Essential security configurations every business should implement in Microsoft 365.
Microsoft 365 is secure out of the box — Microsoft's infrastructure is world-class. But securing your organisation's Microsoft 365 environment is not just about Microsoft's infrastructure. It is about how you configure it, who you grant access to, and how you monitor what is happening. The default configuration is not enough. You need to actively harden your environment.
The Security Responsibility Model
Microsoft secures the infrastructure. You secure your organisation's data and access. You decide who can access what, you manage passwords, you control what devices can connect, and you respond to security incidents.
This shared responsibility model is often misunderstood but is crucial: Microsoft's security means nothing if you leave the front door unlocked. Your configuration choices determine your actual security posture.
Essential Configuration 1: Multi-Factor Authentication (MFA)
This is non-negotiable. MFA requires users to prove their identity in two ways — something they know (password) and something they have (typically a phone or authenticator app). With MFA enabled, stealing a password alone will not let an attacker into your environment.
Require MFA for all users, not just admins. Use authenticator apps (like Microsoft Authenticator) rather than SMS-based codes where possible — SMS-based MFA is better than nothing but less secure than app-based authentication. The slight inconvenience is worth the massive security improvement.
Essential Configuration 2: Conditional Access Policies
Conditional Access allows you to apply rules like "if someone logs in from an unusual location, require MFA even if they have a valid password." This catches account compromise attempts even when passwords have been stolen.
Useful policies include: requiring MFA if login occurs outside your country, blocking access from unmanaged devices, or requiring MFA if access is attempted from a risky location. Conditional Access requires Azure AD Premium licensing, included in most Microsoft 365 business plans.
Essential Configuration 3: Password Policy
Azure AD password policies should enforce strong passwords — at least 12 characters combining uppercase, lowercase, numbers, and symbols. Enable password protection to block users from setting passwords that appear in known breach databases.
Avoid forced password rotation (requiring changes every 60 days). Research shows this does not actually improve security — users just write passwords on sticky notes. Instead, focus on detecting compromised passwords and forcing a change only when necessary.
Essential Configuration 4: Device Management
Devices accessing your Microsoft 365 environment are potential entry points for attackers. Ensure all devices are:
- Enrolled in device management (Intune or similar)
- Running current OS versions with all security updates applied
- Configured to require disk encryption
- Configured to require screen lock
- Running current antivirus software
For sensitive data, consider requiring company-owned and company-managed devices rather than personal ones. Personal devices are harder to secure and easier for attackers to compromise.
Essential Configuration 5: Email Security
Microsoft 365 includes email security, but configuration matters:
- Enable anti-phishing: Use advanced phishing protection to detect and block phishing emails before they reach users.
- Enable anti-malware: Scan all attachments and block those with known malware signatures.
- Enable safe links: Check URLs in emails against threat intelligence databases at click time.
- Block external forwarding: Prevent users from auto-forwarding email to external addresses without approval — a common data exfiltration method.
Essential Configuration 6: SharePoint and OneDrive Security
File storage is often a weak point. Configure:
- External sharing controls: Limit who in your organisation can share files externally and require approval for certain types of shares.
- Data loss prevention (DLP): Prevent users from sharing files containing sensitive data (ID numbers, financial records, etc.) externally.
- Retention policies: Automatically archive or delete old files after a defined retention period.
- Malware detection: Scan uploaded files automatically and quarantine suspicious content.
Essential Configuration 7: Teams Security
Teams needs deliberate configuration:
- Control external sharing: Decide whether users can invite external guests and under what conditions.
- Require approval for apps: Control which third-party apps can be installed in Teams.
- Enable guest access controls: If allowing external guests, control what they can access and when their access expires.
Essential Configuration 8: Monitoring and Alerts
Configuration alone is not enough — you need to monitor what is happening:
- Enable audit logging: Record all significant actions (logins, file access, permission changes) so you can investigate incidents.
- Set up alerts: Get notified of suspicious activities like unusual login locations, impossible travel (logging in from two cities too far apart to travel between), or bulk file access.
- Enable threat detection: Use Microsoft Defender to automatically detect and alert on suspicious activities.
Essential Configuration 9: Admin Account Protection
Global administrators should be treated as critical security assets:
- Have at least two separate admin accounts — one for daily use, one for emergency access.
- Require MFA for all admin accounts.
- Never use admin accounts for regular email or web browsing.
- Document who has admin access and audit quarterly.
- Use Azure AD Privileged Identity Management to require approval for privileged actions.
Essential Configuration 10: Regular User Training
The best technical security can be defeated by a user who opens a phishing email. Regular security training for all staff is essential. Users should understand how to identify phishing emails, when it is appropriate to share data, how to handle sensitive information, and what to do if they think their account has been compromised.
Prioritise Implementation
If you are just starting, implement in this order: (1) MFA, (2) Password policy, (3) Email security, (4) Device management, (5) Conditional Access, then add the rest. Do not try to implement everything at once — you will overwhelm your team and users.
Securing Microsoft 365 requires deliberate configuration beyond Microsoft's baseline. When MFA, strong password policies, device management, email security, and continuous monitoring work together, you have an environment that is genuinely secure. If your team does not have this expertise in-house, engaging a qualified consultant or managed services provider is worthwhile.