Home > Threat Library > Microsoft Entra tenant where regular users can create Microsoft 365 groups

Microsoft Entra tenant where regular users can create Microsoft 365 groups

Cayosoft Threat Definition CTD-000103

Protect Your Active Directory

Tune into Guardians of the Directory Podcast.

Guardians of the Directory

Stop AD Threats As They Happen

Cayosoft Protector provides continuous monitoring and real-time alerts across your entire Microsoft Identity stack

Like This Article?​

Subscribe to our LinkedIn Newsletter to receive more educational content

Risk Summary

Allowing regular users to create Microsoft 365 groups enables unauthorized or uncontrolled access paths to SharePoint sites, Teams, mailboxes, and apps, increasing the risk of data exposure and privilege creep.

  • Severity: Low
  • Platform: Entra ID
  • Category: Tenant-wide
  • MITRE ATT&CK Tactics: Collection
  • MITRE D3FEND Tactics: Application Configuration Hardening

Description

Microsoft 365 groups are used to manage access to resources and services in Azure. If a regular user can create groups in the tenant, a threat actor might create a group and use that group to get access to other user accounts. Microsoft 365 group creation should be restricted to Microsoft Entra administrators only.

Cayosoft Guardian Protector™

Real-World Scenario

An employee’s account is phished, giving the attacker standard user access. The attacker creates a Microsoft 365 group and links it to a new Team and SharePoint site, then adds external identities and permissive owners to avoid scrutiny. Business files begin syncing to the new site and the group is granted access to additional internal resources via existing group-based permissions. The attacker harvests documents and credentials stored in files and app connectors while remaining below privileged-action monitoring. Cayosoft Guardian detects the risky configuration where regular users can create Microsoft 365 groups and raises an alert before widespread access expansion occurs.

Stop Privilege Escalation—Then Undo It with Cayosoft Guardian

Real-time alerts across AD & Entra ID with one-click rollback.

How to Detect (Cayosoft Guardian)

1.) Sign in to Cayosoft Guardian Threat Detection Dashboard.

2.) Open All Alerts and search for CTD-000103 or Microsoft Entra tenant where regular users can create Microsoft 365 groups.

3.) Open any alert and Click for details (from Raise Threat Alert action).

Remediation Steps

Using the remediation advice in Cayosoft Guardian, follow these steps to remove the vulnerability:

To prevent users from creating security groups: 

  1. ) Open Microsoft Entra admin center.
  2. ) In the navigation panel, select Groups.
  3. ) In the Settings section, select General.
  4. ) Under Microsoft 365 Groups, change Users can create Microsoft 365 groups setting to No
  5. ) Click Save button.

How to Prevent It

Cayosoft Guardian can proactively detect and alert on Microsoft Entra tenant where regular users can create Microsoft 365 groups. It continuously monitors Active Directory, Entra ID, Microsoft 365, and Intune for over 200 misconfigurations, providing early warning before attackers can exploit them.

FAQ

It enables uncontrolled creation of SharePoint sites, Teams, and app-connected mailboxes, which can lead to data exposure, shadow IT, and privilege creep.

Microsoft Entra admin center → Groups → Settings → General → Microsoft 365 Groups → Users can create Microsoft 365 groups (set this to No).

Yes. Microsoft recommends disabling tenant-wide creation and granting limited permissions through a controlled approval or workflow process.

References

Final Thought

Proactive monitoring and timely remediation of configuration risks is essential to maintaining a secure Active Directory and Microsoft 365 environment. By addressing issues like Microsoft Entra tenant where regular users can create Microsoft 365 groups, you reduce attack surfaces and strengthen your organization’s overall security posture.