title | author | ms.author | manager | ms.reviewer | ms.date | ms.topic | ms.tgt.pltfrm | ms.service | search.appverid | ms.collection | audience | appliesto | ms.localizationpriority | f1.keywords | ms.custom | description | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Manage resource accounts for service numbers |
mkbond007 |
mabond |
pamgreen |
roykuntz, jastark |
05/21/2024 |
article |
cloud |
msteams |
MET150 |
|
Admin |
|
medium |
|
|
In this article, you'll learn how to create, edit, and manage resource accounts for service numbers in Microsoft Teams. |
[!INCLUDE set-up-resource-account-steps]
Once you complete the resource account setup and assign a phone number if needed, you're ready to use the resource account with an Auto attendant or Call queue.
To learn more, see the following references:
You can edit the resource account Display name and Resource account type using the Edit option. Select Save when you're done.
To switch the licenses on your existing resource account from a Teams Phone Standard license to a Microsoft Teams Phone Resource Account license, you'll need to acquire the Microsoft Teams Phone Resource Account license, and then follow the steps in the Microsoft 365 admin center to Move users to a different subscription.
Warning
Always remove a Teams Phone Standard license and assign the Microsoft Teams Phone Resource Account license in the same license activity. If you remove the old license, save the account changes, add the new license, and then save the account settings again, the resource account may no longer function as expected. If this happens, we recommend you create a new resource account for the Microsoft Teams Phone Resource Account license and remove the broken resource account.
For resource accounts homed on Skype For Business Server 2019 that can be used with cloud Call queues and cloud Auto attendants, see Plan Cloud Call queues or Plan Cloud Auto attendants. Hybrid implementations (numbers homed on Direct Routing) are configured using the New-CsHybridApplicationEndpoint cmdlet on an on-premises Skype for Business Server 2019 server.
The application IDs that you need to use while creating the application instances are:
- Auto Attendant: ce933385-9390-45d1-9512-c8d228074e07
- Call Queue: 11cd3e2e-fccb-42ad-ad00-878b93575e07
Note
If you want the Call queue or Auto attendant to be searchable by Skype For Business Server 2019 users, you should create your resource accounts on Skype For Business Server 2019, since online resource accounts are not synced down to Active Directory. When DNS SRV records for sipfederationtls
resolve to Skype for Business Server 2019, then resource accounts must be created on Skype For Business Server 2019 using SfB Management shell and synchronized to Microsoft Entra ID.
For hybrid implementations with Skype for Business Server:
Make sure you dissociate the telephone number from the resource account before deleting it, to avoid getting your phone number stuck in pending mode.
- Sign into the Teams admin center.
- Expand Voice, and then select Resource accounts page.
- Select the resource account to which you want to assign a phone number, and then select Assign/unassign.
- Select the X on the assigned Auto attendant or Call queue.
- Select the Save button.
After you do that, you can delete the resource account in the Microsoft 365 admin center, under the Users tab.
You may want to hide certain resources accounts from Teams users. For example, you may want to prevent Teams users from directly calling a Call queue and bypassing the Auto attendant where the hours of operation are configured.
Information barriers are used to hide the resource accounts. Review the information barriers documentation to understand the possible impacts before proceeding with the steps below.
To access and use information barriers, your organization must have one of the following subscriptions or add-ons:
- Microsoft 365 E5/A5 subscription (paid or trial version).
- Office 365 E5/A5/A3/A1 subscription (paid or trial version).
- Office 365 Advanced Compliance add-on.
- Microsoft 365 E3/A3/A1 subscription + the Microsoft 365 E5/A5 Compliance add-on.
- Microsoft 365 E3/A3/A1 subscription + the Microsoft 365 E5/A5 Insider Risk Management add-on.
Note
If you already have Exchange Online address book policies configured, they must be removed before proceeding with the steps below.
All the steps below are performed by the Tenant Global Administrator.
These instructions assume there are no other information barriers configured.
- Sign into the Teams admin center.
- In the left-rail menu, expand Teams.
- Select Teams settings.
- Scroll down to Search by name.
- Turn on the toggle, and save the change.
For more information on this option, see Limit who users can see when searching the directory in Teams.
-
Sign into the Microsoft Purview compliance portal.
-
In the left navigation pane, select Audit.
-
If auditing is turned off, the following banner is displayed:
:::image type="content" source="/microsoft-365/media/AuditingBanner.png" alt-text="Screenshot showing audit banner if auditing is not enabled."lightbox="/microsoft-365/media/AuditingBanner.png":::
-
Select the Start recording user and admin activity.
For more information on auditing, see Set up Audit (Standard) in Microsoft 365.
The Resource Accounts that shouldn't be called directly need to be segmented and easily identifiable. This can be done by making them members of a particular group or by some unique information in their user profile such as:
- Company
- User principal name
- Location
- Department
- Usage location
- Mail nickname (Alias)
- Physical delivery office name (Office)
- Postal code
- Proxy address (Email Address)
- Street address
- Target address (ExternalEmailAddress)
- Mail (WindowsEmailAddress)
- Description
In the example steps below, the Department
field is used.
For more information on segmenting users, see Identify segments.
- Sign into the Microsoft 365 Admin Center.
- In the left navigation pane, select Active Users.
- Select the first Resource Account to block direct calls to.
- Select Manage contact information in the right pane.
- Replace the contents of the
Department
field with a unique word or acronym that isn't used as a department name. For example,DNC
. - Save changes.
- Repeat for each Resource Account that needs to be blocked from receiving direct calls.
- Sign into the Microsoft Purview compliance portal.
- In the left navigation pane, select Information barriers > Segments.
- Select New segment.
- Enter a name for the segment, and select Next. For example,
Uncallable Resource Accounts
. - Select + Add, and then Department.
- Enter the unique word or acronym used in Microsoft admin center step 5 above. For example,
DNC
. - Select Next, and then Submit.
- Select New segment.
- Enter a name for the segment, and select Next. For example,
Callable Users
. - Select + Add, and then Department.
- Select the Equal drop-down, and select Not equal to.
- Enter the unique word or acronym used in Microsoft admin center step 5 above. For example,
DNC
. - Select Next, and then Submit.
- In the left navigation pane, select Information barriers > Policies.
- Select Create policy.
- Enter a name for the policy, and select Next. For example,
Uncallable Resource Accounts
. - Select + Choose segment, add the segment created in step 9 above, and select Next. For example,
Callable Users
. - Select Blocked from the Communication and collaboration drop-down.
- Select + Choose segment, add the segment created in step 4 above, and select Next. For example,
Uncallable Resource Accounts
. - Set the policy to On, select Next, and then Submit.
- Select Create policy.
- Enter a name for the policy, and select Next. For example,
Callable Users
. - Select + Choose segment, add the segment created in step 4, and select Next.
- Select Blocked from the Communication and collaboration drop-down.
- Select + Choose segment, add the segment created in step 9 above, and select Next.
- Set the policy to On, select Next, and then Submit.
- In the left navigation pane, select Information barriers > Policy application.
- Select Apply all policies.
Note
It may take 30 minutes or more for the policy to be applied.
Once the status shows completed, go into Teams Client and try to search for the Resource Accounts that were blocked. It may be necessary to clear the Teams cache.
If a Teams user has saved the Resource Account as a contact, they will no longer be able to call it.