Check provider logo

Authorization policy restricts guest user access to properties and memberships of their own directory objects

entra_policy_guest_users_access_restrictions

Severitymedium
Serviceentra
by Prowler

Microsoft Entra authorization policy evaluates guest user access restrictions being set to the most restrictive level, where guests can view only their own directory object and related memberships (Guest user access is restricted to properties and memberships of their own directory objects).

Risk

Without this restriction, guests can read broader directory metadata and group memberships, enabling reconnaissance that harms confidentiality. A compromised guest gains context for phishing and privilege escalation, risking unauthorized changes (integrity) and disruption of collaboration spaces (availability).

Run this check with Prowler CLI

prowler m365 --checks entra_policy_guest_users_access_restrictions

Recommendation

Set guest access to the most restrictive level (Guest user access is restricted...) to enforce least privilege.

  • Avoid assigning admin roles to guests
  • Use time-bound access with approvals
  • Apply Conditional Access and limit group visibility
  • Run periodic access reviews for defense in depth

Remediation

CLI

Update-MgPolicyAuthorizationPolicy -GuestUserRoleId '2af84b1e-32c8-42b7-82bc-daa82404023b'

Terraform
Other
  1. Sign in to Microsoft Entra admin center (https://entra.microsoft.com)
  2. Go to Identity > External Identities > External collaboration settings
  3. Under Guest user access, select: "Guest user access is restricted to properties and memberships of their own directory objects"
  4. Click Save

Source Code

Resource Type

NotDefined

References