Teams, Block Access to Remote Tenant\Teams

%3CLINGO-SUB%20id%3D%22lingo-sub-2055842%22%20slang%3D%22en-US%22%3ETeams%2C%20Block%20Access%20to%20Remote%20Tenant%5CTeams%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2055842%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20have%20noticed%20that%20some%20teams%20users%20have%20been%20receiving%20invites%20to%20teams%20sites%20on%20a%20different%20tenant.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20is%20expected%20that%20the%20Tenant%20is%20being%20used%20for%20various%20phising%20attacks%2C%20I%20dont%20want%20to%20block%20users%20from%20accepting%20invites%20to%20third%20party%20tenant%5Cteams%20site%2C%20but%20need%20a%20way%20to%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E-%20track%20this%20activity%3C%2FP%3E%3CP%3E-%20block%20this%20activity%2C%20if%20we%20suspect%20there%20is%20a%20problem%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20suspect%20the%20answer%20is%20a%20combination%20of%20things%2C%20is%20there%20a%20specific%20way%20in%20which%20this%20can%20be%20achieved.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2055842%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Teams%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2055909%22%20slang%3D%22en-US%22%3ERe%3A%20Teams%2C%20Block%20Access%20to%20Remote%20Tenant%5CTeams%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2055909%22%20slang%3D%22en-US%22%3EHi%2C%20no%20clear%20answer%20here%20AFAIK.%20It%20would%20have%20to%20be%20a%20combo%20of%20things%2C%20as%20when%20tuning%20phising%20etc.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Ftuning-anti-phishing%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Ftuning-anti-phishing%3Fview%3Do365-worldwide%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EI%E2%80%99m%20aware%20of%20a%20couple%20of%20UV%20requests%2C%20one%20of%20them%20here%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoftteams.uservoice.com%2Fforums%2F555103-public%2Fsuggestions%2F36352375-prevent-users-from-joining-external-tenants-as-gue%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoftteams.uservoice.com%2Fforums%2F555103-public%2Fsuggestions%2F36352375-prevent-users-from-joining-external-tenants-as-gue%3C%2FA%3E%3C%2FLINGO-BODY%3E
Senior Member

We have noticed that some teams users have been receiving invites to teams sites on a different tenant.

 

It is expected that the Tenant is being used for various phising attacks, I dont want to block users from accepting invites to third party tenant\teams site, but need a way to:

 

- track this activity

- block this activity, if we suspect there is a problem

 

I suspect the answer is a combination of things, is there a specific way in which this can be achieved.

 

Thanks

 

1 Reply
Hi, no clear answer here AFAIK. It would have to be a combo of things, as when tuning phising etc. https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/tuning-anti-phishing?vie...

I’m aware of a couple of UV requests, one of them here https://microsoftteams.uservoice.com/forums/555103-public/suggestions/36352375-prevent-users-from-jo...