Microsoft 365 Security Configuration Guide
Step-by-step guide to securing your Microsoft 365 environment. Covers Secure Score optimization, Entra ID, Conditional Access, and Zero Trust implementation.
Understanding Microsoft Secure Score
Microsoft Secure Score is your security posture measurement. Most organizations score between 30-50% out of the box. Following this guide can help you reach 70-80% or higher.
Access your score: security.microsoft.com → Secure Score
Before You Start
Some settings require specific licenses (E3/E5, Entra ID P1/P2). Verify your licensing before implementing. Test changes in a pilot group before org-wide deployment.
Identity & Access Management
Entra ID (formerly Azure AD) is your security foundation. Get this right first.
Enable Security Defaults or Conditional Access
CriticalSecurity Defaults provide baseline MFA protection. For more control, use Conditional Access policies.
Implementation Steps:
- 1.Entra admin center → Properties → Manage Security defaults
- 2.For advanced: Create Conditional Access policies requiring MFA
- 3.Block legacy authentication protocols
Require MFA for All Users
CriticalMFA blocks 99.9% of automated attacks. No exceptions, especially for admins.
Implementation Steps:
- 1.Conditional Access → New policy → All users
- 2.Grant access → Require multi-factor authentication
- 3.Exclude break-glass emergency accounts (document separately)
Enable Privileged Identity Management (PIM)
HighJust-in-time admin access reduces standing privilege exposure.
Implementation Steps:
- 1.Requires Entra ID P2 license
- 2.Configure eligible assignments for admin roles
- 3.Set maximum activation duration (8 hours recommended)
- 4.Require approval for Global Admin activation
Configure Password Protection
HighBlock common passwords and organization-specific banned words.
Implementation Steps:
- 1.Entra ID → Security → Authentication methods → Password protection
- 2.Enable custom banned passwords
- 3.Add company name variations, products, locations
Email Security (Exchange Online)
Email is the #1 attack vector. These settings are essential.
Enable Microsoft Defender for Office 365
CriticalAdvanced threat protection for email, including Safe Attachments and Safe Links.
Implementation Steps:
- 1.Microsoft 365 Defender portal → Policies & rules
- 2.Enable Safe Attachments (Dynamic Delivery recommended)
- 3.Enable Safe Links for email and Teams
- 4.Enable Anti-phishing policies with impersonation protection
Configure DMARC, DKIM, and SPF
CriticalEmail authentication prevents domain spoofing and improves deliverability.
Implementation Steps:
- 1.SPF: Add TXT record "v=spf1 include:spf.protection.outlook.com -all"
- 2.DKIM: Enable in Exchange admin center → DKIM
- 3.DMARC: Add TXT record "_dmarc" with policy (start with p=none)
Block Auto-Forwarding to External Domains
HighPrevents attackers from silently forwarding emails after compromise.
Implementation Steps:
- 1.Exchange admin center → Mail flow → Rules
- 2.Create rule: If sender is inside org AND recipient is outside org AND message type is auto-forward → Block
Enable Mailbox Auditing
HighTrack mailbox access and actions for forensic investigations.
Implementation Steps:
- 1.Enabled by default since 2019, but verify
- 2.PowerShell: Get-OrganizationConfig | FL AuditDisabled
- 3.Should return "False"
Device Security (Intune)
Control what devices can access corporate data.
Require Device Compliance for Access
CriticalOnly compliant, managed devices should access corporate resources.
Implementation Steps:
- 1.Intune → Devices → Compliance policies
- 2.Create policies for Windows, iOS, Android
- 3.Require encryption, password, up-to-date OS
- 4.Integrate with Conditional Access to enforce
Enable Microsoft Defender for Endpoint
HighEDR capabilities detect and respond to threats on managed devices.
Implementation Steps:
- 1.Requires Microsoft 365 E5 or Defender for Endpoint P2
- 2.Onboard devices through Intune
- 3.Configure attack surface reduction rules
- 4.Enable automated investigation and remediation
Configure App Protection Policies
HighProtect corporate data on personal devices (BYOD) without full MDM.
Implementation Steps:
- 1.Intune → Apps → App protection policies
- 2.Require PIN/biometric for corporate apps
- 3.Prevent copy/paste to non-corporate apps
- 4.Require minimum OS version
Data Protection
Classify and protect sensitive information.
Enable Sensitivity Labels
HighClassify and protect documents based on sensitivity.
Implementation Steps:
- 1.Microsoft Purview → Information protection → Labels
- 2.Create labels: Public, Internal, Confidential, Highly Confidential
- 3.Apply encryption and access restrictions to sensitive labels
- 4.Enable auto-labeling for files containing sensitive data
Configure Data Loss Prevention (DLP)
HighPrevent accidental sharing of sensitive information.
Implementation Steps:
- 1.Microsoft Purview → Data loss prevention → Policies
- 2.Create policies for credit cards, SSNs, health records
- 3.Apply to Exchange, SharePoint, OneDrive, Teams
- 4.Start with "Test" mode, then enable blocking
Enable Unified Audit Log
HighCentralized logging for security investigations.
Implementation Steps:
- 1.Microsoft Purview → Audit
- 2.Verify auditing is enabled
- 3.Configure retention (90 days default, extend if needed)
- 4.Set up alerts for suspicious activities
SharePoint & OneDrive
Control file sharing and external access.
Restrict External Sharing
HighLimit who can share files externally and how.
Implementation Steps:
- 1.SharePoint admin center → Policies → Sharing
- 2.Restrict to "New and existing guests" or stricter
- 3.Require guests to sign in
- 4.Set expiration for guest access (90 days recommended)
Block Sync from Unmanaged Devices
MediumPrevent downloading corporate files to personal devices.
Implementation Steps:
- 1.SharePoint admin center → Settings → Sync
- 2.Enable "Allow syncing only on computers joined to specific domains"
- 3.Add your Entra ID tenant
Enable Versioning and Recycle Bin
MediumRansomware recovery through file versioning.
Implementation Steps:
- 1.Already enabled by default
- 2.Verify: Site settings → Site collection features → Versioning
- 3.Consider extending recycle bin retention
Quick Wins (Do These First)
- 1Enable Security DefaultsFree, instant MFA protection for all users
- 2Block Legacy AuthenticationCloses major security gap
- 3Enable Safe Attachments and Safe LinksBlocks malicious content in email
- 4Configure DMARC/DKIM/SPFPrevents email spoofing
- 5Block External Email ForwardingPrevents data exfiltration
Need Help Securing Microsoft 365?
Our team can assess your M365 security posture and implement these configurations for you.
