Microsoft Teams is the most-used application in most Indian enterprise Microsoft 365 deployments. It is also the most ungoverned. Email had decades of IT control built into it. Teams arrived and handed employees the ability to create groups, invite external guests, share files, record meetings, and generate AI summaries — all with minimal admin oversight by default.
The result, two to four years after most Indian enterprises deployed Teams, is predictable: hundreds of teams with no owners and no members, guest access granted to vendors who left the business two years ago, meeting recordings stored indefinitely with no policy, channels containing sensitive data shared more broadly than intended, and Copilot for Teams processing meeting content before anyone has considered what that means for DPDP Act compliance.
This guide is a step-by-step walkthrough of Teams governance for Indian IT admins — covering every layer from team and channel structure through meeting policies, guest access, data lifecycle, and Copilot governance. Each step includes the specific admin path, the decision logic, and the India-specific context that makes this environment different from a generic enterprise deployment.
Prerequisites: Teams Administrator or Global Administrator role in the Microsoft 365 Admin Centre. Most configurations are in the Teams Admin Centre (admin.teams.microsoft.com). Some governance settings require Microsoft Purview (compliance.microsoft.com).
Step 1: Control Who Can Create Teams
By default, any Microsoft 365 user can create a Team. This is the root cause of most Teams governance problems — uncontrolled proliferation of teams, each with its own SharePoint site, mailbox, and permission set, created without naming conventions, ownership plans, or lifecycle policies.
Restricting team creation does not mean locking down collaboration. It means channelling team creation through a lightweight approval process that ensures every team has a purpose, an owner, and a name that follows your convention.
How to Restrict Team Creation
Team creation in Microsoft 365 is controlled by a Microsoft Entra ID group setting — only members of a designated security group can create Microsoft 365 Groups, which underlies Teams creation.
- In Microsoft Entra Admin Centre, navigate to Groups → Settings → General. Enable ‘Restrict users from creating Microsoft 365 Groups in Azure portals, API, and PowerShell’.
- Create a security group called something like ‘Teams-Creators’ or ‘M365-Group-Creators’. Add department heads, IT admins, and designated team owners to this group.
- Run the PowerShell command to enforce the restriction to only this group: Set-AzureADDirectorySetting using the GroupCreation template, setting EnableGroupCreation to false and GroupCreationAllowedGroupId to your Teams-Creators group ID.
- Publish a simple request process for employees who need a new team — a Microsoft Form or helpdesk ticket that captures team name, purpose, primary owner, and expected membership. IT or a designated approver provisions the team within 24 hours.
⚠ Watch out: Restricting group creation also restricts creation of Planner plans, SharePoint sites, and other Microsoft 365 Group-backed resources. Test in a pilot group before enforcing broadly, and communicate the change to department heads before it takes effect.
Team Naming Policy
A naming policy enforces a prefix or suffix on every team name, ensuring teams are identifiable by department, location, or purpose from the name alone.
Admin path: Entra Admin Centre → Groups → Naming policy → Group naming policy.
- Configure a prefix that reflects your organisation’s structure. Examples: [Dept]-TeamName (Finance-BudgetPlanning), [Location]-TeamName (Mumbai-SalesTeam), or [Project]-TeamName (PROJ-ClientAcme2026).
- Add blocked words relevant to your context — prevent teams named after competitors, sensitive project codenames, or regulatory terms that could create confusion in eDiscovery.
- The naming policy applies to all group-backed Teams created via any interface — Teams app, SharePoint, Entra ID — enforcing consistency without requiring admin intervention for each team.
India Context: Indian enterprises with multiple business units, subsidiaries, or geographic offices benefit most from location or department prefixes. A team called ‘Sales’ is meaningless in a 2,000-person multi-city organisation. ‘Bangalore-Sales-Enterprise’ is immediately searchable and self-describing. The naming policy is the lowest-effort, highest-impact governance control for organisations that already have Teams sprawl.
