
Guest Users: The Overlooked Lateral Movement Path in Entra ID
Executive Summary
Guest users are often considered low-risk, low-privilege identities. However, they represent one of the most under-monitored lateral movement paths in Microsoft Entra ID (Azure AD). (Eliminate identity lateral movement – Zero Trust, 2025)
Attackers do not require Global Admin access to move laterally. They need visibility, persistence, and misconfiguration, all of which guest users can provide.
This article explains how attackers exploit guest users, outlines the technical methods involved, and highlights common oversights by defenders.
Why Guest Users Are a High-Value Target
Guest users:
- Are excluded from many Conditional Access policies
- Rarely have Identity Protection coverage
- Are often not MFA-enforced
- Have persistent access via Teams, SharePoint, and Entra ID groups
- Are trusted implicitly because they are “externalIn many environments, guest users encounter fewer security controls than internal employees. (Authentication and Conditional Access for B2B users - Microsoft Entra External ID, 2024)
The Identity Trust Boundary Problem
When a guest user authenticates:
- Authentication happens in the home tenant
- Authorization happens in your tenant
This creates a split trust model:
- You do not control their password policy
- You do not control their MFA methods
- You do not control their device posture Yet, once authorized, they can move laterally within your tenant. (Authentication and Conditional Access for B2B users - Microsoft Entra External ID, 2026)
Lateral Movement Technique #1: Guest → Teams → SharePoint
Attack Flow
- Attacker compromises an external tenant account
- That account is already invited as a guest
Guest has access to:
- Teams channels
- SharePoint document libraries
Attacker harvests:
- Credentials in documents
- VPN configs
- Internal URLs
- Usernames and org structure
Why This Works
- Access to SharePoint does not equate to an Entra ID role.
- Data access is rarely logged or reviewed
- Guest activity blends in as “collaboration.”
This is reconnaissance-based lateral movement, not privilege escalation, which is why it is often overlooked. (Eliminate identity lateral movement – Zero Trust, 2024)
Lateral Movement Technique #2: Guest Users in Entra ID Groups
The Hidden Risk
Many organizations:
- Add guest users to security groups
Reuse those groups for:
- App assignments
- SharePoint permissions
- SaaS access (Use a group to manage access to SaaS applications, 2025)
If a group is later:
- Assigned to an application
- Granted API permissions
- Used in Conditional Access exclusions
The guest user gains new access without notification.
Guest access can expand over time without requiring re-invitation. (Restrict guest user access permissions in Microsoft Entra ID, 2024)
Lateral Movement Technique #3: Guest → Application Tokens
Technical Detail
If a guest user:
- Is assigned to an enterprise application
- Uses OAuth-based access
- Receives refresh tokens
An attacker can:
- Steal tokens
- Reuse them without reauthentication
- Bypass MFA entirely
This results in token-based lateral movement rather than login-based movement. (Token Protection by using Microsoft Entra ID, 2026)Key point:
Token theft does not trigger sign-in risk alerts. (Protecting Tokens in Microsoft Entra ID, 2023)
Lateral Movement Technique #4: Cross-Tenant Trust Abuse
With:
- Cross-tenant access settings
- Default inbound trust enabled
- No MFA claim enforcement
An attacker can:
- Authenticate in a weaker tenant
- Access a stronger tenant as a guest
- Bypass MFA or compliant device requirements
This is an example of trust transitivity, which is rarely audited. (Eliminate identity lateral movement – Zero Trust, 2024)
Why Detection Fails
Most SOCs focus on:
- UserType = Member
- Privileged roles
- Risky sign-ins
But guest attacks involve:
- Normal sign-ins
- Low-risk IPs
- Legitimate collaboration workloads (Security guidance - Monitor and detect cyberthreats - Microsoft Entra, 2024)
Common blind spots:
- No KQL queries for UserType = Guest
- No anomaly baselines for guests
- No alerts for permission expansion (Eliminate identity lateral movement – Zero Trust, 2025)
How to Defend (Technical Controls)
1. Separate Conditional Access for Guests
Create guest-only policies:
- Require MFA
- Block legacy auth
- Restrict session duration
- Disable persistent browser sessions
Do not rely on the “All Users” group.
2. Enforce MFA Claims from Home Tenant
In Cross-Tenant Access:
- Require MFA claim
- Block tenants without strong auth
- Remove default trust
This prevents movement from weaker tenants to stronger tenants.
3. Monitor Token Usage, Not Just Sign-Ins
Focus on:
- Token lifetime
- Refresh token abuse
- Unusual resource access
Sign-ins tell you who logged in
Tokens tell you who stayed in
4. Audit Guest Group Membership Drift
Run periodic reviews for:
- Guest users in security groups
- Groups tied to applications
- Groups used in CA exclusions
Guest access should decay, not grow.
Final Thought
Guest users should not be viewed solely as a collaboration feature.
They are external identities inside your trust boundary.
If you do not address guest users as a lateral movement risk, attackers will exploit this oversight.
Written by Jaspreet Singh — Microsoft identity & security practitioner. Author at ITBlogs.ca. Lab notes and testing at f11.ca.
References
(2025). Eliminate identity lateral movement – Zero Trust. Microsoft Learn. https://learn.microsoft.com/en-us/security/zero-trust/sfi/eliminate-identity-lateral-movement
(2024). Authentication and Conditional Access for B2B users - Microsoft Entra External ID. Microsoft Learn. https://learn.microsoft.com/en-us/azure/active-directory/external-identities/authentication-conditional-access
(2026). Authentication and Conditional Access for B2B users - Microsoft Entra External ID. Microsoft Learn. https://learn.microsoft.com/en-us/azure/active-directory/external-identities/authentication-conditional-access
(2024). Eliminate identity lateral movement – Zero Trust. Microsoft Learn. https://learn.microsoft.com/en-us/security/zero-trust/sfi/eliminate-identity-lateral-movement
(2025). Use a group to manage access to SaaS applications. Microsoft Learn. https://learn.microsoft.com/en-us/entra/identity/users/groups-saasapps
(2024). Restrict guest user access permissions in Microsoft Entra ID. Microsoft Learn. https://learn.microsoft.com/en-us/azure/active-directory/enterprise-users/users-restrict-guest-permissions
(2026). Token Protection by using Microsoft Entra ID. Microsoft Community Hub. https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/token-protection-by-using-microsoft-entra-id-/4302207
(2023). Protecting Tokens in Microsoft Entra ID. Microsoft Learn. https://learn.microsoft.com/en-us/entra/identity/devices/protecting-tokens-microsoft-entra-id
(2024). Eliminate identity lateral movement – Zero Trust. Microsoft Learn. https://learn.microsoft.com/en-us/security/zero-trust/sfi/eliminate-identity-lateral-movement
(2024). Security guidance - Monitor and detect cyberthreats - Microsoft Entra. Microsoft Learn. https://learn.microsoft.com/en-us/entra/fundamentals/zero-trust-monitor-detect
(2025). Eliminate identity lateral movement – Zero Trust. Microsoft Learn. https://learn.microsoft.com/en-us/security/zero-trust/sfi/eliminate-identity-lateral-movement