External Sharing and Guest User Access in Microsoft 365 and Teams

Download this AvePoint eBook to learn how to develop and enforce the right external user access policy for your organisation.

Configure your collaboration tools to be effective and secure.

Microsoft Teams has become the central productivity hub for organisations today. Its value in enabling business continuity and collaboration can be seen in a nearly 500 percent increase in daily active users since the start of the COVID-19 pandemic. Now, Microsoft Teams can be securely configured to enable outsiders to participate as guest members of a Teams workspace and enjoy many of the same functions that insiders use.

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure. And finally, the eBook will outline some of the major decisions points across four general-purpose guest access policy scenarios for how an organisation can set this up with standard licensing.

Learn answers to key consideration questions like:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Table of Contents

  • Introduction

  • Policy Considerations and Cheat Sheet

  • The Layers of Guest Access & Common Challenges

  • Configuring Your Guest Access Policy

  • Conclusion


Get a Sneak Peak:

  • Solutions in Practice - AvePoint's Cloud Governance

    These automated processes allow organisations to scale guest access to Teams in a secure way. After all, the answer to, "should guests be allowed in a Team?" is almost never "yes" or "no," but rather "it depends." - Page 15

  • Key Takeaways - Establishing a Secure Foundation

    Sharing with outsiders requires working through a labyrinth of settings and admin centers. It is best to start by determining your governance policies. Otherwise, it's easy to get lost. - Page 29

Get the eBook

Fields with * are required