1pu3SgT32lg.254
Configure API Permissions.
Click API permissions -> Add a permission -> Microsoft Graph -> Application permissions -> Add following permissions
Then add the following permissions:
Once permissions are added, click on Grant admin consent for “Lightbeam.ai.”
Now, your application is ready to register.
To support live sync functionality, LightBeam requires the setup of an Azure EventHub service. Follow the steps below to configure the necessary components:
Create an Azure EventHub Namespace with the following details and leave the advanced settings at their default values:
Create a Shared Access Policy (ensure that Manage
, Send
, and Listen
permissions are enabled):
Within the EventHub Namespace, create an EventHub entity (Entities -> Event Hubs
).
Create a Shared access policies and copy the Connection String–Primary Key, as it will be required later. (ensure that Manage
, Send
, and Listen
permissions are enabled):
Set up an Azure Key Vault (ensure that Vault Access Policy is selected on the Access Configuration
tab). Other values can be left as default.
Add two access poliiesy for key vault created.
Policy for the newly registered application (for example: lb-teams) with following permissions.
Add second access policy (Microsoft Graph Change Tracking), For Secret permissions, select Get, and for Select Principal, select Microsoft Graph Change Tracking. Select Add.
Create a secret in the newly created Azure Key Vault (Objects -> Secrets
) and set the value to the Connection String–Primary Key copied from the Event Hubs Namespace -> Entities -> Your Azure EventHub Instance -> Shared Access Policy -> Connection string–primary key. Example: Endpoint=sb://<Event Hubs Namespace name>.servicebus.windows.net/;SharedAccessKeyName=access-policy;SharedAccessKey=<generated by Azure>=;EntityPath=<Your Event Hubs Instance name>
After completing the above steps, you will have all the required parameters to create the MS Teams integration with LightBeam:
For example,
To set up IP whitelisting in a restricted environment, consult the following Microsoft documentation links for the respective services:
Success Tip: We recommend creating a dedicated Azure portal application specifically for integrating LightBeam with the MS Teams data source. This application should be exclusively used for this purpose and not shared or repurposed for any other clients or applications. By doing so, you ensure secure and efficient access control, as well as maintain proper management of the LightBeam-Teams connection.
LightBeam automates Privacy, Security, and AI Governance, so businesses can accelerate their growth in new markets. Leveraging generative AI, LightBeam has rapidly gained customers’ trust by pioneering a unique privacy-centric and automation-first approach to security. Unlike siloed solutions, LightBeam ties together sensitive data cataloging, control, and compliance across structured and unstructured data applications providing 360-visibility, redaction, self-service DSRs, and automated ROPA reporting ensuring ultimate protection against ransomware and accidental exposures while meeting data privacy obligations efficiently. LightBeam is on a mission to create a secure privacy-first world helping customers automate compliance against a patchwork of existing and emerging regulations.
Log in to
Client ID: Obtain from the application overview page. Client Secret value: Obtain from the application overview page. Tenant ID: Obtain from the application overview page. Event Hub Name: Obtain from the name from Event Hubs Namespace -> Entities -> Name of the Event Hubs Instance created for LightBeam. Event Hub Notification URL: Create using the vault URL with the following structure:
Microsoft Graph:
Microsoft Azure Active Directory:
Microsoft 365 and Office 365 IP Address Ranges:
Azure Key Vault:
For any questions or suggestions, please get in touch with us at: .