Microsoft 365 Security Checklist

Advanced Guide with Detailed Instructions

Progress
0%
Need help securing your Microsoft 365? Our Microsoft 365 Security Experts can help you implement all security measures.
🛡️ Contact Our Premium Services
M365 General Most plans
Business Premium Requires Premium
M365 E5 Requires E5
💡 Click items to expand details
🔐

Identity

Identity is the new security perimeter. Strong identity equals strong security.

Multi-Factor Authentication (MFA)
Enable MFA for all administrators
M365 General
Why This Matters

Administrator accounts are high-value targets for attackers. MFA protects against 99.9% of identity-based attacks. If you aren't requiring every privileged account to use MFA, stop reading and do this immediately.

Step-by-Step Instructions
  1. Navigate to the Microsoft Entra admin center (entra.microsoft.com)
  2. Go to Azure Active Directory → Security → MFA
  3. Click "Additional cloud-based MFA settings"
  4. Select the administrators tab and enable MFA for each admin account
  5. Alternatively, create a Conditional Access policy requiring MFA for admin roles
⚠️ Create break glass accounts before enforcing MFA on all admins to avoid lockout scenarios.
Enable MFA for all users
M365 General
Why This Matters

Many breaches start with compromised user credentials. MFA is free for all Microsoft 365 tenants and significantly reduces the risk of account compromise.

Step-by-Step Instructions
  1. Navigate to the Microsoft Entra admin center (entra.microsoft.com)
  2. Go to Protection → Authentication methods → Policies
  3. Enable Microsoft Authenticator for all users
  4. Go to Protection → Conditional Access → Create new policy
  5. Create a policy requiring MFA for all users, all cloud apps
  6. Better approach: Use Conditional Access policy (requires Entra ID P1)
User Training Requirements

Train users to: install Microsoft Authenticator app, understand why MFA is deployed, and REJECT prompts they didn't initiate (potential attack indicator).

⚠️ Azure AD has been renamed to Microsoft Entra ID. The legacy per-user MFA portal is being deprecated. Use Conditional Access policies instead.
Create cloud-only administrator accounts
M365 General
Why This Matters

Separate admin accounts from day-to-day user accounts. Cloud-only accounts aren't synced from on-premises AD, reducing attack surface. They don't require a license for admin-only tasks.

Step-by-Step Instructions
  1. Go to Microsoft 365 Admin Center → Users → Active users
  2. Click "Add a user" to create a new cloud-only account
  3. Use a naming convention like [email protected]
  4. Assign only necessary admin roles (least privilege)
  5. Enable MFA immediately on these accounts
  6. Use strong, unique passwords (40+ characters recommended)
💡 These accounts separate admin activities from daily work. Use PIM (Entra ID P2) for just-in-time access instead of permanent assignments.
Disable app passwords
M365 General
Why This Matters

App passwords are a workaround for legacy clients that don't support modern authentication. They bypass MFA protection and should be disabled in 2024.

Step-by-Step Instructions
  1. Go to Microsoft Entra admin center → Protection → Authentication methods
  2. Click on "Policies" and review authentication method settings
  3. For legacy MFA settings: go to Protection → Multifactor authentication → Additional cloud-based MFA settings
  4. Under "app passwords", select "Do not allow users to create app passwords"
  5. Click Save
Disable SMS/text message MFA
M365 General
Why This Matters

SMS-based MFA is vulnerable to SIM swapping attacks, SS7 protocol vulnerabilities, and social engineering. Microsoft Authenticator or FIDO2 keys are much more secure.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Authentication methods
  2. Click on "SMS" in the methods list
  3. Set "Enable" to "No" to disable for all users
  4. Alternatively, limit to specific groups during transition
  5. Ensure users have Authenticator app configured first
⚠️ Ensure all users have alternative MFA methods configured before disabling SMS. Some users may only have phone-based MFA.
Disable phone call MFA
M365 General
Why This Matters

Voice calls for MFA share similar vulnerabilities to SMS. Social engineering attacks can trick phone carriers into forwarding calls. Use app-based or hardware token authentication instead.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Authentication methods
  2. Click on "Voice call" in the methods list
  3. Set "Enable" to "No"
  4. Save changes
Set MFA remember trusted devices to 90 days
M365 General
Why This Matters

Prompting users too frequently leads to "MFA fatigue" where they automatically approve without thinking. Microsoft recommends 90 days or using Conditional Access for smarter sign-in frequency.

Step-by-Step Instructions
  1. Go to Microsoft Entra admin center → Protection → Multifactor authentication
  2. Click "Additional cloud-based MFA settings"
  3. Under "remember multi-factor authentication", check the box
  4. Set days to 90
  5. Click Save
💡 For more granular control, use Conditional Access sign-in frequency policies instead of this global setting.
Train staff in using MFA correctly
M365 General
Why This Matters

MFA is only effective if users understand how to use it properly. They must know to REJECT unexpected prompts, as attackers may trigger prompts hoping users approve out of habit.

