Information
This policy setting controls chats and meetings with external unmanaged Teams users (those not managed by an organization, such as Microsoft Teams (free)).
The recommended state is: People in my organization can communicate with unmanaged Teams accounts set to Off
Allowing users to communicate with unmanaged Teams users presents a potential security threat as little effort is required by threat actors to gain access to a trial or free Microsoft Teams account.
Some real-world attacks and exploits delivered via Teams over external access channels include:
- DarkGate malware
- Social engineering / Phishing attacks by "Midnight Blizzard"
- GIFShell
- Username enumeration
Solution
To remediate using the UI:
- Navigate to Microsoft Teams admin center
https://admin.teams.microsoft.com/
.
- Click to expand Users select External access
- Select the Policies tab
- Click on the Global (Org-wide default) policy.
- Set People in my organization can communicate with unmanaged Teams accounts to Off
- Click Save
To remediate using PowerShell:
- Connect to Teams PowerShell using Connect-MicrosoftTeams
- Run the following command:
Set-CsExternalAccessPolicy -Identity Global -EnableTeamsConsumerAccess $false
Note: Configuring the organization settings to block communication is also in compliance with this control.
Impact:
Users will be unable to communicate with Teams users who are not managed by an organization.
Organizations may choose create additional policies for specific groups needing to communicating with unmanaged external users.
Note: The settings that govern chats and meetings with external unmanaged Teams users aren't available in GCC, GCC High, or DOD deployments, or in private cloud environments.