Microsoft 365 offers powerful Office applications with a variety of add-ins that can enhance productivity. However, allowing individual users to acquire Office add-ins on their own can sometimes lead to security risks or management challenges. Preventing individual acquisition helps organizations maintain control over the add-ins used in their environment.
This guide will walk you through the basic steps to configure Microsoft 365 on Windows 11 to stop users from installing Office add-ins individually. The instructions are designed to be easy to follow, even if you are new to Microsoft 365 administration.
By following these steps, you can ensure that add-ins are centrally managed, improving security and consistency across your organization. Let’s get started with some quick checks before diving into the configuration.
Keep in mind that these settings require administrator access to Microsoft 365 and some familiarity with Microsoft Endpoint Manager or Group Policy.
Quick Note: Prerequisites and Checks
- Microsoft 365 Admin Access: You need to have global admin or at least Exchange admin rights in your Microsoft 365 tenant.
- Windows 11 Device: Ensure the target PC is running Windows 11 with the latest updates installed.
- Office Version: Confirm that Microsoft Office apps are installed from Microsoft 365 and are updated to the latest version.
- Azure AD Joined or Hybrid Joined Devices: Devices should ideally be Azure AD joined or hybrid joined to apply policies effectively.
- Microsoft Endpoint Manager (Intune): Having access to Endpoint Manager is recommended for centralized policy deployment.
Step 1: Understanding Why to Prevent Individual Add-In Acquisition
Allowing every user to add Office add-ins individually can cause several issues. Some add-ins may not comply with your organization’s security policies, potentially putting data at risk. Others might interfere with software performance or create inconsistencies in the user experience.
By managing add-ins centrally, you reduce these risks and ensure that only approved tools are accessible. This also simplifies support and compliance management.
Step 2: Disable Office Store Access via Microsoft Endpoint Manager
The most effective way to prevent users from acquiring add-ins is to block access to the Office Store where add-ins are downloaded. This can be done using Microsoft Endpoint Manager (Intune) by configuring a device configuration profile.
Create a Device Configuration Profile
- Sign in to the Microsoft Endpoint Manager admin center.
- In the left pane, select Devices > Configuration profiles.
- Click on Create profile.
- Choose Windows 10 and later as the platform.
- For the profile type, select Templates and then Administrative Templates.
- Name the profile (e.g., “Block Office Store Access”) and click Next.
Configure the Policy Setting
- Search for the setting “Block access to the Store” or “Block access to Office Store”.
- Set this policy to Enabled.
- Review and assign the profile to the groups or devices where you want to enforce this setting.
- Click Create to finish the profile.
This setting prevents users from browsing and installing add-ins from the Office Store inside Office applications.
Step 3: Using Group Policy to Block Office Store (Alternative Method)
If you are managing devices via Active Directory on-premises, you can use Group Policy to block access to the Office Store.
Steps for Group Policy
- Open the Group Policy Management Console (GPMC) on a domain controller or management PC.
- Create a new Group Policy Object (GPO), e.g., “Block Office Store Access”.
- Edit the GPO and navigate to:
Computer Configuration > Policies > Administrative Templates > Microsoft Office 2016 > Miscellaneous. - Look for the setting named “Block access to the Office Store”.
- Double-click the setting and set it to Enabled.
- Apply the GPO to the appropriate Organizational Units (OUs) containing Windows 11 devices.
After the policy is applied, users will no longer be able to access the Office Store to install add-ins on their own.
Step 4: Managing Add-Ins Centrally via Microsoft 365 Admin Center
Instead of letting users install add-ins individually, admins can deploy add-ins centrally using the Microsoft 365 Admin Center.
How to Deploy Add-Ins Centrally
- Sign in to the Microsoft 365 Admin Center.
- Go to Settings > Integrated Apps or Settings > Services & add-ins (depending on your tenant).
- Select Deploy Add-In.
- Upload or select the add-in you want to deploy.
- Choose the users or groups that should receive the add-in.
- Confirm and deploy the add-in.
This method ensures that only approved add-ins are available to users, maintaining control over what is installed.
Advanced Option: Using PowerShell to Manage Add-Ins
For administrators comfortable with PowerShell, the Exchange Online PowerShell module offers commands to manage add-ins programmatically.
For example, to disable individual user add-in acquisition, you can use commands like:
Set-App -OrganizationApp -Identity <AppId> -Enabled $false
Or to deploy add-ins:
New-App -OrganizationApp -FileData <Base64EncodedManifest> -Enabled $true
These commands require proper permissions and should be used carefully.
FAQs
Q: Can I allow some users to install add-ins while blocking others?
A: Yes, by applying policies to specific user groups or device collections, you can create exceptions where needed.
Q: Will blocking Office Store access affect other Microsoft Store apps?
A: No, blocking Office Store access only restricts add-ins within Office applications, not the Microsoft Store itself.
Q: How long does it take for policies to take effect?
A: Policies usually apply within a few hours after device check-in. Restarting Office applications or the device can speed up the process.
Q: Can I reverse these changes if needed?
A: Yes, you can disable or remove the policies or Group Policy settings at any time to restore access.
Q: What happens if a user already installed add-ins before blocking?
A: Existing add-ins remain installed unless you remove them centrally. Blocking prevents new installations.
When Nothing Works
If you have followed all the steps and users still can acquire add-ins, consider the following:
- Verify that policies are properly assigned and synced on target devices.
- Ensure devices are Azure AD joined or hybrid joined to receive Intune policies.
- Check for conflicting policies that might override your settings.
- Review device event logs and Intune diagnostics for errors.
- Consult official Microsoft documentation and support: Microsoft 365 Add-Ins Deployment Guide.
Conclusion
Preventing individual acquisition of Office add-ins is an important step in securing your Microsoft 365 environment on Windows 11. By blocking access to the Office Store through Endpoint Manager or Group Policy, and by centrally deploying approved add-ins, you control the tools users can access.
This improves security, reduces support overhead, and ensures a consistent experience for all users. Remember to review and update policies regularly as your organization’s needs evolve.
With these basic yet effective steps, you can confidently manage Office add-in acquisition and maintain a secure and productive workspace.