Medium

External User Access

Reviews external user access and permissions

Category
Identity
Default severity
Medium
Rule key
CHECK_EXTERNAL_USERS
Last updated

Why this matters

What this means

A significant portion of users in your directory are external (guest) identities. While collaboration with external partners is normal, a high ratio of guest-to-member users may indicate insufficient governance over external access.

Why is it a security risk?

  • Guest users are authenticated by their home tenant — you have no control over their password strength, MFA settings, or compromised status.
  • Over time, guest accounts accumulate without review, creating an ever-growing external attack surface.
  • Guests may retain access to SharePoint sites, Teams, and applications long after the collaboration has ended.

Recommended next steps

  1. Review your external collaboration settings to control who can invite guests and which domains are allowed.
  2. Set up recurring Access Reviews for all guest users.
  3. Consider using Entitlement Management access packages to automate guest lifecycle (invite → review → remove).

How to fix it

Regularly review and validate external user access

Required Microsoft Graph permissions

EntraAnalyzer needs the following read-only Graph permissions to evaluate this rule:

  • Directory.Read.All
  • User.Read.All

Further reading

Microsoft documentation →

Run this check on your tenant

EntraAnalyzer evaluates this rule automatically on every scan and emails you the results.

Get started — free first scan →