You can restrict access to SharePoint sites and content to users in a specific group by using a site access restriction policy. Users not in the specified group can't access the site or its content, even if they had prior permissions or a shared link. This policy can be used with Microsoft 365 group-connected, Teams-connected, and nongroup connected sites.
Site access restriction policies are applied when a user attempts to open a site or access a file. Users with direct permissions to the file can still view files in search results. However, they can't access the files if they're not part of the specified group.
Restricting site access via group membership can minimize the risk of oversharing content. For insights into data sharing, see Data access governance reports.
It might take up to one hour for command to take effect
Note
For Microsoft 365 Multi-Geo users, run this command separately for each desired geo-location.
Restrict access to group-connected sites (Microsoft 365 Groups and Teams)
Site access restriction policy for group-connected sites restricts SharePoint site access to members of the Microsoft 365 group or team associated with the site.
To manage site access restriction for a group-connected site in SharePoint admin center
In SharePoint admin center, expand Sites and select Active sites.
Select the site you want to manage and the site details panel appears.
In the Settings tab, select Edit in the Restricted site access section.
Select the Restrict access to this site box and select Save.
To manage site access restriction for group-connected sites using PowerShell, use the following commands:
Action
PowerShell command
Enable site access restriction for group-connected site
Once the policy is enabled for a site, the site owner can view the details of how the site access restriction policy affects the site.
For group-connected sites, the policy status and the configured control group details are displayed on the Site Information and Permissions panels.
Restrict site access to nongroup connected sites
You can restrict access to nongroup connected sites by specifying Microsoft Entra security groups or Microsoft 365 groups that contain the people who should be allowed access to the site. You can configure up to 10 Microsoft Entra security groups or Microsoft 365 groups. Once the policy is applied, users in the specified group who have site access permissions are granted access to the site and its content. You can use dynamic security groups if you want to base group membership on user properties.
To manage site access to a nongroup connected site:
In SharePoint admin center, expand Sites and select Active sites.
Select the site you want to manage and the site details panel appears.
In Settings tab, select Edit in the Restricted site access section.
Select the Restrict SharePoint site access to only users in specified groups check box.
Add or remove your security groups or Microsoft 365 groups and select Save.
In order for site access restriction to be applied to the site, you must add at least one group to the site access restriction policy.
To manage site access restriction for nongroup connected sites using PowerShell, use the following commands:
After enabling the policy for communication sites, the policy status and all configured control groups are displayed for site owners on the Site access panel in addition to the Site Information and Permissions panels.
Shared and private channel sites
Shared and private channel sites are separate from the Microsoft 365 group-connected site that standard channels use. Because shared and private channel sites aren't connected to the Microsoft 365 group, site access restriction policies applied to the team don't affect them. You must enable site access restriction for each shared or private channel site separately as nongroup connected sites.
For shared channel sites, only internal users in the resource tenant are subject to site access restriction. External channel participants are excluded from site access restriction policy and only evaluated per the site's existing site permissions.
Important
Adding people to the security group or Microsoft 365 group won't give users access to the channel in Teams. It's recommended to add or remove the same users of the teams channel in Teams and the security group or Microsoft 365 group so users have access to both Teams and SharePoint.
Sharing of sites with Restricted site access policy
Sharing of SharePoint sites and its content can be blocked with users and groups who aren't allowed as per the Restricted access control policy.
The sharing control functionality is disabled by default. To enable it, run the following PowerShell command in SharePoint Online Management Shell as an Administrator:
Sharing is only allowed with users who are part of restricted access control groups. Sharing will be blocked with anyone outside of the restricted access control groups as shown below:
Sharing with groups
Sharing is allowed with Microsoft Entra Security or Microsoft 365 groups which are part of the restricted access control groups list. Thus, sharing with all other groups including Everyone except external users or SharePoint groups won’t be allowed.
Note
At present, sharing of a site and its content won't be allowed for the nested security groups that are part of the restricted access control groups. This support will be added in the next release iteration.
Configure learn more link for access denial error page
Configure your learn more link to inform users who were denied access to a SharePoint site due to the restricted site access control policy. With this customizable error link, you can provide more information and guidance to your users.
Note
The learn more link is a tenant-level setting that applies to all sites that have restricted access control policy enabled.
To configure the link, run the following command in SharePoint PowerShell:
Set-SPOTenant -RestrictedAccessControlForSitesErrorHelpLink “<Learn more URL>”
To fetch the value of the link, run the following command:
Shows the distribution of access denials across different types of sites
Note
To view up to 10,000 denials, you must download the reports. Run the download command as an administrator and the downloaded reports are located on the path from where command was run.
Auditing
Audit events are available in the Purview compliance portal to help you monitor site access restriction activities. Audit events are logged for the following activities: