Governance

Microsoft 365 governance: Keeping control

Uncontrolled Teams channel sprawl, guest access accounts nobody has closed, and SharePoint sites with no clear owner: that is what missing governance looks like in practice.

Microsoft 365 governance is often treated as tidy-up work after the rollout. That is exactly why it fails so often. Teams, SharePoint, OneDrive, Planner and guest collaboration make it easy to create workspaces, share files and invite external participants. That speed is valuable to the business, but without clear guardrails the platform grows faster than ownership and control.

The problem is rarely that users are doing something irrational. They are using the platform as designed. Governance breaks down when the organisation has never decided who should be allowed to create workspaces, when guest access is acceptable, how sharing should work by default, when an inactive team should be archived or deleted, and which data types require classification and retention. Microsoft starts with those same questions in both its Teams governance guidance and the SharePoint governance overview.

Where governance breaks down

Governance problems rarely show up as one dramatic failure. They show up as a long series of small exceptions that gradually become operational risk.

  • Workspaces are created without durable ownership. A project manager creates a Team, moves role six months later, and the associated SharePoint site keeps running without anyone being responsible for members, sharing or review.
  • External sharing becomes habit instead of policy. Users choose whichever sharing method feels quickest in the moment. Without deliberate defaults that often means over-permissive links or guest accounts that are never removed.
  • Lifecycle is confused with retention. Many organisations assume that archiving or deleting a Team solves their record-keeping obligations. It does not. Workspace lifecycle and content retention are related but separate control areas.
  • Governance sits only in IT. IT can configure controls, but it cannot by itself decide which Teams are still business-relevant, which guests still need access, or when a project has genuinely ended.

After a year or two that pattern turns into familiar symptoms: inactive Teams that still appear current, SharePoint sites with unclear purpose, guests from old partners, and data that lives in the right Microsoft 365 service but under the wrong level of control.

Ownership is the first control point

If nobody owns a workspace, nobody owns the risk. That is why ownership should be the first governance control you put in place. Not as a theoretical role in a slide deck, but as an operating mechanism.

In practice every Microsoft 365 workspace should have at least two named owners:

  • A business owner who is accountable for purpose, membership and external access.
  • A backup owner who prevents the Team or site from becoming orphaned when roles change, people are absent or staff leave.

This is also where many organisations discover they have allowed far too much uncontrolled self-service creation. Microsoft’s guidance on managing Microsoft 365 group creation is useful here, but the key point is balance. The goal is not to shut creation down completely. The goal is to make creation accountable. Locking it down too hard slows work and pushes collaboration into less governed channels. Leaving it completely open creates sprawl.

A practical middle ground usually includes:

  • Naming conventions that show department, project or purpose.
  • A requirement for at least two owners at creation time.
  • A short mandatory description of business purpose.
  • A default choice between private and public workspaces based on policy, not habit.
  • A recurring check that the listed owners are still the right people.

For sensitive workspaces it often makes sense to add periodic access recertification as well. Microsoft’s guidance on organisation and lifecycle governance is useful because it frames ownership as an ongoing process, not a provisioning checkbox. A Team should never be easier to create than it is to retire responsibly.

Sharing and guest access: enable collaboration with boundaries

The next place governance usually fails is sharing. Many organisations have technically enabled external sharing, but they have never decided which collaboration scenarios should use which mechanism. As a result, guests, sharing links, Teams channels and SharePoint folders get mixed together without a common model.

Start by separating three different needs:

  • Ongoing collaboration with external people often fits guest access in a Team.
  • Cross-organisation collaboration around a specific topic may fit shared channels in Teams better than classic guest membership.
  • Ad hoc document sharing should usually be handled as controlled SharePoint or OneDrive sharing rather than full membership in a workspace.

Microsoft documents sharing as a connected governance area across services, including SharePoint external sharing and the way settings interact across Microsoft 365 Groups, Teams and SharePoint.

The most important governance decision here is not simply whether external sharing is allowed. It is what the default should be. In many organisations a sensible baseline looks like this:

  • Sharing links default to specific people rather than broad anonymous options.
  • Guest access requires a named internal sponsor.
  • Trusted and blocked domains are managed deliberately.
  • Sensitive workspaces cannot have guests without additional approval.
  • Guest memberships are reviewed on a fixed cadence.

That last point matters most. Guest access is rarely the real problem. The problem is access that becomes permanent because nobody revisits it. Governance is therefore less about saying no to sharing and more about making sure every access path has a purpose, an owner and an end point.

Lifecycle: create, use, archive, delete

Most Microsoft 365 environments contain far more inactive workspaces than active ones. Not because anyone necessarily made a bad decision, but because projects end, teams reorganise and collaboration patterns change. Without a lifecycle model every workspace is effectively treated as permanent.

Microsoft is explicit about the difference between creation, expiration, archiving and deletion in its Teams and group governance guidance. That distinction matters. A Team that is no longer actively used does not always need immediate deletion. Sometimes it should become read-only and remain available for reference. In other cases it should expire and be removed because there is no longer a legitimate business need.

The practical work usually starts with four decisions:

  • Which workspace types are allowed through self-service.
  • Whether certain Team or site types should have an expected lifespan at creation.
  • When inactivity should lead to archive instead of quiet neglect.
  • What should happen at project closure, supplier offboarding or employee departure.

