1. Check account type first
Confirm the person is using a Microsoft 365 work account tied to a Microsoft Entra tenant, not a personal Microsoft account.
Use this page to identify the likely cause of a rollout failure, find the right owner to fix it, and move the user to the correct next step instead of retrying the same broken path.
Last checked
2026-04-11
The flow below helps you separate account problems, policy problems, and scope problems quickly.
Confirm the person is using a Microsoft 365 work account tied to a Microsoft Entra tenant, not a personal Microsoft account.
Confirm an organization owner and a Microsoft Entra Global Administrator have already completed the required setup steps for the tenant.
Confirm the user is in the assigned pilot group and is not being blocked by conditional access or device policy.
If only one surface is failing, check whether that scope was revoked or intentionally excluded from the pilot.
If the blocker looks like a plan or availability issue, compare the docs page and support articles on the same day before giving guidance.
Each card maps a common symptom to the likely cause, what the admin should fix, and what the user should do next.
Personal Microsoft account not supported
The user signs in with @outlook.com or @hotmail.com and authentication fails or never finishes.
Anthropic says the connector requires a Microsoft 365 account tied to a Microsoft Entra tenant and a Microsoft Business plan.
Admin-side fix
State the work-account requirement in rollout instructions and route personal-account users away from the connector flow before they try to authenticate.
User-side fix
Retry with your work Microsoft 365 account or ask your admin whether your account is tied to the approved tenant.
Related page
Setup GuideAdmin setup not completed before user connection
The first user cannot finish setup, keeps seeing an approval blocker, or is asked for admin consent unexpectedly.
The tenant has not been pre-consented, or on Team and Enterprise the connector was not enabled in Claude first.
Admin-side fix
Have the organization owner enable the connector where required, then have a Microsoft Entra Global Administrator complete the one-time consent flow.
User-side fix
Stop retrying the connection and ask your admin whether tenant authorization and organization enablement are complete.
Related page
Setup GuideUser assignment or policy restriction
Some users can connect, but others cannot, or sign-in fails only on unmanaged devices or outside approved networks.
The user is outside the assigned pilot group or is blocked by conditional access requirements.
Admin-side fix
Review enterprise app assignment, group-based access, MFA policy, device-compliance rules, and network restrictions for the affected user.
User-side fix
Use an approved device and network, then confirm with your admin that you are in the allowed pilot group.
Related page
Permission MatrixPermission denied or missing data on one surface
Connection succeeds, but one surface such as SharePoint, Outlook, Teams, or OneDrive returns missing results or permission errors.
The permission for one Microsoft 365 surface was removed, or the user never had access to the underlying content in Microsoft 365.
Admin-side fix
Check whether the relevant delegated scope such as Sites.Read.All, Mail.Read, Chat.Read, or Files.Read was revoked or intentionally kept out of scope.
User-side fix
Open the same document, message, folder, or calendar item directly in Microsoft 365 to confirm you already have access there.
Related page
Permission MatrixPlan availability wording conflict
One Anthropic page says the connector is for Team and Enterprise only, while another says it is available on all Claude plans.
Public Anthropic surfaces were not aligned on plan availability on April 11, 2026.
Admin-side fix
Check Anthropic's docs page, enable guide, and security guide on the same day. If they differ, keep the mismatch visible in your internal note instead of collapsing it into one claim.
User-side fix
Ask your internal owner which plan policy is currently approved instead of relying on a single public page.
Related page
Compliance FAQDo not keep the problem at the helpdesk layer if the actual owner is in identity administration or review governance.
Escalate to the Microsoft Entra Global Administrator when tenant consent, enterprise app assignment, or policy restrictions are the blocker.
Escalate to the security or compliance reviewer when the failure is really a question about which Microsoft 365 surfaces are approved.
Escalate to the internal content owner when public Anthropic wording changes or conflicts with the instructions your users were given.