Training Topics to Cover
  1. How to install and set up Microsoft Authenticator
  2. Why MFA is important for security
  3. What to do when receiving unexpected MFA prompts (REJECT)
  4. How to report suspicious MFA activity to IT
  5. Backup authentication methods and recovery
⚠️ An unexpected MFA prompt when you're NOT logging in is a red flag indicating your password may be compromised. Always REJECT and change your password.
Use Windows Hello for Business where possible
M365 General
Why This Matters

Windows Hello for Business (WHFB) provides passwordless, phishing-resistant authentication using biometrics or PIN tied to the device's TPM. This is stronger than traditional MFA.

Step-by-Step Instructions
  1. Go to Intune Admin Center → Devices → Enrollment
  2. Select "Windows Hello for Business"
  3. Configure WHFB settings for your organization
  4. Set to "Enabled" for target groups
  5. Configure PIN complexity requirements
  6. Enable biometric authentication if devices support it
Use FIDO2 / hardware security keys where possible
M365 General
Why This Matters

FIDO2 security keys provide the strongest form of MFA, offering phishing-resistant, passwordless authentication. The key physically validates the website's identity, preventing credential theft.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Authentication methods
  2. Enable "FIDO2 security key" method
  3. Configure allowed vendors (YubiKey, Feitian, etc.)
  4. Deploy physical keys to high-risk users (admins, executives)
  5. Have users register keys at aka.ms/mysecurityinfo
FIDO2 keys are unphishable - even if a user clicks a fake login page, the key won't authenticate because the domain doesn't match.
Legacy Authentication & Break Glass
Investigate legacy authentication usage in sign-in logs
M365 General
Why This Matters

Legacy protocols (POP3, IMAP, SMTP AUTH, etc.) don't support MFA, allowing attackers to bypass your MFA protection. Before blocking, identify legitimate uses.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Monitoring → Sign-in logs
  2. Change time range to "Last 1 month"
  3. Click "Add filters" → Client app
  4. Select all 13 Legacy Authentication Clients checkboxes
  5. Review results - add Status filter for "Success" to focus on actual usage
  6. Identify users/apps and migrate them to modern auth
Common Legacy Auth Sources

• Android/iOS native mail apps (switch to Outlook)
• Printers/scanners sending email
• Line-of-business applications
• Old Office versions (pre-2013)

Block legacy authentication with Conditional Access
Business Premium
Why This Matters

Conditional Access provides granular control to block legacy auth while allowing exceptions. This is the recommended method over the admin center toggle.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Conditional Access
  2. Click "New policy from template"
  3. Select "Block legacy authentication" template
  4. Review settings and exclude break glass accounts
  5. Set to "Report-only" first to test impact
  6. After validation, switch to "On"
⚠️ Always test in Report-only mode first and exclude break glass accounts to prevent lockouts.
Block legacy auth in M365 Admin Center
M365 General
Why This Matters

Belt and suspenders approach - use both Conditional Access AND the admin center setting for defense in depth.

Step-by-Step Instructions
  1. Go to admin.microsoft.com
  2. Navigate to Settings → Org settings → Services
  3. Click "Modern authentication"
  4. Uncheck all basic authentication protocols
  5. Click Save
Create two break glass (emergency) accounts
M365 General
Why This Matters

Break glass accounts provide emergency access if MFA services are down or all admins are locked out. They're exempt from MFA and CA policies but have extremely strong passwords.

Step-by-Step Instructions
  1. Create 2 cloud-only accounts (e.g., [email protected])
  2. Use 40+ character random passwords
  3. Assign Global Administrator role
  4. Exclude from ALL Conditional Access policies
  5. Exclude from MFA requirements
  6. Store credentials securely (safe, separate locations)
  7. Test accounts periodically (quarterly)
⚠️ Use the .onmicrosoft.com domain for these accounts - they must work even if your custom domain has issues.
Configure alerting for break glass account usage
M365 General
Why This Matters

You must be immediately notified if break glass accounts are used - this could indicate a legitimate emergency OR an attacker who obtained the credentials.

Step-by-Step Instructions
  1. Option 1: Send sign-in logs to Azure Monitor/Log Analytics
  2. Create an alert rule for break glass account sign-ins
  3. Option 2: Use Microsoft Sentinel with an Analytics rule
  4. Configure email/SMS notifications
  5. Test the alert by signing in with the break glass account
Password Protection & Additional Settings
Enable PIM for all admin users
M365 E5
Why This Matters

Privileged Identity Management (PIM) provides just-in-time admin access. Accounts are ordinary users until they elevate for a limited time, reducing the attack window.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Identity Governance → Privileged Identity Management
  2. Click "Microsoft Entra roles"
  3. Click "Roles" and select each admin role
  4. Change assignments from "Permanent" to "Eligible"
  5. Configure activation settings (MFA, justification, approval)
  6. Set maximum activation duration (e.g., 8 hours)
💡 Keep break glass accounts as permanent Global Admins - they're your emergency fallback when PIM isn't working.
Add organization-specific words to Password Protection
M365 General
Why This Matters

Microsoft Entra Password Protection blocks common bad passwords globally. Add your company name, products, locations, executive names, and local sports teams - words your employees likely use.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Authentication methods
  2. Click "Password protection"
  3. Add custom banned passwords (up to 1000 words)
  4. Include: company name, brands, locations, C-suite names
  5. Don't add common passwords - Microsoft already blocks those
  6. Click Save
Examples of Words to Add
CompanyName
ProductBrand
CityLocation
CEOFirstName
LocalSportsTeam
CompanyAcronym
Create custom branding logos in Microsoft Entra ID
M365 General
Why This Matters

Custom branding helps users identify legitimate login pages. Phishing attacks typically use generic Microsoft login pages - your branded page is a security indicator. Also required for Windows Autopilot.

