🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901 aws-saa-c03 aws-aif-c01
Guided MS-700 Domain 2
Domain 2 — Module 4 of 5 80%
17 of 27 overall

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting

MS-700 Study Guide

Domain 1: Configure and manage a Teams environment

  • Network Planning & Readiness
  • Security Roles, Alerts & Defender
  • Retention & Sensitivity Labels
  • DLP & Conditional Access
  • Information Barriers & Insider Risk
  • Update Policies & Policy Packages
  • Group Creation, Naming & Expiration
  • Archive, Restore & Access Reviews
  • Guest Access & External Sharing
  • Shared Channels & Cross-Tenant Access
  • Teams Phone & Resource Accounts
  • Teams Rooms & Device Management
  • PowerShell & Graph Automation

Domain 2: Manage teams, channels, chats, and apps

  • Teams Rollout & Creation Free
  • Membership, Roles & Team Settings Free
  • Channel Types & Policies Free
  • App Management & Permissions Free
  • App Extensibility & Store Free

Domain 3: Manage meetings and calling

  • Meeting Types & Settings
  • Webinars & Town Halls
  • Phone Numbers & Conferencing
  • Voice Policies & Voicemail
  • Auto Attendants & Call Routing

Domain 4: Monitor, report on, and troubleshoot Teams

  • Voice & Meeting Quality
  • Usage, Alerts & Diagnostics Tools
  • Client Logs & Diagnostics
  • Copilot & Meeting Troubleshooting
Domain 2: Manage teams, channels, chats, and apps Free ⏱ ~12 min read

App Management & Permissions

Teams is a platform, not just a chat app. Learn how to manage org-wide app settings, create setup policies, control permissions and consent, and decide which apps users can install.

Apps in Teams

☕ Simple explanation

Teams is like a smartphone — the real power comes from the apps.

Microsoft provides built-in apps (Planner, Forms, OneNote). Third-party developers make thousands more (Trello, Jira, Salesforce). And your own organisation can build custom apps.

As an admin, you’re the app store manager. You decide: which apps are allowed? Which are blocked? Which appear on every user’s app bar by default? You have three layers of control: org-wide settings (master switches), permission policies (which apps are allowed for which users), and setup policies (which apps are pinned to the app bar).

Teams app management operates at three levels in the Teams admin center: Org-wide app settings control global toggles (third-party apps, custom apps). App permission policies define which apps specific users can install (allow all, block all, or allow/block specific apps). App setup policies control which apps are pinned to users’ app bar and whether users can pin their own apps. These three layers combine with Entra ID consent settings to provide comprehensive app governance.

Three layers of app control

Layer 1: Org-wide app settings

Teams admin center → Teams apps → Manage apps → Org-wide app settings

SettingWhat It ControlsDefault
Third-party appsAllow third-party apps from the Teams storeOn
Custom appsAllow users to upload custom appsOn
Allow interaction with custom appsWhether custom apps can interact with usersOn

These are master switches. If you turn off third-party apps here, NO permission policy can re-enable them. Org-wide settings override everything.

Layer 2: App permission policies

Teams admin center → Teams apps → Permission policies

Permission policies define which apps users can install:

ConfigurationBehaviour
Allow all appsUsers can install any Microsoft, third-party, and custom app
Block all appsUsers can’t install any apps (except those you specifically allow)
Allow specific appsOnly listed apps are available
Block specific appsAll apps except listed ones are available

You can create different permission policies for different user groups:

Scenario: Kofi's app permissions at Harbour University

Harbour University needs different app permissions for different groups:

“Student Apps” policy:

  • Microsoft apps: Allow all
  • Third-party apps: Allow specific only (Zoom, Canvas, Quizlet — pre-approved for education)
  • Custom apps: Block all (students can’t upload custom apps)

“Faculty Apps” policy:

  • Microsoft apps: Allow all
  • Third-party apps: Allow all (faculty trusted to choose appropriate tools)
  • Custom apps: Allow all (faculty can deploy research tools)

“IT Staff Apps” policy:

  • All apps: Allow all (IT needs full access for testing and support)

Kofi assigns each policy to the respective security group. Students see a curated app store; faculty see everything.

Layer 3: App setup policies

Teams admin center → Teams apps → Setup policies

Setup policies control the app bar — the sidebar/bottom bar that users see in Teams:

SettingWhat It Controls
Pinned appsWhich apps appear on every user’s app bar by default
App bar orderThe order of pinned apps
Allow user pinningWhether users can pin/unpin their own apps
Upload custom appsWhether users can sideload custom apps
Scenario: Kofi pins apps for frontline security staff

Campus security staff need immediate access to Shifts, Walkie Talkie, and Tasks. Kofi creates an app setup policy:

“Campus Security Setup” policy:

  • Pinned apps (in order): Activity, Chat, Shifts, Tasks, Walkie Talkie, Calls
  • Allow user pinning: No (simplified experience — security staff shouldn’t rearrange)
  • Upload custom apps: No

When security staff open Teams on their mobile, they see exactly these six apps — no clutter, no confusion.

App consent and permissions

When an app requests permissions (e.g., “read user profiles,” “access calendar”), it needs consent — approval to access data.

Consent types

Consent TypeWho ApprovesScope
User consentIndividual userThe app accesses only that user’s data
Admin consentEntra admin role (Cloud Application Admin, Application Admin, or Privileged Role Admin)The app accesses data for all users in the org
Resource-specific consent (RSC)Team ownerThe app accesses data within that specific team only

Controlling consent

In Entra ID → Enterprise applications → Consent and permissions:

SettingOptions
User consentAllow all / Allow for verified publishers only / Do not allow
Group owner consentAllow group owners to consent for their groups
Admin consent workflowUsers can request admin consent; admins approve/deny

Best practice for regulated organisations: Disable user consent. Enable admin consent workflow. This ensures every app is reviewed by IT before accessing data.

Blocking specific apps

To block an app in the Teams admin center:

  1. Teams apps → Manage apps → Find the app
  2. Toggle the app status to Blocked
  3. The app is immediately unavailable to all users

Alternatively, use permission policies to block apps for specific user groups only.

🎬 Video walkthrough

🎬 Video coming soon

App Management & Permissions — MS-700 Module 17

App Management & Permissions — MS-700 Module 17

~10 min

Flashcards

Question

What are the three layers of app control in Teams?

Click or press Enter to reveal answer

Answer

1. Org-wide app settings (master switches for third-party and custom apps), 2. App permission policies (which apps specific users can install), 3. App setup policies (which apps are pinned to the app bar). Org-wide settings override permission policies.

Click to flip back

Question

What's the difference between app permission policies and app setup policies?

Click or press Enter to reveal answer

Answer

Permission policies control which apps users CAN install (allow/block). Setup policies control which apps are PINNED to the app bar by default and whether users can rearrange them.

Click to flip back

Question

What is resource-specific consent (RSC)?

Click or press Enter to reveal answer

Answer

RSC allows a team owner to grant an app access to data within their specific team only — without needing tenant-wide admin consent. It's scoped to one team, not the whole organisation.

Click to flip back

Knowledge Check

Knowledge Check

Harbour University's org-wide app settings have 'Third-party apps' turned OFF. Kofi creates an app permission policy that allows Zoom for faculty. Can faculty install Zoom?

Knowledge Check

Nadia wants to ensure every new Teams app at Sterling Financial is reviewed by IT before it can access company data. What should she configure?


Next up: App Extensibility & Store — understanding app types (tabs, bots, messaging extensions, workflows), managing the Teams store, and uploading custom apps.

← Previous

Channel Types & Policies

Next →

App Extensibility & Store

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.