Learn how to enforce MFA policies in Microsoft 365 that apply only to unmanaged devices - enhancing security, minimizing login disruptions, and protecting sensitive data in BYOD and hybrid work environments.
A session timeout policy in Microsoft 365 is a security feature that automatically signs users out of their web apps after a set period of inactivity.
This helps protect sensitive business data, especially when people access apps from shared computers or unmanaged personal devices.
For example, if someone forgets to sign out of Outlook Web App, SharePoint Online, or OneDrive for Business and walks away, Microsoft 365 will automatically log them out after a period of inactivity.
Session lifetimes are an important part of authentication for Microsoft 365 and are an important component in balancing security and the number of times users are prompted for their credentials.
This reduces the risk of:
It’s especially helpful for organizations with:
It prevents sensitive information from being left open just because someone forgot to sign out.
The session timeout policy only applies to web-based Microsoft 365 apps.
It doesn’t affect the desktop apps on your computer or mobile apps on your phone.
Some common web apps where this policy applies:
In simple terms:
If you’re inactive too long in your browser, Microsoft 365 signs you out automatically to keep your data safe.
It’s a small feature, but it plays an important role in keeping your organization’s data secure and compliant.
Setting up a session timeout policy in Microsoft 365 is a simple but effective way to strengthen your organization’s security. It helps reduce risks while keeping things easy for your users.
Here’s how it adds value:
In short, session timeout policies provide an extra layer of protection with minimal impact on daily work.
Microsoft 365 allows you to set session timeout policies in different ways depending on your needs. You can apply it broadly across all devices or limit it specifically to unmanaged devices like personal laptops or shared desktops.
These settings help protect access to apps like Outlook Web App, SharePoint Online, OneDrive for Business, Office.com, and Microsoft 365 Admin Center.
Who Can Configure These Settings?
To set up session timeout policies in Microsoft 365, you’ll need to have the appropriate admin permissions. Typically, these tasks require one of the following roles:
These roles ensure you have the necessary access to configure settings in Microsoft 365 Admin Center, Microsoft Entra (formerly Azure AD), and SharePoint Admin Center. If you don’t have one of these roles, you’ll need to work with someone in your organization who does.
If you want to apply session timeout across all devices where users access Microsoft 365 web apps, follow these steps through the Microsoft 365 Admin Center.
Steps:
By default, the idle session timeout feature triggers on all device types if the other conditions are met. For this feature to trigger only on an unmanaged device, an eligible Microsoft Entra ID P1 or P2 subscription is required. You also need to add a Conditional Access policy in the Microsoft Entra admin center.
Steps:
These policies give you more flexibility and apply only to users on unmanaged devices. This approach requires Entra ID Premium P1 or P2 licensing.
NOTE: To ensure that idle timeouts affect only unmanaged devices, both steps must be completed.
In addition to enforcing session timeouts, Conditional Access can also help prevent data leakage by restricting file downloads on unmanaged devices. This ensures users can view files in the browser but can’t download or sync them locally — a critical safeguard for protecting sensitive business data.
For organizations needing more granular control specifically over SharePoint Online session timeout, PowerShell provides an additional option.
Example PowerShell Command:
Connect-SPOService -Url https://Tenant-admin.sharepoint.com/
Set-SPOBrowserIdleSignOut -Enabled $true -WarnAfter (New-TimeSpan -Minutes 45) -SignOutAfter (New-TimeSpan -Minutes 60)
This signs users out of SharePoint Online after 60 minutes of inactivity, with a warning at 45 minutes.
These configurations help you manage session timeouts effectively across both all devices and unmanaged devices, keeping access to Microsoft 365 apps secure without disrupting productivity.
When a user is inactive in Microsoft 365 web apps for the time period you chose, they see the following prompt. They have to select Stay signed in or they're signed out.
Results!!!
Setting the right session timeout policy in Microsoft 365 is about finding the balance between security and user convenience. Here’s how you can get it right.
