Small business owner reviewing Microsoft Teams security settings on laptop screen


Attackers have figured out that Microsoft Teams is a backdoor into your business. The same tool your team uses to share files and hop on calls is now being used by threat actors who pose as IT help desk staff, convince employees to grant remote access, and walk away with your data.

For small businesses with a small number of employees, this creates a real problem. You probably don’t have a dedicated security team. You might not even have a dedicated IT person. But you still need to protect your business from attacks that are growing more sophisticated regularly. Secure your Microsoft Teams environment against social engineering by following these steps.

Understanding the Teams-Based Attack Pattern

Before you can defend against something, you need to understand how it works. The attack pattern that gained traction through ransomware groups in recent years follows a predictable sequence.

First, attackers may flood an employee’s inbox with spam or junk messages. This creates confusion and frustration. Then comes the Teams message or call, often from someone claiming to be from IT support. “I noticed your email is acting up. Let me help you fix that.” The timing feels coincidental. It isn’t.

Once trust is established, the attacker guides the employee to open Windows Quick Assist (a built-in remote access tool) or install third-party software like AnyDesk, TeamViewer, or ConnectWise. At that point, the attacker has direct access to your systems. They can deploy ransomware, steal credentials, or quietly install backdoors for later access.

The attack works because it exploits human nature. Someone who appears helpful, who seems to know about a problem you’re experiencing, who uses familiar tools and professional language. Small businesses face these risks just as much as large enterprises, often with fewer defenses in place.

Your Microsoft Teams Security Checklist

Work through these items in order. Each builds on the previous one, and together they create multiple layers of protection.

Step 1: Disable External Access (Or Restrict It Heavily)

The single most effective defense is to turn off external access to Teams entirely. If your business doesn’t need to communicate with people outside your organization via Teams, disable it.

To do this:

  1. Go to the Microsoft Teams admin center
  2. Select External collaboration settings on the left rail
  3. Set “Users can communicate with other Teams users” to Off
  4. Set “Users can communicate with Skype users” to Off

If you must communicate with external parties (vendors, clients, partners), don’t leave external access wide open. Use an allow list instead. This means only specific domains you approve can contact your team.

To set up an allow list:

  1. In External collaboration settings, select “Allow only specific external domains”
  2. Add each trusted partner domain individually
  3. Review this list quarterly and remove any domains you no longer work with

Step 2: Block Unmanaged Devices from Joining Meetings

Attackers sometimes join meetings from personal devices to gather intelligence or build credibility before launching a social engineering attempt.

In your Teams admin center:

  1. Go to Meetings, then Meeting policies
  2. Under “Participants and guests,” restrict anonymous users from joining meetings
  3. Require meeting organizers to admit attendees from the lobby

For sensitive meetings, consider requiring all participants to be authenticated users within your organization.

Step 3: Configure Guest Access Carefully

Guest access is different from external access. Guests are people you’ve specifically invited to participate in a Team or channel. While this is often necessary for project collaboration, it needs guardrails.

Review these settings in the External collaboration settings area:

  • Disable guest ability to make private calls
  • Turn off guest access to screen sharing if not needed
  • Set guest permissions to “Viewer” by default, upgrading only when necessary
  • Enable expiration policies for guest accounts (a reasonable period is recommended for most projects)

Step 4: Restrict Third-Party Apps and Bots

Malicious apps can be installed in Teams to harvest data or provide attackers with persistent access. Lock this down.

In the Teams admin center:

  1. Go to Teams apps, then Permission policies
  2. Block all third-party apps by default
  3. Create an allow list of specific apps your business actually uses
  4. Review installed apps regularly

Most small businesses need a limited number of third-party Teams apps. If you’re not sure what an app does or who installed it, remove it.

Step 5: Enable Multi-Factor Authentication

If an attacker compromises an employee’s password, MFA stops them from logging in. This should be non-negotiable for every Microsoft 365 account in your organization.

Through Microsoft Entra:

  1. Enable security defaults (the easiest option for small businesses)
  2. Or configure Conditional Access policies for more control
  3. Require MFA for all users, not just admins

Use authenticator apps rather than SMS when possible. SIM-swapping attacks can bypass text message verification.

Phishing Awareness Training Implementation Guide for Teams Threats

Technical controls catch some attacks. Training catches the rest. Research on phishing training effectiveness shows that employees who receive regular, realistic training are better at spotting social engineering attempts.

