EPC Group - Enterprise Microsoft AI, SharePoint, Power BI, and Azure Consulting
Clutch Top Power BI & Data Solutions Company 2026, G2 High Performer, Momentum Leader, Leader Awards
BlogContact
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

EPC Group

Enterprise Microsoft consulting with 28+ years serving Fortune 500 companies.

(888) 381-9725
contact@epcgroup.net
4900 Woodway Drive - Suite 830
Houston, TX 77056

Follow Us

Solutions

  • All Services
  • Microsoft 365 Consulting
  • AI Governance
  • Azure AI Consulting
  • Cloud Migration
  • Microsoft Copilot
  • Data Governance
  • Microsoft Fabric
  • vCIO / vCAIO Services

Industries

  • All Industries
  • Healthcare IT
  • Financial Services
  • Government
  • Education
  • Teams vs Slack

Power BI

  • Case Studies
  • 24/7 Emergency Support
  • Dashboard Guide
  • Gateway Setup
  • Premium Features
  • Lookup Functions
  • Power Pivot vs BI
  • Treemaps Guide
  • Dataverse
  • Power BI Consulting

Company

  • About Us
  • Our History
  • Microsoft Gold Partner
  • Case Studies
  • Testimonials
  • Blog
  • Resources
  • Contact

Microsoft Teams

  • Teams Questions
  • Teams Healthcare
  • Task Management
  • PSTN Calling
  • Enable Dial Pad

Azure & SharePoint

  • Azure Databricks
  • Azure DevOps
  • Azure Synapse
  • SharePoint MySites
  • SharePoint ECM
  • SharePoint vs M-Files

Comparisons

  • M365 vs Google
  • Databricks vs Dataproc
  • Dynamics vs SAP
  • Intune vs SCCM
  • Power BI vs MicroStrategy

Legal

  • Sitemap
  • Privacy Policy
  • Terms
  • Cookies

© 2026 EPC Group. All rights reserved.

Back to Blog

How Microsoft Teams Admin Center Lets You Add External Users To Work Chat

Errin O\'Connor
December 2025
8 min read

Microsoft Teams Admin Center provides granular controls for enabling external collaboration while maintaining security boundaries. Understanding the difference between external access (federation) and guest access, and configuring each appropriately through the Admin Center, is essential for organizations that need to collaborate with vendors, partners, clients, and contractors without compromising their security posture.

External Access vs Guest Access: Understanding the Difference

Microsoft Teams supports two distinct methods for collaborating with users outside your organization. Choosing the right method depends on the level of access and collaboration depth required.

  • External Access (Federation) - Enables chat and calling with users in other Microsoft 365 organizations or Skype for Business without adding them to your tenant. External users remain in their own organization and cannot access your Teams channels, files, or apps. Think of it as "phone call-level" access.
  • Guest Access - Adds external users to your Teams environment as guest members. Guests can participate in team channels, access files in SharePoint, join meetings, and collaborate on documents. Guests are added to your Azure AD as B2B guest accounts with configurable permissions.
  • Shared Channels - A newer option that allows sharing individual channels with external organizations via Azure AD B2B Direct Connect. External users access the shared channel from their own Teams client without switching tenants.
  • Anonymous Meeting Join - Allows anyone with a meeting link to join Teams meetings without authentication. Controlled separately from external and guest access policies.

Configuring External Access in Teams Admin Center

External access settings control which external organizations your users can communicate with via chat and calls. These settings are configured at the tenant level through the Teams Admin Center.

  • Navigate to Settings - Sign in to the Teams Admin Center (admin.teams.microsoft.com) with Global Admin or Teams Administrator credentials. Go to Users > External access.
  • Teams and Skype for Business Users - Choose between allowing all external domains (open federation), blocking specific domains, or allowing only specific domains. For regulated industries, allow-list specific partner domains rather than opening federation to all.
  • Teams Accounts Not Managed by an Organization - Control whether your users can communicate with personal Teams accounts (non-organizational). Disable this for environments with strict data loss prevention requirements.
  • Skype Users - Enable or disable communication with consumer Skype users. Most enterprise organizations disable this to prevent unauthorized external communication channels.
  • Per-User Policies - Apply external access policies to specific user groups rather than the entire organization. For example, allow the sales team to communicate with all external domains while restricting R&D teams to approved partner domains only.

Configuring Guest Access in Teams Admin Center

Guest access provides deeper collaboration capabilities but requires more careful configuration to balance productivity with security. Each setting controls what guests can and cannot do in your Teams environment.

  • Enable Guest Access - Navigate to Users > Guest access in the Teams Admin Center. Toggle "Allow guest access in Teams" to On. This is the master switch that must be enabled before any guest invitations can be sent.
  • Calling Permissions - Configure whether guests can make private calls (one-to-one voice and video calls). Disable this if guests should only participate in scheduled meetings.
  • Meeting Permissions - Control whether guests can use video, screen sharing, and meeting recording. For regulated environments, you may want to disable recording for guests to prevent unauthorized content capture.
  • Messaging Permissions - Configure whether guests can edit/delete sent messages, use chat, Giphy, memes, and stickers. Enterprise environments typically allow chat and message editing while disabling Giphy to maintain professional communication standards.
  • Channel Permissions - Control whether guests can create, update, and delete channels. Best practice: restrict guests to participating in existing channels rather than creating new ones to maintain governance control.