Step-by-Step Instructions
  1. Go to Entra Admin Center → User experiences → Company branding
  2. Click "Configure" or edit existing
  3. Upload background image (1920x1080px, max 300KB)
  4. Upload banner logo (280x60px, max 10KB)
  5. Add sign-in page text with company name
  6. Configure square logo for mobile apps
💡 Train users that legitimate login pages show your company branding. A generic Microsoft page for your company email is suspicious.
Enable and configure Self Service Password Reset
M365 General
Why This Matters

SSPR reduces help desk load and allows users to reset passwords securely 24/7. Without it, users may choose weaker passwords or share credentials to work around lockouts.

Step-by-Step Instructions
  1. Go to Entra Admin Center → Protection → Password reset
  2. Set "Self service password reset enabled" to "All" or selected groups
  3. Configure required authentication methods (recommend 2)
  4. Enable mobile app and email notification options
  5. If syncing from AD, enable password writeback in Azure AD Connect
  6. Test with a non-admin account
Enable Unified Auditing and define retention policies
M365 General
Why This Matters

Audit logs are essential for investigating security incidents. Without sufficient retention, evidence may be lost before you discover a breach. Default is on but verify retention policy exists.

Step-by-Step Instructions
  1. Go to Microsoft Purview Compliance portal
  2. Navigate to Audit → Audit retention policies
  3. Click "New audit retention policy"
  4. Name it and add ALL record types
  5. Set retention: 90 days (Business Premium) or 1 year (E5)
  6. Set priority to 1 (highest) and save
AAD Connect - Ensure only relevant OUs are synced
M365 General
Why This Matters

Don't sync service accounts, computer objects, or test accounts to Microsoft Entra ID. Every synced account is potential attack surface. Only sync OUs with actual users who need cloud access.

Step-by-Step Instructions
  1. On the Azure AD Connect server, launch the configuration wizard
  2. Select "Customize synchronization options"
  3. Review Domain/OU Filtering
  4. Uncheck OUs containing service accounts, computers, etc.
  5. Only keep user OUs that need cloud access
  6. Complete the wizard and verify sync
⚠️ Treat the Azure AD Connect server like a Domain Controller - it has equivalent access to read password hashes and requires the same security hardening.
📧

Email Security

Email remains one of the most common attack vectors. Configure EOP and Defender for Office 365.

Mailbox & Threat Policies
Enable mailbox auditing for all mailboxes
M365 General
Why This Matters

Mailbox auditing logs actions like message access, deletion, and forwarding. Essential for investigating compromised accounts. Enabled by default since 2019 but verify older mailboxes.

PowerShell Verification
Connect-ExchangeOnline
Get-Mailbox | FL Identity, AuditEnabled

# Enable if needed:
Set-Mailbox -Identity [email protected] -AuditEnabled $true
Configure Anti-phishing policy - Include domains you own
M365 General
Step-by-Step Instructions
  1. Go to security.microsoft.com → Email & collaboration → Policies & rules
  2. Click Threat policies → Anti-phishing
  3. Edit the default policy
  4. Enable "Include domains I own"
  5. Enable mailbox intelligence and impersonation protection
  6. Enable spoof intelligence
  7. Configure actions (quarantine recommended)
Configure Anti-spam policies with ZAP enabled
M365 General
Why This Matters

Zero-hour Auto Purge (ZAP) removes malicious messages that were delivered before being identified as threats. It "reaches into" inboxes to remove newly-identified spam/phish.

Configure Anti-malware - Block all dangerous file types
M365 General
Step-by-Step Instructions
  1. Go to security.microsoft.com → Threat policies → Anti-malware
  2. Edit the default policy
  3. Enable common attachment types filter
  4. Click "Customize file types" and select ALL 96 extensions
  5. Enable ZAP for malware
  6. Set quarantine access to admins only
Block auto-forwarding with Mail Flow rule
M365 General
Why This Matters

Attackers often set up email forwarding to external addresses after compromising accounts. This lets them monitor communications for Business Email Compromise (BEC) attacks, which cost more than ransomware.

Step-by-Step Instructions
  1. Go to Exchange Admin Center → Mail flow → Rules
  2. Create new rule
  3. Apply if: Recipient is located → Outside the organization
  4. AND: Message type → Auto-forward
  5. Action: Reject with explanation
  6. Set mode to Enforce
Configure SPF records for all domains
M365 General
Why This Matters

SPF (Sender Policy Framework) helps receiving servers verify that email claiming to be from your domain actually came from authorized servers.

