Pro User
Timespan
explore our new search
Microsoft 365: Guest Account Risks
Microsoft Entra
Nov 14, 2025 6:26 PM

Microsoft 365: Guest Account Risks

by HubSite 365 about Jonathan Edwards

No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.

Secure guest access in Microsoft cloud with Entra ID, Conditional Access, MFA, Access Reviews, SharePoint and Teams

Key insights

  • Guest accounts are external users invited to collaborate in Microsoft 365; they enable partners to work with your Teams, SharePoint, and apps but can become a major security risk if permissions and governance are weak.
    Keep the number of guests and their access scopes limited to reduce exposure.
  • Recent threats include a Power Apps vulnerability that can expose data through trial licenses and an Entra ID subscription risk that lets guests create or control subscriptions; both can lead to privilege escalation and data access.
    Assume technical misconfigurations can be exploited and review app and subscription creation paths.
  • Enforce strong identity controls: require MFA for all guest and external users and apply Conditional Access policies to block guests from sensitive admin portals and restrict sign-in contexts.
    Use policies to force reauthentication, block risky locations, and limit guest access to only necessary resources.
  • Lock down invitations and sharing: limit who can invite guests, restrict invitations to trusted domains, and disable guest-to-guest invites to shrink your attack surface.
    Combine these invitation restrictions with clear approval workflows for external collaboration.
  • Manage sessions and lifecycle: set session lifetime controls (sign-in frequency and persistent browser limits) and run regular Access Reviews to remove inactive or unnecessary guests automatically.
    Automate cleanup to prevent orphaned accounts and stale permissions.
  • Operational checklist for admins: perform an immediate audit of guest accounts and privileged resources, enable continuous monitoring for guest-created apps or subscriptions, and deliver basic User training about safe external sharing.
    Prioritize fixes by exposure level and document guest governance policies for ongoing enforcement.

In a recent YouTube video, Jonathan Edwards presents a practical walkthrough on securing guest accounts in Microsoft 365, and this article summarizes his key points for newsroom readers. Jonathan explains why guest accounts, while useful for collaboration, can become a hidden security risk when controls lapse. He demonstrates a step-by-step approach using Entra ID and Conditional Access policies, and he illustrates real-world pitfalls that organizations should address. Consequently, this report highlights the video’s main recommendations and the tradeoffs organizations must weigh.

Video Overview and Goals

The video opens by framing guest access as a double-edged sword: it supports external collaboration but increases attack surface if misconfigured. Jonathan walks viewers through the typical lifecycle of guest accounts, from invitation to long-term access, and then shows how failures at each step can cause exposure. He uses clear, actionable demonstrations to set up controls such as enforced multifactor authentication and invitation restrictions. As a result, the audience gains a practical roadmap rather than abstract theory.

Key Risks Identified

Jonathan points out several specific risks, including overly broad permissions, forgotten or inactive guest accounts, and newly reported vulnerabilities involving services like Power Apps and tenant subscription creation. He explains that attackers can sometimes exploit trial license misconfigurations or weak invitation controls to gain wider access than intended. Moreover, he stresses that guest-created subscriptions in Entra ID can provide unexpected visibility into tenant resources and lead to privilege escalation. Therefore, treating guest accounts as first-class security concerns is essential.

Controls Demonstrated in the Video

To mitigate these risks, Jonathan demonstrates configuring MFA for all guest users, tightening who can send invitations, and restricting invitations to trusted domains only. He also shows how to block guest access to sensitive admin portals and how to use Conditional Access to set session lifetimes and sign-in frequency limits. Additionally, he highlights the importance of automating lifecycle tasks with tools such as Access Reviews to identify and remove inactive guest accounts. Thus, the video balances preventive measures with operational cleanup to maintain a secure environment.

Tradeoffs and Practical Challenges

While the controls Jonathan recommends improve security, they introduce tradeoffs in usability and administrative workload, and the video does not shy away from these tensions. For example, requiring strict MFA and short session lifetimes strengthens protection but can frustrate external collaborators and increase support tickets. Similarly, limiting who can invite guests reduces risk but may slow legitimate business processes or push users toward shadow invitations. Consequently, organizations must balance security with collaboration needs and plan policies that reflect real-world workflows.

Recommendations and Next Steps

Jonathan’s practical advice culminates in a concise set of actions: audit guest accounts, enforce identity safeguards, narrow invitation permissions, apply domain restrictions, use Conditional Access to limit sessions, and run regular Access Reviews to clean up stale accounts. He also recommends monitoring guest-created resources and educating staff about safe sharing practices because technical controls alone are not enough. Ultimately, organizations should adopt a layered approach that pairs technical policy with clear governance and ongoing monitoring to reduce risk while preserving necessary collaboration.

Identity - Microsoft 365: Guest Account Risks

Keywords

Microsoft 365 guest accounts, guest account security Microsoft 365, Azure AD guest user risk, manage guest access Office 365, secure guest access Microsoft 365, external collaboration security, guest user permissions review, B2B collaboration security