Microsoft Teams now supports per-user external domain access policies

Microsoft is introducing a new capability in Teams external collaboration that allows administrators to assign external domain access policies to specific users or Microsoft Entra ID groups. Previously, external domain access was limited to an organization-wide control.
This new capability enables precise control over which external domains each audience can interact with, supporting scenarios such as pilot rollouts with selected departments, restrictions for high-risk roles, or broad federation for trusted groups.

Timeline

The rollout should be completed by December 2025.

What is changing

External domain access settings in Teams were previously limited to organization-wide control, with policy-level options to either inherit tenant settings or block all external domains.

Tenant-level external access policy, for all users in your organization
Org-wide external domain policy for all users in your organization

The new capability introduces custom external domain access policies that can be assigned to user accounts or Entra ID groups. Each policy offers five configurations, enabling granular external collaboration controls for different scenarios such as pilots, restricted roles, or broad federation setups.

  • OrganizationDefault: Inherits the tenant’s default external access configuration.
  • AllowAllExternalDomains: All external organizations are trusted.
  • AllowSpecificExternalDomains: Only domains in the allow list are trusted.
  • BlockSpecificExternalDomains: Domains in the block list are restricted; all others are trusted.
  • BlockAllExternalDomains: All external domains are blocked for users assigned to this policy.

If you check your external access policies, you will notice the following properties are now configurable:

Teams admins can now configure these policy properties
Teams admins can now configure these policy properties

Microsoft notes the three properties are currently in Public Preview. If the rollout in your tenant has not yet been completed, you will receive an error message like this:

If the rollout has not been completed yet
If the rollout has not been completed yet

Once the rollout is completed, you can configure these properties using PowerShell. Configuration in the Teams Admin Center is not yet available. I created a new custom policy for my scenario.

It’s important to update CommunicationWithExternalOrgs with the correct value to reflect your changes; otherwise, the policy may continue using the organization’s default configuration.

PowerShell
Set-CsExternalAccessPolicy -Identity "Topedia External Access Policy" -AllowedExternalDomains @("demo1.tam365.com") -CommunicationWithExternalOrgs "AllowSpecificExternalDomains"

Define a domain whitelist in an external access policy
Define a domain whitelist in an external access policy

Next, you can assign the policy to an Entra ID group or individual user accounts.

PowerShell
# Group policy assignment
Grant-CsExternalAccessPolicy -PolicyName "<PolicyName>" -Group "<GroupID>" -Rank 1

# User policy assignment
Grant-CsExternalAccessPolicy -PolicyName "<PolicyName>" -Identity "<UserPrincipalName>"

Group-based external access policy is assigned
Group-based external access policy is assigned

Now, members of the assigned group can communicate with my Dev-tenant, while all other external domains are blocked. Users who are not part of the group continue to follow the organization-wide policy.

Now you have to keep in mind:
Users assigned a custom external access policy may be able to communicate with different external domains than those defined in the organization-wide configuration.

Share
Avatar photo

Tobias Asböck

Tobias is a Senior System Engineer with more than 10 years of professional experience with Microsoft 365 products such as SharePoint Online, SharePoint Premium, OneDrive for Business, Teams Collaboration, Entra ID, Information Protection, Universal Print, and Microsoft 365 Licensing. He also has 15+ years of experience planning, administering, and operating SharePoint Server environments. Tobias is a PowerShell Scripter with certifications for Microsoft 365 products. In his spare time, Tobias is busy with updates in the Microsoft 365 world or on the road with his road bike and other sports activities. If you have additional questions, please contact me via LinkedIn or [email protected].

Leave a Reply

Your email address will not be published. Required fields are marked *