Required DNS Record
Type: TXT
Host: @
Value: v=spf1 include:spf.protection.outlook.com -all
Configure DKIM signing
M365 General
Why This Matters

DKIM (DomainKeys Identified Mail) cryptographically signs outgoing emails, allowing recipients to verify the message wasn't altered in transit.

Configure DMARC with reject policy
M365 General
DMARC DNS Record (Start with none, progress to reject)
# Phase 1 - Monitor:
v=DMARC1; p=none; rua=mailto:[email protected]

# Phase 2 - Quarantine:
v=DMARC1; p=quarantine; rua=mailto:[email protected]

# Phase 3 - Reject (goal):
v=DMARC1; p=reject; rua=mailto:[email protected]
Defender for Office 365 (Business Premium / E5)
Configure Safe Attachments with Dynamic Delivery
Business Premium
Why This Matters

Safe Attachments detonates suspicious attachments in a sandbox VM to catch zero-day malware that bypasses traditional AV. Dynamic Delivery shows the email immediately while attachments are scanned.

Configure Safe Links with real-time scanning
Business Premium
Why This Matters

Safe Links scans URLs at time-of-click, not just delivery. Attackers often send clean links, wait for delivery, then weaponize the destination. Time-of-click scanning defeats this.

👥

Teams Governance

Apply governance controls for Teams creation, sharing, and external access.

Teams & External Access Controls
Limit Teams creation to specific users
M365 General
Why This Matters

By default, all users can create Teams (M365 Groups). This leads to sprawl and potential data governance issues.

Configure guest access settings in Microsoft Entra ID
M365 General
Step-by-Step Instructions
  1. Go to Entra Admin Center → External Identities → External collaboration settings
  2. Configure guest user permissions (limited recommended)
  3. Set who can invite guests (admins only recommended)
  4. Configure domain allow/deny lists
📁

SharePoint & OneDrive

Control external sharing to prevent data leaks.

External Sharing Controls
Configure external sharing for SharePoint & OneDrive
M365 General
Sharing Options (Most to Least Restrictive)

Only people in organization - No external sharing
Existing guests - Only share with already-invited guests
New and existing guests - Anyone with a guest account
Anyone - Anonymous links (not recommended)

📱

Applications (OAuth)

Control OAuth app permissions and consent workflows.

OAuth App Management
Review and restrict OAuth app consent settings
M365 General
Why This Matters

Malicious OAuth apps can gain persistent access to user mailboxes even after password changes and MFA. Users may unknowingly grant excessive permissions.

💻

Endpoint Manager / Intune

Manage device security with MDM and MAM policies.

Device Compliance & Security
Create device compliance policies
Business Premium
Recommended Compliance Settings

• Require BitLocker encryption
• Require Secure Boot
• Require firewall enabled
• Require antivirus/antispyware
• Minimum OS version

Configure Security Baselines
Business Premium
🏷️

Information Protection & DLP

Classify, label, and protect sensitive data.

Sensitivity Labels & Data Loss Prevention
Create sensitivity labels and policies
Business Premium
Create DLP policies (start with report-only)
Business Premium
📊

Microsoft Secure Score

Track and improve your security posture.

Secure Score Actions
Review and implement Secure Score recommendations
M365 General
Priority Actions

1. Implement all low user-impact actions first
2. Then high score-improvement actions
3. Schedule monthly reviews for new recommendations

Business Premium Features

Security features specific to M365 Business Premium including Defender for Business.

Microsoft Defender for Business - Setup & Onboarding
Set up and configure Microsoft Defender for Business
Business Premium
Why This Matters

Microsoft Defender for Business provides enterprise-grade endpoint security designed for SMBs. It includes threat & vulnerability management, attack surface reduction, next-generation protection, endpoint detection and response (EDR), and automated investigation.

Step-by-Step Setup Process
  1. Sign in to Microsoft 365 Defender portal (security.microsoft.com)
  2. Go to Settings → Endpoints → Onboarding
  3. A setup wizard will guide you through initial configuration
  4. Grant permissions to the security team
  5. Configure email notifications for alerts
  6. Review default security policies or use simplified configuration
💡 The simplified configuration process in Defender for Business uses default policies optimized for SMBs, reducing setup complexity compared to Defender for Endpoint.
Onboard Windows devices to Defender for Business
Business Premium
Why This Matters

Devices must be onboarded to receive protection. Windows 10/11 devices can be onboarded automatically via Intune, manually with a local script, or through Group Policy for domain-joined devices.

Onboarding Methods

Method 1: Automatic via Intune (Recommended)
Devices enrolled in Intune are automatically onboarded when you enable the Microsoft Intune connection.

Method 2: Local Script
Download the onboarding package and run on individual devices.

Method 3: Group Policy
For domain-joined devices not managed by Intune.

