
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
In a recent YouTube video, Jonathan Edwards presents a practical walkthrough on securing guest accounts in Microsoft 365, and this article summarizes his key points for newsroom readers. Jonathan explains why guest accounts, while useful for collaboration, can become a hidden security risk when controls lapse. He demonstrates a step-by-step approach using Entra ID and Conditional Access policies, and he illustrates real-world pitfalls that organizations should address. Consequently, this report highlights the video’s main recommendations and the tradeoffs organizations must weigh.
The video opens by framing guest access as a double-edged sword: it supports external collaboration but increases attack surface if misconfigured. Jonathan walks viewers through the typical lifecycle of guest accounts, from invitation to long-term access, and then shows how failures at each step can cause exposure. He uses clear, actionable demonstrations to set up controls such as enforced multifactor authentication and invitation restrictions. As a result, the audience gains a practical roadmap rather than abstract theory.
Jonathan points out several specific risks, including overly broad permissions, forgotten or inactive guest accounts, and newly reported vulnerabilities involving services like Power Apps and tenant subscription creation. He explains that attackers can sometimes exploit trial license misconfigurations or weak invitation controls to gain wider access than intended. Moreover, he stresses that guest-created subscriptions in Entra ID can provide unexpected visibility into tenant resources and lead to privilege escalation. Therefore, treating guest accounts as first-class security concerns is essential.
To mitigate these risks, Jonathan demonstrates configuring MFA for all guest users, tightening who can send invitations, and restricting invitations to trusted domains only. He also shows how to block guest access to sensitive admin portals and how to use Conditional Access to set session lifetimes and sign-in frequency limits. Additionally, he highlights the importance of automating lifecycle tasks with tools such as Access Reviews to identify and remove inactive guest accounts. Thus, the video balances preventive measures with operational cleanup to maintain a secure environment.
While the controls Jonathan recommends improve security, they introduce tradeoffs in usability and administrative workload, and the video does not shy away from these tensions. For example, requiring strict MFA and short session lifetimes strengthens protection but can frustrate external collaborators and increase support tickets. Similarly, limiting who can invite guests reduces risk but may slow legitimate business processes or push users toward shadow invitations. Consequently, organizations must balance security with collaboration needs and plan policies that reflect real-world workflows.
Jonathan’s practical advice culminates in a concise set of actions: audit guest accounts, enforce identity safeguards, narrow invitation permissions, apply domain restrictions, use Conditional Access to limit sessions, and run regular Access Reviews to clean up stale accounts. He also recommends monitoring guest-created resources and educating staff about safe sharing practices because technical controls alone are not enough. Ultimately, organizations should adopt a layered approach that pairs technical policy with clear governance and ongoing monitoring to reduce risk while preserving necessary collaboration.
Microsoft 365 guest accounts, guest account security Microsoft 365, Azure AD guest user risk, manage guest access Office 365, secure guest access Microsoft 365, external collaboration security, guest user permissions review, B2B collaboration security