Jul 27 2020 01:48 PM
We utilize the M365 IP service to let users in our firewall access to M365 services, including Teams. We use tenant restrictions in our firewall to ensure they are only connecting to our tenant, with AAD certificate auth & MFA using CA. However, because teams is on the network whitelist - meeting invitations from other tenants can be sent and joined anonymously - providing a pathway to exfiltrate data from an otherwise secure endpoint. Our only solution is to hard block the URLs involved in Teams - but we would like these higher security users to use Teams with Information Barriers - but can't allow them to get these meeting invites to other organizations uncontrollably. This would be a great CAS feature, to identify anonymous teams meetings and allow for alerts or restriction.