Step-by-Step: Intune Automatic Onboarding
  1. Go to security.microsoft.com → Settings → Endpoints
  2. Click "Advanced features"
  3. Turn on "Microsoft Intune connection"
  4. Go to Intune Admin Center → Endpoint security → Microsoft Defender for Endpoint
  5. Set "Connect Windows devices..." to "On"
  6. Enrolled devices will automatically onboard within hours
⚠️ Supported OS: Windows 10/11 Pro, Enterprise, Education (version 1709+). Windows 10/11 Home requires upgrade for full protection.
Onboard macOS devices to Defender for Business
Business Premium
Why This Matters

Mac devices are increasingly targeted by malware. Defender for Business protects macOS 11 (Big Sur) and later with the same EDR and threat protection capabilities as Windows.

Step-by-Step: macOS Onboarding via Intune
  1. Ensure macOS devices are enrolled in Intune
  2. Go to Intune Admin Center → Apps → macOS
  3. Add Microsoft Defender for Endpoint app
  4. Create configuration profiles for system extensions and network filter
  5. Approve kernel/system extension in System Preferences
  6. Grant Full Disk Access to Microsoft Defender
Required Permissions on macOS

Full Disk Access - Required for scanning
System Extension - Required for real-time protection
Network Extension - Required for network protection
Notifications - For alert notifications

Onboard iOS/iPadOS devices to Defender
Business Premium
Why This Matters

Mobile devices access corporate email and data. Defender for iOS provides web protection, anti-phishing, and blocks unsafe connections on iPhones and iPads.

Capabilities on iOS

Web Protection - Blocks malicious websites
Anti-phishing - Protects against phishing in all browsers
Jailbreak Detection - Detects compromised devices
Conditional Access - Block access from risky devices

Deployment Steps
  1. Ensure devices are enrolled in Intune (supervised mode recommended)
  2. Add Microsoft Defender app from App Store via Intune
  3. Create VPN profile for web protection
  4. Deploy app configuration policy
  5. Users activate protection in the Defender app
Onboard Android devices to Defender
Business Premium
Why This Matters

Android devices are frequent targets for malware and phishing. Defender provides malware scanning, web protection, and network protection on Android 8.0+.

Capabilities on Android

Anti-malware - Scans apps and files for malware
Web Protection - Blocks malicious websites
Anti-phishing - SMS/messaging app phishing protection
Network Protection - Blocks rogue WiFi networks
Privacy Protection - App permission audit

Deployment Options

Android Enterprise (Recommended): Deploy via Managed Google Play in Intune
Device Administrator: Legacy mode, deploy APK via Intune

Microsoft Defender - Security Policies & Configuration
Configure Next-Generation Protection policies
Business Premium
Why This Matters

Next-generation protection includes real-time antivirus, cloud-delivered protection, behavior monitoring, and machine learning-based detection. Default policies are applied automatically but can be customized.

Key Settings to Review

Real-time protection - Should be ON
Cloud-delivered protection - Should be ON (enables cloud ML)
Automatic sample submission - Send suspicious files to Microsoft
Potentially Unwanted Apps (PUA) - Block mode recommended
Tamper protection - Prevent malware from disabling Defender

Configuration Steps
  1. Go to security.microsoft.com → Endpoints → Configuration management
  2. Click "Device configuration" → "Security policies"
  3. Review "Next-generation protection" policy
  4. Enable Cloud protection level: High
  5. Enable Block at First Sight (BAFS)
  6. Set scan schedules as needed
Configure Attack Surface Reduction (ASR) rules
Business Premium
Why This Matters

ASR rules block specific behaviors commonly used by malware - like Office macros launching executables, obfuscated scripts, or credential stealing from LSASS. These rules significantly reduce attack surface.

Recommended ASR Rules to Enable

• Block executable content from email and webmail
• Block Office apps from creating executable content
• Block Office apps from injecting code into other processes
• Block JavaScript/VBScript from launching downloaded executables
• Block execution of potentially obfuscated scripts
• Block Win32 API calls from Office macros
• Block credential stealing from Windows LSASS
• Block process creations from PSExec and WMI commands
• Block untrusted/unsigned USB processes

⚠️ Start with Audit mode to identify potential business impact before switching to Block mode. Some rules may affect legitimate line-of-business applications.
Configure Web Protection and Network Protection
Business Premium
Why This Matters

Web protection blocks access to malicious websites, phishing sites, and exploit sites. Network protection extends this to all network connections, blocking connections to malicious IPs/domains at the network layer.

Components

Web threat protection - Blocks malicious websites
Web content filtering - Block categories (adult, gambling, etc.)
Custom indicators - Block/allow specific URLs/IPs
Network protection - Block C2 callbacks, malicious IPs

Enable Controlled Folder Access (Ransomware protection)
Business Premium
Why This Matters

Controlled folder access prevents unauthorized apps from modifying files in protected folders. This is your last line of defense against ransomware - even if malware executes, it cannot encrypt protected files.

Default Protected Folders

• Documents
• Pictures
• Videos
• Music
• Desktop
• Favorites
You can add custom folders like network shares

⚠️ Start in Audit mode and whitelist legitimate applications that need to write to protected folders. Some LOB apps may be blocked initially.
Configure Firewall policies
Business Premium
Why This Matters

Windows Defender Firewall policies can be centrally managed through Defender for Business, ensuring consistent firewall rules across all devices.

