Skip to content

Commit 1179927

Browse files
authored
Merge pull request #221617 from v-edmckillop/patch-48
Update 2-secure-access-current-state.md
2 parents a268094 + b82fdb9 commit 1179927

File tree

1 file changed

+49
-40
lines changed

1 file changed

+49
-40
lines changed
Lines changed: 49 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Discover the current state of external collaboration with Azure Active Directory
3-
description: Learn methods to discover the current state of your collaboration.
3+
description: Learn methods to discover the current state of your collaboration
44
services: active-directory
55
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 09/02/2022
11+
ms.date: 12/15/2022
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -17,70 +17,79 @@ ms.collection: M365-identity-device-management
1717

1818
# Discover the current state of external collaboration in your organization
1919

20-
Before discovering the current state of your external collaboration, you should [determine your desired security posture](1-secure-access-posture.md). You'll consider your organization’s needs for centralized vs. delegated control, and any relevant governance, regulatory, and compliance targets.
20+
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
2121

22-
Individuals in your organization are probably already collaborating with users from other organizations. Collaboration can be through features in productivity applications like Microsoft 365, by emailing, or by otherwise sharing resources with external users. The pillars of your governance plan will form as you discover:
22+
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
2323

24-
* The users who are initiating external collaboration.
25-
* The external users and organizations you're collaborating with.
26-
* The access being granted to external users.
24+
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
2725

28-
## Users initiating external collaboration
29-
30-
The users initiating external collaboration best understand the applications most relevant for external collaboration, and when that access should end. Understanding these users can help you determine who should be delegated permission to inviting external users, create access packages, and complete access reviews.
31-
32-
To find users who are currently collaborating, review the [Microsoft 365 audit log for sharing and access request activities](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#sharing-and-access-request-activities). You can also review the [Azure AD audit log for details on who invited B2B](../external-identities/auditing-and-reporting.md) users to your directory.
33-
34-
## Find current collaboration partners
26+
* Users initiating external collaboration
27+
* Collaboration with external users and organizations
28+
* Access granted to external users
3529

36-
External users may be [Azure AD B2B users](../external-identities/what-is-b2b.md) (preferable) with partner-managed credentials, or external users with locally provisioned credentials. These users are typically (but not always) marked with a UserType of Guest. You can enumerate guest users through the [Microsoft Graph API](/graph/api/user-list?tabs=http), [PowerShell](/graph/api/user-list?tabs=http), or the [Azure portal](../enterprise-users/users-bulk-download.md).
30+
## Users initiating external collaboration
3731

38-
There are also tools specifically designed to identify existing Azure AD B2B collaboration such as identifying external Azure AD tenants, and which external users are accessing what applications. These tools include a [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity) and an [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md).
32+
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
3933

40-
### Use email domains and companyName property
34+
To find collaborating users:
4135

42-
External organizations can be determined by the domain names of external user email addresses. If consumer identity providers such as Google are supported, this may not be possible. In this case we recommend that you write the companyName attribute to clearly identify the user’s external organization.
36+
* [Microsoft 365, audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true)
37+
* [Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
4338

44-
### Use allow or blocklists
39+
## Collaboration with external users and organizations
4540

46-
Consider whether your organization wants to allow collaboration with only specific organizations. Alternatively, consider if your organization wants to block collaboration with specific organizations. At the tenant level, there is an [allow or blocklist](../external-identities/allow-deny-list.md), which can be used to control overall B2B invitations and redemptions regardless of source (such as Microsoft Teams, Microsoft SharePoint, or the Azure portal).
41+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See, [B2B collaboration overview](../external-identities/what-is-b2b.md).
4742

48-
If you’re using entitlement management, you can also scope access packages to a subset of your partners by using the Specific connected organizations setting as shown below.
43+
You can enumerate guest users with:
4944

50-
![Screenshot of allowlisting or blocklisting in creating a new access package.](media/secure-external-access/2-new-access-package.png)
45+
* [Microsoft Graph API](/graph/api/user-list?tabs=http)
46+
* [PowerShell](/graph/api/user-list?tabs=http)
47+
* [Azure portal](../enterprise-users/users-bulk-download.md)
5148

52-
## Find access being granted to external users
49+
There are tools to identify Azure AD B2B collaboration, external Azure AD tenants and users accessing applications:
5350

54-
Once you have an inventory of external users and organizations, you can determine the access granted to these users using the Microsoft Graph API to determine Azure AD [group membership](/graph/api/resources/groups-overview) or [direct application assignment](/graph/api/resources/approleassignment) in Azure AD.
51+
* [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity)
52+
* [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md)
5553

56-
### Enumerate application-specific permissions
54+
### Email domains and companyName property
5755

58-
You may also be able to perform application-specific permission enumeration. For example, you can programmatically generate a permission report for SharePoint Online by using [this script](https://gallery.technet.microsoft.com/office/SharePoint-Online-c9ec4f64).
56+
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
5957

60-
Specifically investigate access to all of your business-sensitive and business-critical apps so that you are fully aware of any external access.
58+
### Allowlist, blocklist, and entitlement management
6159

62-
### Detect ad hoc sharing
60+
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
6361

64-
If your email and network plans enable it, you can investigate content being shared through email or through unauthorized software as a service (SaaS) apps. [Microsoft 365 Data Loss Protection](/microsoft-365/compliance/data-loss-prevention-policies) helps you identify, prevent, and monitor the accidental sharing of sensitive information across your Microsoft 365 infrastructure. [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security) can help you identify the use of unauthorized SaaS apps in your environment.
62+
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
6563

66-
## Next steps
64+
![Screenshot of the Specific connected organizations option, under New access packages.](media/secure-external-access/2-new-access-package.png)
6765

68-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
66+
## External user access
6967

70-
1. [Determine your security posture for external access](1-secure-access-posture.md)
68+
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
7169

72-
2. [Discover your current state](2-secure-access-current-state.md) (You are here.)
70+
* [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71+
* [Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
7372

74-
3. [Create a governance plan](3-secure-access-plan.md)
73+
### Enumerate application permissions
7574

76-
4. [Use groups for security](4-secure-access-groups.md)
75+
Investigate access to your sensitive apps for awareness about external access. See, [Grant or revoke API permissions programmatically](/graph/permissions-grant-via-msgraph?view=graph-rest-1.0&tabs=http&pivots=grant-application-permissions&preserve-view=true).
7776

78-
5. [Transition to Azure AD B2B](5-secure-access-b2b.md)
77+
### Detect informal sharing
7978

80-
6. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
79+
If your email and network plans are enabled, you can investigate content sharing through email or unauthorized software as a service (SaaS) apps.
8180

82-
7. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
81+
* Identify, prevent, and monitor accidental sharing
82+
* [Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide&preserve-view=true )
83+
* Identify unauthorized apps
84+
* [Microsoft Defender for Cloud Apps](/security/business/siem-and-xdr/microsoft-defender-cloud-apps?rtc=1)
8385

84-
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
86+
## Next steps
8587

86-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
88+
* [Determine your security posture for external access](1-secure-access-posture.md)
89+
* [Create a security plan for external access](3-secure-access-plan.md)
90+
* [Securing external access with groups](4-secure-access-groups.md)
91+
* [Transition to governed collaboration with Azure Active Directory B2B collaboration](5-secure-access-b2b.md)
92+
* [Manage external access with entitlement management](6-secure-access-entitlement-managment.md)
93+
* [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
94+
* [Control access with sensitivity labels](8-secure-access-sensitivity-labels.md)
95+
* [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)

0 commit comments

Comments
 (0)