Step 2: Design a Channel Structure That Scales
Channels are where work actually happens in Teams. Most Indian enterprises deploy Teams with no channel design guidance — the result is either everything in General (a single channel that becomes impossible to navigate) or unbounded channel proliferation (fifty channels per team that nobody can find anything in).
A deliberate channel structure makes Teams genuinely useful and reduces the pressure to create new teams for every sub-topic.
Standard vs. Private vs. Shared Channels
- Standard channels are visible to all team members. Use these for the majority of team communication — project updates, announcements, general discussion.
- Private channels are visible only to invited members within the team. Use for sub-groups that need a private space without creating a separate team — for example, a management-only channel within a department team, or a sensitive project sub-group.
- Shared channels can include members from outside the team (including guests and external organisations with B2B collaboration enabled). Use for long-term vendor or partner collaboration where a guest account in the full team is inappropriate.
Recommended Channel Structure for Indian Enterprises
For a department team (e.g., Finance), a practical channel structure:
- General — announcements and team-wide updates (default, cannot be deleted)
- Operations — day-to-day finance operations, queries, approvals
- Month-End Close — recurring close cycle coordination
- Compliance & Audit — regulatory filings, audit prep (consider Private channel if only senior finance should see this)
- Team Notices — HR communications, leaves, team admin
For a project team:
- General — project updates and announcements
- Planning — requirements, scope, timeline discussions
- Development / Delivery — execution-phase communication
- Client-Facing (Shared Channel) — external collaboration with the client, if applicable
- Internal-Only (Private Channel) — internal team discussions not for the client
💡 Tip: Limit standard channels to 10–15 per team. Beyond this, channel lists become unwieldy on mobile. If a topic genuinely requires a permanent home beyond 15 channels, that is usually a signal to create a new team rather than add another channel.
Governing Channel Creation
Admin path: Teams Admin Centre → Teams policies → Create or edit policy → Allow members to create and update channels.
- For most enterprises, restrict private channel creation to team owners only — members can create standard channels but not private ones. Private channels create separate SharePoint libraries and memberships that are harder to govern.
- Disable shared channel creation for users by default; enable it only for teams where external collaboration is an explicit business requirement.
- Educate team owners on channel hygiene: archive channels that are no longer active (they become hidden but searchable), rather than deleting them.
Step 3: Configure Guest Access Without Creating a Security Liability
Guest access in Teams allows people outside your organisation — vendors, clients, consultants, partners — to participate in teams and channels as named members. It is one of the most useful features in Teams for Indian enterprises that collaborate extensively with external parties. It is also one of the most common sources of persistent, unreviewed external access in any M365 tenant.
The goal is not to disable guest access — it is to ensure every guest account in your tenant has a legitimate, current reason to be there, and that guests can only do what they need to do.
Guest Access Policy Settings
Admin path: Teams Admin Centre → Users → Guest access.
- Enable guest access at the tenant level — but configure what guests can and cannot do. By default, guests can call, meet, use IP video, and share screens. Review each permission and disable those not needed for your external collaboration patterns.
- Disable ‘Allow guests to send private messages’ if guest-to-guest private messaging creates an unmonitored communication channel outside your corporate environment.
- Set ‘Allow guests to be added to a team’ to require team owner approval rather than any member invitation — this is a critical control. Members inviting guests without owner awareness is how guest sprawl begins.
Controlling the Guest Invitation Flow
Admin path: Entra Admin Centre → External Identities → External collaboration settings.
- Set ‘Guest invite settings’ to ‘Only users assigned to specific admin roles can invite guest users’ — this prevents any employee from inviting external users into your tenant without IT oversight.
- Alternatively, allow team owners to invite guests but require that all guest invitations are routed through a defined approval process (a Power Automate flow or helpdesk ticket) that records the business justification and expected duration.