Microsoft Defender - Monitoring & Response
Review Threat & Vulnerability Management (TVM) dashboard
Business Premium
Why This Matters

TVM scans all onboarded devices and identifies vulnerabilities (CVEs) in installed software. It provides a prioritized list of what to patch based on risk, exploit availability, and prevalence in your environment.

Key TVM Components

Exposure Score - Overall vulnerability exposure
Microsoft Secure Score for Devices - Security configuration score
Security Recommendations - Prioritized remediation actions
Software Inventory - All installed software across devices
Weaknesses - CVEs found in your environment

Configure alert notifications and email reports
Business Premium
Why This Matters

You need to be notified immediately when threats are detected. Configure email notifications for security alerts and schedule regular reports.

Configuration Steps
  1. Go to Settings → Endpoints → Email notifications
  2. Add notification rules for alert severity levels
  3. Add recipients (security team email addresses)
  4. Configure frequency (immediate for high/critical)
  5. Enable vulnerability reports (weekly recommended)
Enable Automated Investigation and Remediation (AIR)
Business Premium
Why This Matters

AIR automatically investigates alerts and can remediate threats without manual intervention. This is crucial for SMBs without a dedicated SOC team - Defender handles most threats automatically.

Automation Levels

Full (Recommended) - Automatic remediation
Semi - Requires approval for some actions
No automation - Manual review only

For SMBs, Full automation is recommended. Defender for Business is designed to handle threats automatically, reducing the need for security expertise.
Review Device Inventory and onboarding status
Business Premium
Why This Matters

Regularly verify that all devices are onboarded and actively reporting. Devices that stop reporting may have been compromised or have Defender disabled.

What to Check

• All company devices are listed
• Health status is "Active"
• Sensor health has no issues
• Antivirus status is current
• Last seen time is recent (within 24 hours)

Review Reports dashboard regularly
Business Premium
Why This Matters

Regular review of security reports helps identify trends, verify protection is working, and demonstrate security posture to stakeholders.

Key Reports to Review

Threat protection report - Threats blocked/detected
Device health report - Sensor and AV health
Vulnerable devices - Devices needing patches
Web protection report - Blocked web threats

🚀

Microsoft 365 E5 Security

Advanced security features with E5 licensing - enterprise-grade protection for sophisticated threats.

Microsoft Defender for Endpoint Plan 2
Deploy Defender for Endpoint Plan 2
M365 E5
Why This Matters

Defender for Endpoint P2 adds advanced capabilities beyond P1/Business: Threat Hunting, Microsoft Threat Experts, full EDR capabilities, and support for Linux servers.

P2 Additional Features vs P1

Advanced Hunting - Query-based threat hunting with KQL
Threat Experts - Access to Microsoft's SOC analysts
Endpoint Attack Notifications - Proactive threat alerts
Sandbox (Deep Analysis) - Detonate suspicious files
Linux Server support - Full EDR for Linux

Configure Advanced Hunting queries
M365 E5
Why This Matters

Advanced Hunting allows proactive threat hunting using Kusto Query Language (KQL). Search across 30 days of raw endpoint, email, identity, and app data to find hidden threats.

Available Data Tables

DeviceEvents - Security events on devices
DeviceProcessEvents - Process execution
DeviceNetworkEvents - Network connections
DeviceFileEvents - File operations
DeviceRegistryEvents - Registry changes
EmailEvents - Email metadata
IdentityLogonEvents - Authentication events

Example Query: Detect PowerShell Downloads
DeviceProcessEvents
| where ProcessCommandLine has_any ("Invoke-WebRequest", "wget", "curl", "DownloadFile")
| where ProcessCommandLine has_any (".ps1", ".exe", ".dll")
| project Timestamp, DeviceName, AccountName, ProcessCommandLine
Enable Microsoft Threat Experts
M365 E5
Why This Matters

Microsoft Threat Experts provides access to Microsoft's security analysts who proactively hunt for threats in your environment and provide expert guidance.

Two Service Tiers

Endpoint Attack Notifications (Included with E5):
• Proactive notifications about serious threats
• Targeted attack notifications tagged in portal

Experts on Demand (Additional purchase):
• Consult Microsoft analysts directly
• Get expert help with investigations

How to Apply
  1. Go to Settings → Endpoints → General → Advanced features
  2. Find "Microsoft Threat Experts" section
  3. Click "Apply" to request access
  4. Microsoft will review and approve based on environment size
Microsoft Defender for Identity
Deploy Defender for Identity sensors on Domain Controllers
M365 E5
Why This Matters

Defender for Identity (formerly Azure ATP) monitors Active Directory traffic to detect advanced attacks like Pass-the-Hash, Pass-the-Ticket, Golden Ticket, and lateral movement.

Detected Attack Types

Reconnaissance - Account enumeration, network mapping
Compromised credentials - Brute force, exposed credentials
Lateral movement - Pass-the-Hash, Pass-the-Ticket, NTLM relay
Domain dominance - Golden Ticket, DCSync, skeleton key
Exfiltration - DNS exfiltration

Deployment Steps
  1. Go to security.microsoft.com → Settings → Identities
  2. Download the sensor setup package
  3. Create a Directory Service account (gMSA recommended)
  4. Install sensor on each Domain Controller
  5. Install on AD FS servers if using federation
  6. Verify sensor health in the portal
⚠️ The sensor captures network traffic via port mirroring or directly on DCs. Ensure DCs meet the hardware requirements (check docs).
Configure Defender for Identity security alerts
M365 E5
Why This Matters

Review and tune alerts to reduce noise. Some alerts may need exclusions for legitimate admin activities like penetration testing or specific service accounts.