There’s no one-size-fits-all, but here are common recommendations based on industry best practices:
Always match your timeout policy to your organization’s risk level and compliance needs.
While tighter timeouts improve security, overly aggressive settings can frustrate users. Keep these considerations in mind:
Balancing both through Conditional Access and app-enforced controls is often the best approach.
Avoid these typical missteps when configuring Microsoft 365 session timeout settings:
A well-configured session timeout policy helps strengthen security without getting in the way of productivity. It's a small detail, but it plays a key role in protecting your Microsoft 365 environment from accidental data exposure.
If your Microsoft 365 session timeout policy isn’t working, these are the top causes and fixes.
Configuring session timeout policies in Microsoft 365 is a simple but impactful step to strengthen your organization’s security — especially in hybrid environments where users access apps from personal or shared devices.
Need help setting it up? We can:
If you’re unsure how to implement these policies or align them with your broader security goals, contact us — we’re here to help.
Q1. How do I enable and configure idle session sign-out in Microsoft 365?
You can configure this in the Microsoft 365 Admin Center under Settings > Org Settings > Security & Privacy > Idle Session Timeout. From there, you set how long users can remain inactive before being signed out automatically.
Q2. Which Microsoft 365 administrator roles can configure session timeout policies?
Typically, roles like Global Admin, Security Admin, Application Admin, or Cloud Application Admin have permissions to manage these settings.
Q3. What idle timeout durations can I set in Microsoft 365?
You can set a timeout duration anywhere between 5 minutes to 1440 minutes (24 hours), depending on your organization’s security needs.
Q4. Which Microsoft 365 web apps and devices does the idle session timeout apply to?
It only affects browser-based apps such as:
Desktop and mobile apps are not affected.
Q5. Why am I being signed out of Microsoft 365 apps unexpectedly or too often?
This could be due to:
Q6. How can I prevent being signed out of Microsoft 365 web apps while I’m actively using them?
Stay active within the session by interacting with the app. Microsoft 365 typically warns you before signing you out, giving you a chance to extend your session.
Q7. Will closing my browser or restarting my device sign me out of Microsoft 365?
It depends on your browser and your organization's policies. Some policies enforce sign-out when the browser is closed; others allow sessions to persist until the timeout period ends.
Q8. How does selecting “Stay signed in” affect my Microsoft 365 session duration?
Choosing “Stay signed in” helps maintain your session across browser restarts but doesn’t override idle timeout policies set by your organization.
Q9. Does the Microsoft 365 idle timeout apply to desktop or mobile apps, or only to web browsers?
These policies apply only to web browsers. Desktop and mobile apps like Outlook, Teams, or OneDrive are managed differently through token lifetimes, not browser session policies.
Q10. Why do organizations enforce automatic idle sign-out in Microsoft 365?
To protect sensitive information from being exposed on shared or unmanaged devices. It minimizes risk if a user forgets to sign out and leaves their device unattended.
Q11. On a public or shared computer, do I need to manually sign out, or will Microsoft 365 log me out?
Timeout policies help, but it’s still best practice to manually sign out on shared devices to ensure your account is secure.
Q12. What happens to unsaved work if my session times out due to inactivity?
You may lose unsaved changes. Always save your work regularly, especially in web apps where session timeouts could sign you out unexpectedly.
Learn how to enforce MFA policies in Microsoft 365 that apply only to unmanaged devices - enhancing security, minimizing login disruptions, and protecting sensitive data in BYOD and hybrid work environments.
This newsletter covers Microsoft’s July updates that make work easier and faster. Copilot got smarter with better chat history, writing help, and audio summaries. Teams added features like quick meeting joins, emoji-triggered actions, and color customization. Outlook now works better offline, and OneNote and OneDrive got small upgrades to help you stay organized.
Learn how to stop sensitive files from being downloaded on mobile devices using Microsoft 365 tools like Conditional Access, Sensitivity Labels, and Defender for Cloud Apps. Step-by-step guide with real-world scenarios, compliance tips, and admin checklists.