Azure AD Guest Settings (Required Prerequisites)

Guest access in Teams depends on Azure Active Directory B2B collaboration settings. These must be configured correctly in the Azure portal before Teams guest invitations will work.

  • External Collaboration Settings - In Azure AD > External Identities > External collaboration settings, configure who can invite guests: admins only, admins and specific roles, anyone in the organization, or no one. For governance, restrict to admins and team owners.
  • Collaboration Restrictions - Specify allowed or denied domains for guest invitations. This works in conjunction with Teams external access settings and should be aligned to avoid conflicting policies.
  • Guest User Permissions - Configure the default permission level for guest accounts. Options range from "Guest users have limited access" (recommended) to "Guest users have the same access as members."
  • Conditional Access Policies - Apply conditional access policies specifically to guest accounts: require MFA, block access from untrusted locations, require compliant devices, or require terms of use acceptance before accessing resources.
  • Access Reviews - Configure periodic access reviews for guest accounts to ensure external users are removed when the business relationship ends. Set quarterly or semi-annual review cycles with automatic removal of unreviewed accounts.

Security Best Practices for External Collaboration

Enabling external collaboration introduces risk that must be mitigated through layered security controls. These best practices protect your organization while enabling productive external partnerships.

  • Require MFA for Guests - Create an Azure AD conditional access policy that requires multi-factor authentication for all guest account sign-ins, regardless of the guest's home organization MFA policies.
  • Apply Sensitivity Labels - Use Microsoft Purview sensitivity labels on Teams and channels to control whether guests can be added. Label "Confidential" teams to automatically block guest membership.
  • Data Loss Prevention - Configure DLP policies that monitor and block sharing of sensitive information (PII, PHI, financial data) in chats and channels where guests are present.
  • Audit Guest Activity - Monitor guest sign-ins, file access, and message activity through Microsoft 365 audit logs and Microsoft Sentinel for suspicious behavior patterns.
  • Lifecycle Management - Implement guest account lifecycle policies: automatic expiration after 90-180 days, quarterly access reviews, and automatic removal of inactive guest accounts.
  • Information Barriers - Use Teams information barriers to prevent guests from being added to teams containing conflicting business interests (e.g., competing vendor teams within the same tenant).

Why Choose EPC Group for Teams External Collaboration

EPC Group has configured Microsoft Teams external collaboration for hundreds of enterprise organizations over our 28+ years of Microsoft consulting. As a Microsoft Gold Partner, our team understands the complex interplay between Teams Admin Center, Azure AD, conditional access, and compliance policies that determine a secure, functional external collaboration experience. Our founder, Errin O'Connor, has authored 4 Microsoft Press books including guides on SharePoint and Microsoft 365 governance.

  • Comprehensive external collaboration architecture covering Teams, SharePoint, OneDrive, and Azure AD B2B
  • Security-first configuration that enables collaboration without compromising data protection
  • Compliance-aware implementations for HIPAA, CMMC, FedRAMP, and ITAR regulated environments
  • Governance frameworks with lifecycle management, access reviews, and audit monitoring

Need Help Configuring Teams External Collaboration?

EPC Group's Teams specialists configure secure external collaboration frameworks that balance productivity with security, ensuring your organization can collaborate with external partners while maintaining compliance and data protection.

Schedule a ConsultationCall (888) 381-9725

Frequently Asked Questions

Can external users access files shared in Teams?

Guest users (added via guest access) can access files shared in the Teams channels they are members of. These files are stored in the team's SharePoint site, and guest access permissions flow through. External access users (federation) cannot access any files, channels, or team resources. They can only chat and make calls. If you need external users to access shared documents, use guest access rather than external access.

How do I add a guest to a specific Teams channel?

First, ensure guest access is enabled in the Teams Admin Center and Azure AD. Then, a team owner opens the team, clicks the three-dot menu, selects "Add member," enters the external user's email address, and sets their role as "Guest." The guest receives an email invitation with a link to accept and join the team. They can then access all standard channels. To restrict guests to specific channels, use private channels, which can be configured to include or exclude guest members.

Is guest access in Teams HIPAA compliant?

Microsoft Teams guest access can be configured to be HIPAA compliant when combined with appropriate controls: enforce MFA for guests via conditional access, apply DLP policies to prevent PHI sharing outside the organization, use sensitivity labels to control which teams allow guests, disable guest screen recording and file downloads where appropriate, and ensure your organization has a signed BAA with Microsoft (included in Microsoft 365 E3/E5 enterprise agreements).

How do I remove guest access for a specific user?

Team owners can remove guests from specific teams via the team membership settings. To remove the guest account entirely from your Azure AD tenant, an administrator must go to the Azure AD portal > Users, find the guest account, and delete it. For automated lifecycle management, configure Azure AD access reviews to periodically prompt team owners to review and confirm or remove guest access. Inactive guest accounts can be automatically removed after a configured period.

What is the difference between Shared Channels and Guest Access?

Shared Channels (powered by Azure AD B2B Direct Connect) allow external users to participate in a specific channel without being added to your tenant as a guest. External users access the shared channel from their own Teams client without switching organizations. Guest Access adds external users to your Azure AD tenant as B2B guests with broader access to the team's channels, files, and apps. Shared Channels are better for focused collaboration on specific projects; Guest Access is better when external users need full team participation.