Configuration Tasks
  1. Configure sensitive accounts (executives, service accounts)
  2. Tag honeytoken accounts to detect enumeration
  3. Exclude known scanner/admin accounts from alerts
  4. Configure email notifications for high-severity alerts
  5. Integrate with Microsoft Sentinel for SIEM correlation
Defender for Office 365 Plan 2
Use Threat Explorer for investigation
M365 E5
Why This Matters

Threat Explorer provides real-time views of email threats, allowing you to investigate phishing campaigns, trace malware delivery, and understand attack patterns.

Key Capabilities

All Email view - See all messages and their verdicts
Malware view - Filter for malware detections
Phish view - Filter for phishing attempts
Content Malware - Threats in SharePoint/OneDrive
URL clicks - Track clicked URLs and their verdicts

Configure Automated Investigation and Response (AIR) for email
M365 E5
Why This Matters

AIR automatically investigates alerts, determines scope, and can automatically remediate threats (delete malicious emails, block URLs) without manual intervention.

Automated Actions

• Soft delete malicious emails from all mailboxes
• Block malicious URLs organization-wide
• Turn off external mail forwarding
• Quarantine messages matching threat indicators

Deploy Attack Simulation Training
M365 E5
Why This Matters

Regular phishing simulations train users to recognize attacks. Users who fail simulations get automatic training. Track improvement over time with detailed reports.

Simulation Types

Credential Harvest - Fake login pages
Malware Attachment - Simulated malicious files
Link in Attachment - Link inside document
Link to Malware - Direct download link
Drive-by URL - Compromised website simulation

Best Practices
  1. Start with baseline simulation to measure current state
  2. Run simulations monthly (not just annually)
  3. Vary payloads and techniques each time
  4. Enable automatic training for users who fail
  5. Track metrics and report to leadership
Review Threat Trackers and Campaign Views
M365 E5
Why This Matters

Threat Trackers provide intelligence on current threats targeting organizations worldwide. Campaign Views show coordinated attacks targeting your organization.

Microsoft Defender for Cloud Apps (CASB)
Configure Cloud App Discovery
M365 E5
Why This Matters

Discover Shadow IT - cloud applications your users are using without IT approval. The catalog includes 31,000+ apps with risk scores based on security, compliance, and legal factors.

Discovery Methods

Defender for Endpoint integration - Automatic discovery from endpoints
Log upload - Upload firewall/proxy logs
Log collectors - Continuous automated upload

Create OAuth app policies
M365 E5
Why This Matters

OAuth apps with excessive permissions are a major attack vector. Defender for Cloud Apps provides visibility into all OAuth apps and can automatically revoke risky ones.

Recommended Policies

• Alert on apps with high permission level from unverified publishers
• Alert on apps accessing mail/files with no recent activity
• Block apps with community rating below threshold
• Revoke access for apps marked as banned

Configure Session and Access policies
M365 E5
Why This Matters

Conditional Access App Control enables real-time monitoring and control of cloud app sessions. Block downloads, restrict copy/paste, require step-up authentication for sensitive actions.

Session Control Capabilities

• Block download of sensitive files on unmanaged devices
• Protect documents with encryption on download
• Block copy/paste of sensitive content
• Block print of sensitive documents
• Block upload of malware

Microsoft Entra ID Protection (Entra ID P2)
Configure Sign-in risk policy
M365 E5
Why This Matters

Sign-in risk uses ML to evaluate each login in real-time. Risky sign-ins (unfamiliar location, impossible travel, malware-linked IP) automatically require MFA or are blocked.

Risk Signals Evaluated

• Anonymous IP address (TOR, VPN)
• Atypical travel (impossible travel)
• Malware-linked IP address
• Unfamiliar sign-in properties
• Password spray detection
• Microsoft Entra threat intelligence

Recommended Configuration
  1. Go to Entra Admin Center → Protection → Identity Protection
  2. Click "Sign-in risk policy"
  3. Set threshold to "Medium and above"
  4. Set action to "Require multi-factor authentication"
  5. Exclude break glass accounts
  6. Enable the policy
Configure User risk policy
M365 E5
Why This Matters

User risk identifies potentially compromised accounts over time. When Microsoft finds credentials in breach dumps or detects suspicious activity patterns, the user is marked as risky.

Recommended Configuration
  1. Go to Entra Admin Center → Protection → Identity Protection
  2. Click "User risk policy"
  3. Set threshold to "High" (start conservative)
  4. Set action to "Require password change"
  5. Ensure SSPR is enabled for users
  6. Enable the policy
💡 When user risk is triggered, the user must change their password via SSPR. Ensure SSPR is configured before enabling this policy.
Enforce Privileged Identity Management (PIM) for all admins
M365 E5
Why This Matters

PIM provides just-in-time privileged access. Admin accounts remain ordinary users until they elevate for a limited time. This dramatically reduces the risk of persistent admin access being compromised.

