--- title: Manage who can create Microsoft 365 Groups f1.keywords: NOCSH ms.reviewer: rahulnayak ms.date: 11/22/2023 author: DaniEASmith ms.author: danismith manager: jtremper audience: Admin ms.topic: article ms.service: o365-solutions ms.localizationpriority: medium ms.custom: - has-azure-ad-ps-ref - azure-ad-ref-level-one-done ms.collection: - highpri - M365-subscription-management - Adm_O365 - m365solution-collabgovernance search.appverid: - MET150 ms.assetid: 4c46c8cb-17d0-44b5-9776-005fced8e618 recommendations: false description: Learn how to control which users can create Microsoft 365 Groups. --- # Manage who can create Microsoft 365 Groups By default, all users can create Microsoft 365 groups. This is the recommended approach because it allows users to start collaborating without requiring assistance from IT. If your business requires that you restrict who can create groups, you can restrict Microsoft 365 Groups creation to the members of a particular Microsoft 365 group or security group. If you're concerned about users creating teams or groups that don't comply with your business standards, consider requiring users to complete a training course and then adding them to the group of allowed users. When you limit who can create a group, it affects all services that rely on groups for access, including: - Outlook - SharePoint - Viva Engage - Microsoft Teams - Planner - Power BI (classic) - Project for the web / Roadmap The steps in this article won't prevent members of certain roles from creating Groups. Microsoft 365 global admins can create groups via the Microsoft 365 admin center, Planner, Exchange, and SharePoint, but not other locations such as Teams. Other roles can create Microsoft 365 Groups via limited means, listed below. - Exchange Administrator: Exchange admin center, Microsoft Entra ID - Partner Tier 1 Support: Microsoft 365 admin center, Exchange admin center, Microsoft Entra ID - Partner Tier 2 Support: Microsoft 365 admin center, Exchange admin center, Microsoft Entra ID - Directory Writers: Microsoft Entra ID - Groups Administrator: Microsoft Entra ID - SharePoint Administrator: SharePoint admin center, Microsoft Entra ID - Teams Service Administrator: Teams admin center, Microsoft Entra ID - User Administrator: Microsoft 365 admin center, Microsoft Entra ID If you're a member of one of these roles, you can create Microsoft 365 Groups for restricted users, and then assign the user as the owner of the group. ## Licensing requirements To manage who creates groups, the following people need Microsoft Entra ID P1 or P2 licenses or Microsoft Entra Basic EDU licenses assigned to them: - The admin who configures these group creation settings - The members of the group who are allowed to create groups > [!NOTE] > See [Assign or remove licenses in the Microsoft Entra admin center](/azure/active-directory/fundamentals/license-users-groups) for more details about how to assign Azure licenses. The following people don't need Microsoft Entra ID P1 or P2 or Microsoft Entra Basic EDU licenses assigned to them: - People who are members of Microsoft 365 groups and who don't have the ability to create other groups. ## Step 1: Create a group for users who need to create Microsoft 365 groups Only one group in your organization can be used to control who is able to create Microsoft 365 Groups. But, you can nest other groups as members of this group. Admins in the roles listed above don't need to be members of this group: they retain their ability to create groups. 1. In the admin center, go to the [Groups page](https://admin.microsoft.com/adminportal/home#/groups). 2. Click on **Add a Group**. 3. Choose the group type you want. Remember the name of the group! You'll need it later. 4. Finish setting up the group, adding people or other groups who you want to be able to create groups as members (not owners). For detailed instructions, see [Create, edit, or delete a security group in the Microsoft 365 admin center](../admin/email/create-edit-or-delete-a-security-group.md). ## Step 2: Run PowerShell commands You'll use the [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation) **Beta** module to change the group-level guest access setting: - If you have already installed the Beta version, run `Update-Module Microsoft.Graph.Beta` to make sure it's the latest version of this module. Copy the following script into a text editor, such as Notepad, or the [Windows PowerShell ISE](/powershell/scripting/components/ise/introducing-the-windows-powershell-ise). Replace *\* with the name of the group that you created. For example: `$GroupName = "Group Creators"` Save the file as GroupCreators.ps1. In the PowerShell window, navigate to the location where you saved the file (type "CD \"). Run the script by typing: `.\GroupCreators.ps1` and [sign in with your administrator account](../enterprise/connect-to-microsoft-365-powershell.md#step-2-connect-to-azure-ad-for-your-microsoft-365-subscription) when prompted. ```PowerShell Import-Module Microsoft.Graph.Beta.Identity.DirectoryManagement Import-Module Microsoft.Graph.Beta.Groups Connect-MgGraph -Scopes "Directory.ReadWrite.All", "Group.Read.All" $GroupName = "" $AllowGroupCreation = "False" $settingsObjectID = (Get-MgBetaDirectorySetting | Where-object -Property Displayname -Value "Group.Unified" -EQ).id if(!$settingsObjectID) { $params = @{ templateId = "62375ab9-6b52-47ed-826b-58e47e0e304b" values = @( @{ name = "EnableMSStandardBlockedWords" value = "true" } ) } New-MgBetaDirectorySetting -BodyParameter $params $settingsObjectID = (Get-MgBetaDirectorySetting | Where-object -Property Displayname -Value "Group.Unified" -EQ).Id } $groupId = (Get-MgBetaGroup | Where-object {$_.displayname -eq $GroupName}).Id $params = @{ templateId = "62375ab9-6b52-47ed-826b-58e47e0e304b" values = @( @{ name = "EnableGroupCreation" value = $AllowGroupCreation } @{ name = "GroupCreationAllowedGroupId" value = $groupId } ) } Update-MgBetaDirectorySetting -DirectorySettingId $settingsObjectID -BodyParameter $params (Get-MgBetaDirectorySetting -DirectorySettingId $settingsObjectID).Values ``` The last line of the script will display the updated settings: ![Screenshot of PowerShell script output.](../media/952cd982-5139-4080-9add-24bafca0830c.png) If in the future you want to change which group is used, you can rerun the script with the name of the new group. If you want to turn off the group creation restriction and again allow all users to create groups, set $GroupName to "" and $AllowGroupCreation to "$true" and rerun the script. ## Step 3: Verify that it works Changes can take 30 minutes or more to take effect. You can verify the new settings by doing the following: 1. Sign in to Microsoft 365 with a user account of someone who should NOT have the ability to create groups. That is, they aren't a member of the group you created or an administrator. 2. Select the **Planner** tile. 3. In Planner, select **New Plan** in the left navigation to create a plan. 4. You should get a message that plan and group creation is disabled. Try the same procedure again with a member of the group. > [!NOTE] > If members of the group aren't able to create groups, check that they aren't being blocked through their [OWA mailbox policy](/powershell/module/exchange/set-owamailboxpolicy). ## Related topics [Collaboration governance planning recommendations](collaboration-governance-overview.md#collaboration-governance-planning-recommendations) [Create your collaboration governance plan](collaboration-governance-first.md) [Getting started with Office 365 PowerShell](../enterprise/getting-started-with-microsoft-365-powershell.md) [Set up self-service group management in Microsoft Entra ID](/azure/active-directory/users-groups-roles/groups-self-service-management) [Set-ExecutionPolicy](/powershell/module/microsoft.powershell.security/set-executionpolicy) [Microsoft Entra cmdlets for configuring group settings](/azure/active-directory/users-groups-roles/groups-settings-cmdlets)