- Enable ‘Email one-time passcode for guests’ as a fallback for external users who do not have Microsoft accounts — this ensures guests can authenticate without requiring them to create personal Microsoft accounts.
Guest Access Reviews — The Most Neglected Control
Guest accounts that are not reviewed periodically accumulate in every tenant. A vendor’s employee who left the project in 2023 may still have guest access to your Teams environment in 2026 — because nobody triggered a removal.
Admin path: Entra Admin Centre → Identity Governance → Access reviews → New access review → Guest users.
- Create a quarterly access review specifically for all guest users in Teams. For each guest, their sponsor (the team owner who invited them) must confirm whether they still need access. Guests whose access is not confirmed are automatically removed.
- For larger tenants, create per-team access reviews rather than a single tenant-wide review — this distributes the review burden to team owners who know whether their specific guests are still active.
- Set access review recurrence to quarterly — a guest account that was legitimate 6 months ago may not be today, particularly for project-based vendors.
🇮🇳 India Context: Indian enterprises work with a high volume of external contractors, outsourced teams, and project-specific vendors. This creates a guest access volume problem that is significantly higher than in Western enterprises of equivalent size. A 500-person Indian enterprise with active vendor relationships can accumulate 200–300 guest accounts within two years without systematic review. Quarterly access reviews are not optional in this context — they are the only mechanism that reliably removes access that is no longer needed.
Step 4: Configure Meeting Policies for Compliance and Control
Teams meetings generate significant data: recordings, transcripts, chat logs, and — if Copilot is enabled — AI-generated summaries and action items. Each of these has data governance implications, and each is controlled by meeting policies configured in the Teams Admin Centre.
Recording Policy
Admin path: Teams Admin Centre → Meetings → Meeting policies → [Policy name] → Recording & transcription.
- ‘Allow cloud recording’: enable for standard users but consider disabling for guest attendees — guests recording your internal meetings is a data leakage risk.
- ‘Allow transcription’: enables real-time and post-meeting transcription. Useful for accessibility and documentation. Requires careful governance if meetings contain personal data — transcripts are stored in OneDrive/SharePoint and subject to your retention policies.
- ‘Recording expiry’: set a default expiry for meeting recordings — 60 or 90 days is appropriate for most organisations. Recordings that need to be retained longer can be saved manually. This prevents indefinite accumulation of recordings in OneDrive.
- ‘Who can record’: restrict to ‘Organiser and co-organisers only’ rather than ‘Organiser, co-organisers and presenters’ — this reduces the number of people who can initiate recording without the organiser’s explicit intent.
Meeting Lobby and External Access
- ‘Who can bypass the lobby’: set to ‘People in my organisation and guests’ for standard meetings. External users (non-guests, anonymous join) should always go through the lobby and be admitted individually.
- ‘Allow anonymous users to join meetings’: disable this for meetings involving sensitive content. Anonymous join (no authentication required) is appropriate for public webinars but not for internal or client-facing business meetings.
- ‘Allow external participants to give or request control’: disable by default. This setting allows external participants to take control of a presenter’s screen — a genuine security risk in meetings with untrusted external attendees.
Meeting Policy Segmentation
Not all users need the same meeting policy. Create tiered policies for different user groups:
- Standard policy: all employees — recording enabled with 60-day expiry, lobby for externals, no anonymous join.
- Executive policy: senior leadership — more restrictive recording and transcript settings, lobby for all external participants including guests.
- Webinar/Events policy: marketing and communications teams — anonymous join enabled, recording enabled with no expiry for formal company events and webinars.
- Guest policy: applied to guest accounts — recording disabled, transcript disabled, cannot bypass lobby.
Admin path: Teams Admin Centre → Meetings → Meeting policies → Add. Create each policy and assign via Teams Admin Centre → Users → [User] → Policies → Meeting policy.