What Your Team Needs to Know

Every employee should understand these specific warning signs of Teams-based attacks:

  • Unexpected contact from “IT support” they don’t recognize
  • Requests to install remote access software
  • Pressure to act quickly to “fix” a problem
  • Anyone asking them to open Quick Assist or share their screen
  • Messages from external contacts they didn’t initiate

Create a simple rule: If someone contacts you claiming to be IT and asks for remote access, hang up and call your actual IT contact (or the person responsible for technology at your company) using a number you already have.

How to Implement Automated Phishing Training

Annual security training doesn’t work well. After a few months, most employees have forgotten what they learned. Plug-and-play security solutions for small businesses now offer continuous training through simulated attacks.

The approach works like this:

  1. The platform sends realistic phishing simulations to employees
  2. Employees who click receive immediate, non-punitive feedback
  3. Difficulty increases as employees improve
  4. Reports show you who needs additional support

For small businesses without IT staff, look for platforms that require minimal setup and run automatically. You shouldn’t need to craft phishing emails yourself or manually track results.

A good social engineering defense program includes simulations that mirror real Teams-based attacks, not just email phishing.

Document Your Verification Process

Write down exactly how your business handles IT support requests. This removes ambiguity and gives employees something concrete to follow.

Your documentation should answer:

  • Who provides IT support for your business (internal person, external vendor, or both)?
  • How will they contact employees (email from a specific address, phone call from a known number)?
  • Under what circumstances would they ever request remote access?
  • What is the verification process before granting access?

Share this document with every employee and review it during onboarding.

Quick Assist and Remote Access Tool Controls

The Windows Quick Assist tool is legitimate software that attackers abuse. You have options for controlling it.

Option 1: Disable Quick Assist Entirely

If your business doesn’t use Quick Assist for legitimate support, remove it:

  1. Open Settings, then Apps, then Optional features
  2. Find Microsoft Quick Assist
  3. Click Uninstall

Do this on every company computer. If you manage devices through Microsoft Intune or similar tools, you can push this change to all devices at once.

Option 2: Monitor Quick Assist Usage

If you need Quick Assist for legitimate purposes, be aware that it is difficult to monitor on the recipient side. Standard Windows Event Logs do not reliably record session details like helper identity or specific actions. While the Microsoft Store version may log a basic Event ID 0, it provides minimal activity logging and is often insufficient for forensic investigation without third-party monitoring.

Block Unauthorized Remote Access Software

Attackers often ask employees to install AnyDesk, TeamViewer, or similar tools. If your business doesn’t use these applications, block them.

Using Windows Defender Application Control or similar tools:

  • Create a block list for common remote access applications
  • Prevent users from installing new software without admin approval
  • Alert on attempted installations of blocked applications

Monitoring and Response

Even with good defenses, some attacks will get through. Prepare for that.

Set Up Basic Alerting

Microsoft 365 includes built-in security alerts. Make sure someone is actually receiving them:

  • Configure alerts to go to an email address someone checks daily
  • Enable alerts for impossible travel (logins from geographically distant locations)
  • Enable alerts for new devices accessing accounts
  • Enable alerts for changes to security settings

Create an Incident Response Plan

If an employee realizes they’ve been compromised, what should they do? Write it down:

  1. Disconnect from the network immediately (unplug ethernet, disable WiFi)
  2. Contact [specific person] at [specific phone number]
  3. Do not attempt to “fix” anything on the computer
  4. Document what happened while it’s fresh (what did they click, what did they see, who contacted them)

Post this somewhere visible. Employees won’t remember a document they read six months ago when they’re panicking.

Review Logs After Suspicious Activity

If you suspect a Teams-based attack occurred, check:

  • Microsoft Entra sign-in logs for unusual login locations or times
  • Teams admin center for new external contacts or guest additions
  • Windows event logs for PowerShell execution or remote access tool usage
  • Email logs for mass spam delivery (the email bombing phase)

If you don’t have the expertise to review these logs yourself, establish a relationship with a security consultant before you need one.

Maintenance Schedule

Security settings aren’t set-and-forget. Build these reviews into your calendar:

Weekly:

  • Review security alerts
  • Check for new guest accounts added to Teams

Monthly:

  • Review installed Teams apps
  • Check external collaboration settings for outdated domains
  • Review phishing simulation results

Quarterly:

  • Audit guest account permissions and remove expired guests
  • Update IT verification documentation if contacts have changed
  • Test your incident response process

Small businesses can protect themselves from Teams-based social engineering without enterprise budgets or dedicated security teams. The combination of restricted external access, employee training, and basic monitoring catches most attacks before they succeed. Start with the technical controls in this checklist, then build the human layer through continuous training that keeps social engineering threats visible to your team.

Start Building Your Human Firewall

Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.

This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.