Skip to content

Commit 00d6730

Browse files
authored
Update 9-secure-access-teams-sharepoint.md
1 parent e157d3f commit 00d6730

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/active-directory/fundamentals/9-secure-access-teams-sharepoint.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ ms.collection: M365-identity-device-management
1717

1818
# Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure Active Directory
1919

20-
Use this article to determine and configure your organization's external collaboration using Microsoft Teams, OneDrive for Business, and SharePoint. A common challenge is balancing security and ease of collaboration for end users and external users. If an approved collaboration method is perceieved as restrictive and onerous, end user evade the approved method. End users might email unsecured content, or set up external processes and applications, such as a personal DropBox or OneDrive.
20+
Use this article to determine and configure your organization's external collaboration using Microsoft Teams, OneDrive for Business, and SharePoint. A common challenge is balancing security and ease of collaboration for end users and external users. If an approved collaboration method is perceived as restrictive and onerous, end users evade the approved method. End users might email unsecured content, or set up external processes and applications, such as a personal DropBox or OneDrive.
2121

2222
## External Identities settings and Azure Active Directory
2323

24-
Sharing in Microsoft 365 is partially governed by the **Exernal Identities, External collaboration** settings in Azure Active Directory (Azure AD). If external sharing is disabled or restricted in Azure AD, it overrides sharing settings configured in Microsoft 365. An exception is if Azure AD B2B integration isn't enabled. You can configure SharePoint and OneDrive to support ad-hoc sharing via one-time password (OTP). The following screenshot shows the External Identities, External collaboration settings dialog.
24+
Sharing in Microsoft 365 is partially governed by the **External Identities, External collaboration** settings in Azure Active Directory (Azure AD). If external sharing is disabled or restricted in Azure AD, it overrides sharing settings configured in Microsoft 365. An exception is if Azure AD B2B integration isn't enabled. You can configure SharePoint and OneDrive to support ad-hoc sharing via one-time password (OTP). The following screenshot shows the External Identities, External collaboration settings dialog.
2525

2626
![Screenshot of options and entries under External Identities, External collaboration settings.](media/secure-external-access/9-external-collaboration-settings.png)
2727

@@ -54,7 +54,7 @@ Guest invite settings determine who invites guests and how guests are invited. T
5454
* Revokes access as needed
5555

5656
* The IT team:
57-
* After training is complete, grants the Guest Inviter role
57+
* After training is complete, the IT team grants the Guest Inviter role
5858
* To enable access reviews, assigns Azure AD P2 license to the Microsoft 365 group owner
5959
* Creates a Microsoft 365 group access review
6060
* Confirms access reviews occur
@@ -69,15 +69,15 @@ For the Collaboration restrictions option, the organization's business requireme
6969

7070
* **Allow invitations to be sent to any domain** - any user can be invited
7171
* **Deny invitations to the specified domains** - any user outside those domains can be invited
72-
* **Allow invitations only to the specified domains** - any user outside those domains cannot be invited
72+
* **Allow invitations only to the specified domains** - any user outside those domains can't be invited
7373

7474
## External users and guest users in Teams
7575

7676
Teams differentiates between external users (outside your organization) and guest users (guest accounts). You can manage collaboration setting in the [Teams Admin portal](https://admin.teams.microsoft.com/company-wide-settings/external-communications) under Org-wide settings. Authorized account credentials are required to sign in to the Teams Admin portal.
7777

7878
* **External Access** - Teams allows external access by default. The organization can communicate with all external domains
7979
* Use External Access setting to restrict or allow domains
80-
* **Guest Access** - manage guest acess in Teams
80+
* **Guest Access** - manage guest access in Teams
8181

8282
Learn more: [Use guest access and external access to collaborate with people outside your organization](/microsoftteams/communicate-with-users-from-other-organizations).
8383

@@ -132,7 +132,7 @@ Use the guidance in this section when configuring external sharing.
132132
* Azure AD B2B integration not enabled: new guests don't have an Azure AD B2B account, and can't be managed from Azure AD
133133
* Guests have an Azure AD B2B account, depending on how the guest was created
134134
* **Existing guests** - Recommended, if you don't have integration enabled
135-
* With this enabled, users can share with other users in your directory
135+
* With this option enabled, users can share with other users in your directory
136136
* **Only people in your organization** - Not recommended with external user collaboration
137137
* Regardless of integration status, users can share with other users in your organization
138138
* **Limit external sharing by domain** - By default, SharePoint allows external access. Sharing is allowed with external domains.
@@ -146,14 +146,14 @@ Use the guidance in this section when configuring external sharing.
146146
Access controls setting affect all users in your organization. Because you might not be able to control whether external users have compliant devices, the controls won't be addressed in this article.
147147

148148
* **Idle session sign-out** - Recommended
149-
* Use this option to warn and sign-out users on unmanaged devices, after a period of inactivity
149+
* Use this option to warn and sign out users on unmanaged devices, after a period of inactivity
150150
* You can configure the period of inactivity and the warning
151151
* **Network location** - Set this control to allow access from IP addresses your organization owns.
152152
* For external collaboration, set this control if your external partners access resources when in your network, or with your virtual private network (VPN).
153153

154154
### File and folder links
155155

156-
In the SharePoint admin center, you can set how file and folder links are shared. You can configure these setting for each site.
156+
In the SharePoint admin center, you can set how file and folder links are shared. You can configure the setting for each site.
157157

158158
![Screenshot of File and folder links options.](media/secure-external-access/9-file-folder-links.png)
159159

@@ -166,7 +166,7 @@ You can customize this setting for a per-site default.
166166

167167
### Anyone links
168168

169-
Enabling Anyone links is not recommended. If you enable it, set an expiration, and restrict users to view permissions. If you select View only permissions for files or folders, users can't change Anyone links to include edit privileges.
169+
Enabling Anyone links isn't recommended. If you enable it, set an expiration, and restrict users to view permissions. If you select View only permissions for files or folders, users can't change Anyone links to include edit privileges.
170170

171171
Learn more:
172172

0 commit comments

Comments
 (0)