India Context: Indian enterprises with BFSI, healthcare, or legal sector clients frequently conduct sensitive discussions in Teams meetings. Meeting recordings of a bank’s internal credit committee or a hospital’s patient case review contain highly sensitive personal data. Applying the Executive policy (restricted recording, no anonymous join, full lobby) to these teams ensures that sensitive meeting data is protected by default, not by user discipline.
Step 5: Implement a Teams Data Lifecycle Policy
Every team in Microsoft 365 has an underlying SharePoint site, a mailbox, and a set of files. When a team is created and never closed — even after the project ends or the team is dissolved — that data persists indefinitely. Multiply this across hundreds of teams and you have a data retention problem, a storage cost problem, and a DPDP Act compliance problem.
Team Expiry Policy
Admin path: Entra Admin Centre → Groups → Expiration.
- Enable group expiration for Microsoft 365 Groups (which backs Teams). Set a default lifetime — 180 days or 365 days is appropriate for most enterprises.
- Configure the expiry notification: the team owner receives an email 30 days, 15 days, and 1 day before expiry, with a single-click renewal option. If the owner does not renew, the team is soft-deleted and available for 30 days before permanent deletion.
- Exclude specific groups from expiry: permanent operational teams (the All-Company team, the IT team, the HR team) should be excluded from expiry policies using the ‘Groups excluded from expiration’ setting.
⚠ Watch out: Team expiry deletes the entire team including its SharePoint site and all files. Before enabling expiry, ensure your backup solution (Veeam for M365, Acronis, or equivalent) covers Teams and SharePoint so deleted teams can be recovered within the 30-day soft-delete window if an owner fails to renew by mistake.
Microsoft Purview Retention for Teams
Admin path: Microsoft Purview Compliance Portal → Data lifecycle management → Microsoft 365 → Retention policies → New retention policy → select Teams locations.
- Create a Teams retention policy that covers Teams channel messages and Teams chats separately — these are stored in different locations (channel messages in the SharePoint site mailbox; chats in individual Exchange mailboxes).
- Set retention period based on your regulatory obligations: 3 years for standard business communications, 7 years for financial services, and align with RBI or SEBI requirements if applicable.
- Configure a deletion action at the end of the retention period — under the DPDP Act, data that is no longer needed for its original purpose must be deleted. A retention policy that retains indefinitely is not DPDP-compliant for personal data.
Archiving Inactive Teams
Teams that are no longer active but should not be deleted (historical project records, completed client engagements) should be archived rather than left open. An archived team is read-only — members can view content but cannot add messages or files.
- Archive teams manually: Teams app → Manage team → Archive team. Or use the Teams Admin Centre → Teams → Manage teams → select team → Archive.
- Build archiving into your project closure process: when a project is formally closed in your project management system, a Teams archiving request is triggered as part of the closure checklist.
- Archived teams count against your SharePoint storage quota but do not generate Teams activity — they are searchable and accessible for reference without creating ongoing governance overhead.
Step 6: Govern Copilot for Teams Before Enabling It
Copilot for Teams — available as part of Microsoft 365 Copilot at approximately ₹2,500–3,000/user/month — provides AI-generated meeting summaries, action items, real-time meeting assistance, and chat thread summarisation. For Indian enterprises that have purchased Copilot licences, enabling it across Teams without a governance framework is a data governance risk and a DPDP Act compliance gap.
What Copilot for Teams Accesses
- Copilot in meetings: accesses real-time meeting audio and transcript to answer questions mid-meeting, generate summaries, and extract action items. All attendees in a Copilot-enabled meeting are informed that Copilot is active.
- Copilot in Teams chat: accesses the full chat history in a conversation to summarise threads and answer questions about past messages.
- Copilot in Teams channels: accesses all messages in a channel to provide summaries and contextual answers. This means Copilot can surface content from channels that the user has access to — including channels they rarely read.
Governance Controls Before Enabling
- Audit Teams permissions before enabling Copilot: if users have inadvertent access to channels or teams containing sensitive data, Copilot will surface that content. Fix overpermissioned team memberships before enabling the AI layer.
