You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Discover the current state of external collaboration in your organization
19
19
20
-
Before discovering the current state of your external collaboration, you should [determine your desired security posture](1-secure-access-posture.md). You'll consider your organization’s needs for centralized vs. delegated control, and any relevant governance, regulatory, and compliance targets.
20
+
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
21
21
22
-
Individuals in your organization are probably already collaborating with users from other organizations. Collaboration can be through features in productivity applications like Microsoft 365, by emailing, or by otherwise sharing resources with external users. The pillars of your governance plan will form as you discover:
22
+
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
23
23
24
-
* The users who are initiating external collaboration.
25
-
* The external users and organizations you're collaborating with.
26
-
* The access being granted to external users.
24
+
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
27
25
28
-
## Users initiating external collaboration
29
-
30
-
The users initiating external collaboration best understand the applications most relevant for external collaboration, and when that access should end. Understanding these users can help you determine who should be delegated permission to inviting external users, create access packages, and complete access reviews.
31
-
32
-
To find users who are currently collaborating, review the [Microsoft 365 audit log for sharing and access request activities](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#sharing-and-access-request-activities). You can also review the [Azure AD audit log for details on who invited B2B](../external-identities/auditing-and-reporting.md) users to your directory.
33
-
34
-
## Find current collaboration partners
26
+
* Users initiating external collaboration
27
+
* Collaboration with external users and organizations
28
+
* Access granted to external users
35
29
36
-
External users may be [Azure AD B2B users](../external-identities/what-is-b2b.md) (preferable) with partner-managed credentials, or external users with locally provisioned credentials. These users are typically (but not always) marked with a UserType of Guest. You can enumerate guest users through the [Microsoft Graph API](/graph/api/user-list?tabs=http), [PowerShell](/graph/api/user-list?tabs=http), or the [Azure portal](../enterprise-users/users-bulk-download.md).
30
+
## Users initiating external collaboration
37
31
38
-
There are also tools specifically designed to identify existing Azure AD B2B collaboration such as identifying external Azure AD tenants, and which external users are accessing what applications. These tools include a [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity) and an [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md).
32
+
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
39
33
40
-
### Use email domains and companyName property
34
+
To find collaborating users:
41
35
42
-
External organizations can be determined by the domain names of external user email addresses. If consumer identity providers such as Google are supported, this may not be possible. In this case we recommend that you write the companyName attribute to clearly identify the user’s external organization.
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
43
38
44
-
### Use allow or blocklists
39
+
##Collaboration with external users and organizations
45
40
46
-
Consider whether your organization wants to allow collaboration with only specific organizations. Alternatively, consider if your organization wants to block collaboration with specific organizations. At the tenant level, there is an [allow or blocklist](../external-identities/allow-deny-list.md), which can be used to control overall B2B invitations and redemptions regardless of source (such as Microsoft Teams, Microsoft SharePoint, or the Azure portal).
41
+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See, [B2B collaboration overview](../external-identities/what-is-b2b.md).
47
42
48
-
If you’re using entitlement management, you can also scope access packages to a subset of your partners by using the Specific connected organizations setting as shown below.
43
+
You can enumerate guest users with:
49
44
50
-

There are tools to identify Azure AD B2B collaboration, external Azure AD tenants and users accessing applications:
53
50
54
-
Once you have an inventory of external users and organizations, you can determine the access granted to these users using the Microsoft Graph API to determine Azure AD [group membership](/graph/api/resources/groups-overview) or [direct application assignment](/graph/api/resources/approleassignment) in Azure AD.
You may also be able to perform application-specific permission enumeration. For example, you can programmatically generate a permission report for SharePoint Online by using [this script](https://gallery.technet.microsoft.com/office/SharePoint-Online-c9ec4f64).
56
+
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
59
57
60
-
Specifically investigate access to all of your business-sensitive and business-critical apps so that you are fully aware of any external access.
58
+
### Allowlist, blocklist, and entitlement management
61
59
62
-
### Detect ad hoc sharing
60
+
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
63
61
64
-
If your email and network plans enable it, you can investigate content being shared through email or through unauthorized software as a service (SaaS) apps. [Microsoft 365 Data Loss Protection](/microsoft-365/compliance/data-loss-prevention-policies) helps you identify, prevent, and monitor the accidental sharing of sensitive information across your Microsoft 365 infrastructure. [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security) can help you identify the use of unauthorized SaaS apps in your environment.
62
+
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
65
63
66
-
## Next steps
64
+

67
65
68
-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
66
+
## External user access
69
67
70
-
1.[Determine your security posture for external access](1-secure-access-posture.md)
68
+
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
71
69
72
-
2.[Discover your current state](2-secure-access-current-state.md) (You are here.)
70
+
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71
+
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
73
72
74
-
3.[Create a governance plan](3-secure-access-plan.md)
73
+
### Enumerate application permissions
75
74
76
-
4.[Use groups for security](4-secure-access-groups.md)
75
+
Investigate access to your sensitive apps for awareness about external access. See, [Grant or revoke API permissions programmatically](/graph/permissions-grant-via-msgraph?view=graph-rest-1.0&tabs=http&pivots=grant-application-permissions&preserve-view=true).
77
76
78
-
5.[Transition to Azure AD B2B](5-secure-access-b2b.md)
77
+
### Detect informal sharing
79
78
80
-
6.[Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
79
+
If your email and network plans are enabled, you can investigate content sharing through email or unauthorized software as a service (SaaS) apps.
81
80
82
-
7.[Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
81
+
* Identify, prevent, and monitor accidental sharing
82
+
*[Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide&preserve-view=true)
83
+
* Identify unauthorized apps
84
+
*[Microsoft Defender for Cloud Apps](/security/business/siem-and-xdr/microsoft-defender-cloud-apps?rtc=1)
83
85
84
-
8.[Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
86
+
## Next steps
85
87
86
-
9.[Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
88
+
*[Determine your security posture for external access](1-secure-access-posture.md)
89
+
*[Create a security plan for external access](3-secure-access-plan.md)
90
+
*[Securing external access with groups](4-secure-access-groups.md)
91
+
*[Transition to governed collaboration with Azure Active Directory B2B collaboration](5-secure-access-b2b.md)
92
+
*[Manage external access with entitlement management](6-secure-access-entitlement-managment.md)
93
+
*[Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
94
+
*[Control access with sensitivity labels](8-secure-access-sensitivity-labels.md)
95
+
*[Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
0 commit comments