What is a guest user in Microsoft 365?
A guest user is an external identity (often someone from a partner organisation, contractor, or customer) who has been invited into the tenant via Entra ID B2B collaboration. Guest users have a presence in the tenant directory but authenticate against their home identity provider. Guests can be added to Teams, SharePoint sites, Microsoft 365 Groups and individual files.
Why is guest access a risk?
Three reasons. First, guests accumulate over time without lifecycle review. Frontrow audits routinely surface guest accounts that joined years ago and are still active. Second, guests can be invited by any member user under default settings, which means access to confidential content can be granted without the data owner's knowledge. Third, guests are often outside the organisation's own MFA and Conditional Access controls unless those policies are explicitly scoped to include them.
What is an anonymous (Anyone) link in SharePoint?
An anonymous link gives access to a file or folder to anyone who has the URL, with no identity check. They are convenient for one-off sharing but bypass identity controls and frequently end up forwarded, indexed or saved beyond the original recipient. The CIS Microsoft 365 Foundations Benchmark and Microsoft's secure-by-default guidance both recommend disabling anonymous links tenant-wide and using specific-people links instead.
What is the cross-tenant access setting?
Cross-tenant access settings in Microsoft Entra ID control how the tenant treats sign-ins from external Entra ID tenants (B2B collaboration). Defaults allow any tenant. Tightening this to an allow-list of partner tenants reduces the risk of unintended external collaboration and can also configure trust for MFA and compliant device claims from partner tenants.
What does Entra ID entitlement management do?
Entitlement management lets an organisation define access packages — bundles of resources (Teams, sites, apps, groups) that internal or external users can request, with approval workflows, expiry, and access reviews built in. For guest collaboration it provides the lifecycle that ad-hoc invitation does not.
What does ASD say about external sharing?
ASD's Information Security Manual (information sharing controls) requires that information sharing arrangements are documented, reviewed and aligned to the sensitivity of the data. Microsoft's tools (sensitivity labels, site-level external sharing, entitlement management) provide the technical controls. The gap is usually configuration, not capability.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Microsoft Learn for Teams external access, SharePoint sharing, cross-tenant settings and entitlement management; CIS Microsoft 365 Foundations Benchmark; ASD Information Security Manual. Methodology authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).
What does Frontrow's verified Teams guest-access audit include?
A direct review of guest users, sharing links, cross-tenant settings and sensitivity labels via Microsoft Graph (rather than self-reported answers), inventory of high-risk external collaborations, and a remediation plan covering invitation policy, link defaults, lifecycle workflows and sensitivity labelling. Indicative pricing on request.