- Define which meeting types are appropriate for Copilot: internal team meetings (low risk), client-facing meetings (medium risk — ensure clients are informed), and sensitive meetings (HR investigations, legal discussions, executive strategy — disable Copilot).
- Update your privacy notice before enabling Copilot for Teams: the AI processing of meeting content and chat history constitutes personal data processing under the DPDP Act. Your privacy notice must disclose this processing.
- Accept Microsoft’s Data Processing Amendment if not already done — this governs Microsoft’s role as Data Processor for Copilot-generated content.
Enabling Copilot by Policy Group
Admin path: Teams Admin Centre → Meetings → Meeting policies → [Policy name] → Copilot → Copilot in meetings.
- Set Copilot meeting access to ‘Off’ in your standard meeting policy. Create a separate ‘Copilot-Enabled’ meeting policy and assign it only to users and teams where Copilot has been explicitly approved.
- For Teams chat Copilot: Teams Admin Centre → Messaging policies → [Policy name] → Copilot in chats → set to Off for the default policy, On for the Copilot-approved policy.
- Train employees who have Copilot access on appropriate use — specifically, not prompting Copilot to summarise meetings containing customer personal data, patient information, or legally privileged content, and the responsibility to inform external participants when Copilot is active in a meeting.
India Context: Indian enterprises with BFSI or healthcare clients face a specific challenge: external participants in Teams meetings may be from regulated organisations that have their own data governance policies prohibiting AI processing of meeting content. Before enabling Copilot in client-facing meetings, verify whether your clients’ organisations permit AI summarisation of meetings. A default policy of Copilot Off for external-participant meetings avoids this exposure until explicit consent is obtained.
Step 7: Prepare for the July 2026 Pricing Changes
Microsoft has confirmed global Microsoft 365 price increases effective July 1, 2026. For Indian enterprises, this creates both a cost planning obligation and an optimisation opportunity — the changes bundle capabilities that were previously add-ons into core plans, potentially changing the right-sizing calculation for your tenant.
What Is Changing
- E3 now includes Defender for Office 365 Plan 1 (previously a separate add-on at approximately ₹400/user/month). If you are on E3 with Defender for Office 365 P1 as an add-on, you can remove that add-on at renewal — saving the add-on cost even as the base E3 price increases.
- E3 price increases to approximately ₹3,900/user/month (from approximately ₹3,500). At 500 users, this is an additional ₹20 lakhs annually — significant, but partially or fully offset by removing the Defender add-on if you had it.
- Business Premium is unchanged at approximately ₹2,200/user/month, making it more competitive versus E3 for organisations under 300 users with standard needs.
- E5 increases proportionally. The new M365 E7 tier (launching May 2026 at approximately ₹8,250/user/month) bundles the full Entra Suite, Copilot, E5 security, and E5 compliance — relevant for enterprises that would otherwise purchase E5 plus Copilot plus Entra ID P2 add-ons separately.
Four-Step Audit Before Renewal
- Step 1 — Inventory active vs inactive licences: Teams Admin Centre → Analytics & reports → Usage reports → Teams user activity. Identify users who have not used Teams in 30+ days. Inactive licences should be unassigned and the subscription count reduced at renewal.
- Step 2 — Identify add-ons now bundled in your plan tier: if you are on E3, check whether you have Defender for Office 365 P1 as an add-on. Remove it at renewal — it is now included in E3.
- Step 3 — Right-size user tiers: segment your users by actual needs. Frontline workers who only need Teams and email belong on F3 (approximately ₹1,000/user/month after July 2026), not E3. Knowledge workers who need full Office belong on E3. Security and compliance teams who need advanced capabilities belong on E5.