PIM Workflow

1. Admin requests activation of their eligible role
2. They must provide justification
3. They complete MFA challenge
4. (Optional) Another admin approves the request
5. Role is active for limited time (e.g., 8 hours)
6. Role automatically deactivates

Configuration Steps
  1. Go to Entra Admin Center → Identity Governance → PIM
  2. Click "Microsoft Entra roles"
  3. For each admin role, convert "Permanent" to "Eligible"
  4. Configure role settings: require MFA, justification, approval
  5. Set maximum activation duration (8 hours recommended)
  6. Keep break glass accounts as permanent
Configure Access Reviews
M365 E5
Why This Matters

Access Reviews automate the process of verifying that users still need their access. Reviewers regularly certify that group memberships, role assignments, and guest access are still appropriate.

Recommended Access Reviews

Admin role assignments - Monthly, reviewed by manager
Guest user access - Quarterly, reviewed by sponsor
Sensitive group memberships - Quarterly
Application access - Semi-annually

Advanced Compliance & Data Protection (E5 Compliance)
Enable auto-labeling for Information Protection
M365 E5
Why This Matters

E5 enables automatic sensitivity labeling based on content inspection. Documents containing sensitive data (SSN, credit cards, etc.) are automatically classified and protected without user action.

Auto-labeling Locations

• Exchange Online emails
• SharePoint Online sites
• OneDrive for Business
• On-premises file shares (with scanner)

Configure Endpoint DLP
M365 E5
Why This Matters

Endpoint DLP extends data loss prevention to Windows and macOS devices. Control printing, USB copying, cloud uploads, and clipboard operations based on document sensitivity.

Actions You Can Control

• Upload to cloud services (Dropbox, personal OneDrive)
• Copy to USB/removable media
• Copy to network shares
• Print documents
• Copy to clipboard
• Access by unallowed apps

Configure Insider Risk Management
M365 E5
Why This Matters

Insider Risk Management detects and helps you act on malicious and inadvertent insider threats - data theft by departing employees, data leaks, and security policy violations.

Policy Templates

Data theft by departing users - HR integration triggers
Data leaks - Unusual file sharing patterns
Security policy violations - Disabling security controls
Patient data misuse - Healthcare-specific
Risky browser usage - Visiting risky sites

💡 Insider Risk Management anonymizes user identities during investigation to prevent bias. Names are revealed only when approved for escalation.
Configure Communication Compliance
M365 E5
Why This Matters

Communication Compliance scans Teams, Exchange, and Yammer for regulatory violations, harassment, threats, and inappropriate content. Required for many financial services regulations.

Policy Types

Regulatory compliance - FINRA, SEC requirements
Inappropriate content - Harassment, threats, discrimination
Sensitive information - Detect PII sharing
Custom policies - Keywords, trainable classifiers

Configure Advanced Audit with 1-year retention
M365 E5
Why This Matters

Advanced Audit extends retention to 1 year (vs 90 days), adds crucial events like MailItemsAccessed, and provides high-bandwidth API access for investigation.

Key Advanced Audit Events

MailItemsAccessed - Every email access (sync or view)
Send - Email sent by user
SearchQueryInitiatedExchange - Mailbox searches
SearchQueryInitiatedSharePoint - SharePoint searches

Microsoft 365 Defender - Unified XDR
Enable Microsoft 365 Defender unified XDR
M365 E5
Why This Matters

Microsoft 365 Defender correlates signals across endpoint, email, identity, and cloud apps into unified incidents. Instead of separate alerts, you get the full attack story.

Integrated Products

• Microsoft Defender for Endpoint
• Microsoft Defender for Office 365
• Microsoft Defender for Identity
• Microsoft Defender for Cloud Apps
• Microsoft Entra ID Protection

Configure Microsoft Sentinel integration (optional)
M365 E5
Why This Matters

Microsoft Sentinel is a cloud-native SIEM/SOAR that can ingest M365 Defender data alongside logs from other sources (firewalls, other clouds, on-premises) for unified security monitoring.

Sentinel Benefits

• Correlate M365 with non-Microsoft data sources
• Long-term log retention beyond M365 limits
• Custom detection rules and analytics
• Automated response playbooks (Logic Apps)
• Workbooks for custom reporting

🎨 Microsoft 365 Branding Generator

📤

Drag and drop your logo here

or click to select a file (PNG, JPG)

📋 Microsoft 365 Branding Specifications

Image Dimensions Max Size Format
Background Image 1920 × 1080px 300 KB PNG/JPG
Banner Logo 245 × 36px 50 KB Transparent PNG
Square Logo (Light) 240 × 240px 50 KB PNG preferred
Square Logo (Dark) 240 × 240px 50 KB PNG preferred

💡 Tip: For the Banner Logo (245×36px), use a simplified version of your logo (icon only or short wordmark) for best results. Wide logos with text may appear small due to the narrow height constraint.