This is also where a classic governance mistake appears: archiving is treated as if it were the same thing as retention. It is not. Microsoft notes that archived Teams can still be subject to expiration policies, which is why lifecycle rules need to be designed together with compliance requirements rather than bolted on afterwards.

Retention and classification: control the content, not only the container

Many governance programmes focus heavily on Teams, sites and membership, but barely address the information itself. That is a mistake. The real risk often sits in the content: what it contains, how it is labelled, how broadly it can be shared and how long it needs to be kept.

Microsoft Purview is central here. Sensitivity labels for Teams, Microsoft 365 groups and SharePoint sites can control privacy, guest access and sharing behaviour at workspace level, while retention policies determine how long content should be retained or deleted. Those are different controls solving different problems.

A strong starting model is usually simple:

  • Public or low sensitivity for broadly shareable internal information.
  • Internal as the default for most collaboration.
  • Confidential with tighter sharing and clearer owner accountability.
  • Highly sensitive where guests, broad membership or permissive links require explicit review.

The important thing is not the number of labels. It is whether they change real behaviour. If a label does not affect sharing, access or retention in any meaningful way, it is usually just metadata without much governance value.

Retention should also be driven by information type and business obligation rather than by technology. Contracts, HR data, project records and general collaboration notes rarely need the same retention treatment. Governance becomes practical when users see a small number of understandable rules and the platform enforces those rules consistently in the background.

A practical operating model

Governance often fails because it is described as a project but never as operations. Once the rollout finishes there is no rhythm for ownership checks, reporting or decisions. That is why the operating model needs to be simple enough to run without constant escalation.

For many mid-sized organisations an effective model looks like this:

  • A platform owner in IT is responsible for standards, policy configuration and reporting.
  • Business service owners represent areas such as HR, sales, leadership or project delivery and decide when exceptions are justified.
  • Workspace owners remain accountable for members, guests and relevance within each Team or site.
  • Security or compliance is involved where sensitive data, retention or policy exceptions are concerned.

The cadence does not need to be heavy:

  • Monthly: report on orphaned workspaces, stale guests and newly created Teams.
  • Quarterly: review of sharing posture, inactive workspaces and high-risk exceptions.
  • Twice yearly: review of naming, labels, retention and whether the governance model still matches how the business works.

If governance requires a long approval chain for every routine action, users will work around it. If it is built on good defaults, a small number of exceptions and clear ownership, it feels like support rather than friction.

Five common mistakes

Mistake 1: Locking everything down immediately. Organisations react to sprawl by shutting off creation, guests and sharing too broadly. That may reduce symptoms for a while, but it often pushes collaboration outside the governed platform.

Mistake 2: Using one rule set for every scenario. Project collaboration with suppliers, occasional document sharing and long-term internal knowledge management do not carry the same risk and should not be governed identically.

Mistake 3: Naming owners without enabling them. Many designs assign ownership on paper, but the owners never receive guidance, review prompts or clear expectations.

Mistake 4: Using archive as a storage bin. Inactive Teams get archived with no plan for review, deletion or retention alignment. The environment keeps growing, just more quietly.

Mistake 5: Measuring nothing. If you cannot see orphaned workspaces, guests without sponsors, inactive Teams or sites with over-permissive sharing, you are mostly governing by instinct.

A phased plan that works

The best governance model is rarely the most advanced one. It is the one the organisation can actually implement without slowing collaboration to a crawl.

Phase 1: Build a baseline and remove the biggest risks

Start with a short baseline exercise:

  • Count Teams and sites with no owner or only one owner.
  • Identify guests that have not been reviewed recently.
  • Confirm which sharing defaults are in place.
  • Identify workspace types that are being created fastest and with the least business context.

At the same time close the most obvious risks, such as over-broad default sharing links or sensitive workspaces without named owners.

Phase 2: Put ownership and sharing under control

Introduce minimum standards for creation, ownership and external sharing. This is where naming, multi-owner requirements, sponsor responsibility for guests and default sharing links are set. For many organisations this step creates a lot more control with relatively little user friction.

Phase 3: Add lifecycle and information controls

Once the core controls are working, bring in expiration, archiving, labels and retention in a coordinated way. The key is to avoid a situation where a project workspace expires incorrectly while the content inside it still needs to be retained for legal or operational reasons.

Phase 4: Make governance operational

Finally, move governance from project mode into routine operations. Reporting, review cadence, exception handling and owner communication need to become part of the normal service, not something that only resurfaces after an audit or security concern.

What this means for your business

Microsoft 365 governance is not about making collaboration slower. It is about making collaboration predictable. Users should be able to work quickly, while the platform still makes it clear who owns what, who can share with whom, when a workspace is finished and how the underlying information should be handled.

If you get ownership, sharing, lifecycle and information control in place in that order, you usually gain much better control without making the user experience more bureaucratic. That is where governance starts to work in practice.


Talk to us about Microsoft 365 governance - we help establish a model that creates control without slowing collaboration down.

Talk to us

Related service

Need help with this?

If this topic is relevant in your Microsoft environment, we are happy to have a concrete conversation about sensible next steps.

Microsoft 365