- Step 4 — Model the E7 scenario if you have Copilot aspirations: if you plan to deploy Copilot to a significant proportion of your workforce in 2026–2027, model whether E7 (all-in bundle) is cheaper than E5 + Copilot + Entra P2 + Compliance add-ons separately. For organisations deploying Copilot to 40%+ of users, E7 frequently wins on total cost.
India Context: Microsoft’s India pricing is denominated in INR for CSP and direct billing, but the USD-to-INR conversion used by Microsoft for price adjustments is not the spot rate — it is updated periodically and tends to lag the market rate. Indian enterprises should request INR pricing in writing from their Microsoft partner or CSP before finalising renewal budgets. A 3–5% exchange rate movement between the time a budget is approved and the time the renewal invoice arrives can create a material budget variance.
Teams Governance Checklist: Quick-Reference Summary
TEAM CREATION AND STRUCTURE
- Team creation restricted to a designated security group via Entra ID group settings
- Team naming policy configured with department or project prefix
- A documented team request and approval process exists and is communicated
- Team expiry policy enabled with appropriate lifetime and owner notification
- Permanent operational teams excluded from expiry policy
CHANNEL DESIGN
- Private channel creation restricted to team owners only
- Shared channel creation disabled by default; enabled only for specific external collaboration needs
- Channel structure guidance published to team owners (maximum 10–15 channels, archive not delete inactive channels)
GUEST ACCESS
- Guest invitation restricted to team owners or requires IT approval
- Guest action permissions reviewed and non-essential capabilities disabled
- Quarterly guest access reviews configured in Entra ID Governance
- Guest accounts from vendors whose engagements have ended are removed
MEETING POLICIES
- Recording expiry set (60–90 days for standard policy)
- Anonymous join disabled for standard meeting policy
- Tiered meeting policies created: Standard, Executive, Webinar, Guest
- ‘Who can record’ restricted to organiser and co-organisers
DATA LIFECYCLE AND COMPLIANCE
- Microsoft Purview retention policy covering Teams channel messages and chats
- Retention period aligned to regulatory obligations (RBI, SEBI, DPDP Act)
- Deletion action configured at end of retention period
- Third-party M365 backup solution covering Teams data
COPILOT FOR TEAMS
- Copilot disabled in default meeting and messaging policies
- Copilot-enabled policy created and assigned only to approved user groups
- Privacy notice updated to disclose AI processing of meeting and chat content
- Client-facing meeting Copilot policy defaults to Off pending client consent
- Microsoft Data Processing Amendment accepted
LICENSING
- July 2026 price increase impact modelled for your current licence mix
- Defender for Office 365 P1 add-on removal evaluated for E3 tenants
- Inactive user licences identified and earmarked for removal at renewal
- Frontline workers on E3 evaluated for F3 downgrade
- E7 scenario modelled if Copilot deployment is planned
Governance Is What Makes Teams Useful at Scale
An ungoverned Teams environment becomes less useful over time, not more. The more teams proliferate, the harder it is to find anything. The more guest accounts accumulate, the greater the external access risk. The more meetings are recorded without expiry policies, the larger the unreviewed data repository. Teams without governance degrades into a noisier, harder-to-search version of email.
The governance steps in this guide are not compliance overhead — they are what makes Teams genuinely productive for a 200 or 2,000-person Indian enterprise. Named ownership, clear channel structure, controlled guest access, and defined data lifecycle policies are the operational discipline that separates Teams environments that people use effectively from Teams environments that people route around.
The highest-return starting point is Step 1 — restricting team creation and enforcing a naming policy. These two changes, implemented in a single day, immediately begin reversing the sprawl that makes every other governance task harder. Each subsequent step builds on the foundation the first one creates.
The Copilot governance step (Step 6) and the licensing audit (Step 7) are the most time-sensitive items given the July 2026 pricing changes and the ongoing DPDP Act compliance window. If your organisation has Copilot licences deployed without a governance policy, or if your M365 renewal is coming up in the next 3–6 months, those are the steps to act on this week.

