Story image

Microsoft rolls out guest access feature for Teams

13 Sep 17

Since Microsoft Teams became generally available six months ago, more than 125,000 organisations have used it to foster better teamwork.

Microsoft has announced that it is rolling out guest access to all Office 365 commercial and education customers.

Now Office 365 users can add people from outside their company to a team, so guests can participate in chats, join meetings, collaborate on documents, and more.

Guest access has been one of the top requested features for Teams among Microsoft customers.

The guest access feature in Teams was designed with three principles at the forefront:

Teamwork—Teams come in all shapes and sizes, and you need to be able to easily communicate and share with others you want to work with, including people outside your organisation.

Beginning today, anyone with an Azure Active Directory (Azure AD) account can be added as a guest in Teams.

That means anyone with one of the more than 870 million user accounts—across Microsoft commercial cloud services and third-party Azure AD integrated apps—can be added as a guest in Teams.

Later, Microsoft will add the ability for anyone with a Microsoft Account (MSA) to be added as a guest in Teams.

If the guest doesn’t have an existing MSA, they will be directed to create a free account using their current corporate or consumer email address, such as Outlook.com or Gmail.com.

Security and compliance—Customers have said to Microsoft that they expect guest access in Teams to provide enterprise-grade security and compliance assurances.

In Teams, guest accounts are added and securely managed within Azure AD through Azure AD B2B Collaboration.

This enables enterprise-grade security, like conditional access policies for guest user access.

Azure AD also uses adaptive machine learning algorithms and heuristics to detect anomalies and suspicious incidents, enabling mitigation or remediation actions, such as multi-factor authentication, to be triggered as appropriate.

In addition, with Azure AD, IT departments have unparalleled insight into the activities of external users in their organisation through detailed sign-in and access reports.

Guest user content and activities are under the same compliance and auditing protection as the rest of Office 365.

IT manageability—Guest access in Teams comes with the ability for IT to centrally manage how guests participate within their Office 365 environment, providing consistency across application experiences in Office 365.

IT admins can quickly and easily view, add, or revoke a guest’s access to the host tenant.

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
NBN Co rolls out 'optimised' wholesale business bundles for ISPs
“We recognise some businesses are on nbn powered plans that have not been optimised for their needs," says Paul Tyler.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.