Microsoft 365 Groups underpin various Office 365 applications, particularly Microsoft Teams, where each Team corresponds to an associated M365 Group. You can create these groups and later configure them with either private or public privacy settings, which works as follows:
When creating a group you'll need to decide if you want it to be a private group or a public group. Content in a public group can be seen by anybody in your organization, and anybody in your organization can join the group. Content in a private group must be seen by the members of the group and people who want to join a private group have to be approved by a group owner.
Public groups offer convenience but also pose risks, as any user within the organization's tenant, including guest users, can freely join these groups and gain access to the data they contain. For example:
Malicious or curious users can easily discover public groups without requiring any hacking tools. For example, they can find them via the "Create and join teams and channels" feature in Teams, in Outlook, or through the "My Apps Groups Access Panel", etc.
In Microsoft 365, end-users themselves create groups and choose whether they are public or private, typically from applications like Teams (most common), Outlook, or SharePoint, rather than relying on an IT administrator to create them, like security groups. As a result, end-users often select the public privacy option without fully comprehending that this allows anyone within the organization's Entra tenant to join the group without requiring approval from a group owner, thereby granting them access to all the group's content.
Microsoft 365 Groups, also known as "unified groups" and formerly referred to as "Office 365 groups", are one of the types of groups stored in Entra ID. This Indicator of Exposure focuses specifically on these Microsoft 365 Groups, rather than the more commonly known Microsoft Entra Security Groups, which do not have the same public/private privacy options.
Limitation: This Indicator of Exposure (IoE) cannot automatically determine whether a Public M365 Group is legitimate.
Note: Private groups can also inadvertently expose sensitive information, as by default, their name, description, and member list are visible to anyone within the organization's tenant. This metadata alone may be enough to infer confidential details, such as the target of a potential acquisition if it's included in the group name. To mitigate this risk, Microsoft provided options to hide private groups from directory listings and conceal their member lists. However, these settings are disabled by default, meaning organizations must proactively enable them to ensure that private group metadata remains confidential.
This IoE reports on all Microsoft 365 groups configured with the public setting. As the IoE cannot automatically determine the legitimacy of a group's public status, you must review each finding and take one of the following actions:
Microsoft 365 groups have designated owners who are responsible for managing the group's settings and membership. If you need to confirm the appropriate privacy setting for a group, you can contact the group owners via email or Teams chat.
You can change the privacy setting of Microsoft 365 groups to public or private using various methods:
Update-MgGroup -Visibility Public|Private|HiddenMembership
cmdlet.visibility
property.Set-UnifiedGroup -AccessType Public|Private
cmdlet.By default, M365 Groups created in Outlook and Azure portal have the private setting, which you can change.
To prevent the creation of new public groups that may not adhere to your organization's security and privacy policies, you have several options:
Name: Public M365 Group
Codename: PUBLIC-M365-GROUP
Severity: Medium